System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26047, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26047 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26047 - **State**: PUBLISHED - **Published Date**: February 28, 2025 at 00:00 UTC - **Last Updated**: March 06, 2025 at 20:44 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Loggrove v1.0 is vulnerable to SQL Injection in the read.py file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitee.com/olajowon/loggrove/issues/IBJXG8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0667, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0667 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0667 - **State**: PUBLISHED - **Published Date**: February 04, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:48 UTC - **Reserved Date**: October 08, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://marc.info/?l=bugtraq&m=87602880019797&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32094, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32094 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32094 - **State**: PUBLISHED - **Published Date**: May 07, 2021 at 03:51 UTC - **Last Updated**: August 03, 2024 at 23:17 UTC - **Reserved Date**: May 07, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to upload arbitrary files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover) 2. [](https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2851, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2851 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2851 - **State**: PUBLISHED - **Published Date**: July 23, 2010 at 20:00 UTC - **Last Updated**: August 07, 2024 at 02:46 UTC - **Reserved Date**: July 23, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the BookLibrary From Same Author (com_booklibrary) module 1.5 and possibly earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a view action to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [65996](http://www.osvdb.org/65996) 2. [](http://secunia.com/secunia_research/2010-83/) 3. [booklibrary-id-sql-injection(60107)](https://exchange.xforce.ibmcloud.com/vulnerabilities/60107) 4. [41350](http://www.securityfocus.com/bid/41350) 5. [40130](http://secunia.com/advisories/40130) 6. [ADV-2010-1707](http://www.vupen.com/english/advisories/2010/1707) 7. [20100705 Secunia Research: Joomla BookLibrary From Same Author Module "id" SQL Injection](http://www.securityfocus.com/archive/1/512174/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19257, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19257 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19257 - **State**: REJECTED - **Published Date**: January 08, 2019 at 20:00 UTC - **Last Updated**: January 08, 2019 at 19:57 UTC - **Reserved Date**: November 13, 2018 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-23877, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-23877 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-23877 - **State**: PUBLISHED - **Published Date**: August 08, 2023 at 11:31 UTC - **Last Updated**: September 25, 2024 at 16:45 UTC - **Reserved Date**: January 19, 2023 at 11:32 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in bkmacdaddy designs Pinterest RSS Widget plugin <= 2.3.1 versions. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **bkmacdaddy designs - Pinterest RSS Widget** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/pinterest-rss-widget/wordpress-pinterest-rss-widget-plugin-2-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Lana Codes (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42207, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42207 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42207 - **State**: PUBLISHED - **Published Date**: February 05, 2025 at 15:11 UTC - **Last Updated**: February 05, 2025 at 15:35 UTC - **Reserved Date**: July 29, 2024 at 21:32 UTC - **Assigned By**: HCL ### Vulnerability Description HCL iAutomate is affected by a session fixation vulnerability.  An attacker could hijack a victim's session ID from their authenticated session. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:L` ### Weakness Classification (CWE) - CWE-384: Security Weakness ### Affected Products **HCL Software - iAutomate** Affected versions: - 6.4.2 (Status: affected) ### References 1. [](https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118946)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9125 - **State**: PUBLISHED - **Published Date**: June 12, 2017 at 06:00 UTC - **Last Updated**: August 05, 2024 at 16:55 UTC - **Reserved Date**: May 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The lqt_frame_duration function in lqt_quicktime.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted mp4 file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42148](https://www.exploit-db.com/exploits/42148/) 2. [USN-4545-1](https://usn.ubuntu.com/4545-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21782, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21782 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21782 - **State**: PUBLISHED - **Published Date**: February 27, 2025 at 02:18 UTC - **Last Updated**: May 04, 2025 at 07:21 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: orangefs: fix a oob in orangefs_debug_write I got a syzbot report: slab-out-of-bounds Read in orangefs_debug_write... several people suggested fixes, I tested Al Viro's suggestion and made this patch. ### Affected Products **Linux - Linux** Affected versions: - f7ab093f74bf638ed98fd1115f3efa17e308bb7f (Status: affected) - f7ab093f74bf638ed98fd1115f3efa17e308bb7f (Status: affected) - f7ab093f74bf638ed98fd1115f3efa17e308bb7f (Status: affected) - f7ab093f74bf638ed98fd1115f3efa17e308bb7f (Status: affected) - f7ab093f74bf638ed98fd1115f3efa17e308bb7f (Status: affected) - f7ab093f74bf638ed98fd1115f3efa17e308bb7f (Status: affected) - f7ab093f74bf638ed98fd1115f3efa17e308bb7f (Status: affected) - f7ab093f74bf638ed98fd1115f3efa17e308bb7f (Status: affected) **Linux - Linux** Affected versions: - 4.6 (Status: affected) - 0 (Status: unaffected) - 5.4.291 (Status: unaffected) - 5.10.235 (Status: unaffected) - 5.15.179 (Status: unaffected) - 6.1.129 (Status: unaffected) - 6.6.79 (Status: unaffected) - 6.12.16 (Status: unaffected) - 6.13.4 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/18b7f841109f697840fe8633cf7ed7d32bd3f91b) 2. [](https://git.kernel.org/stable/c/09d472a18c0ee1d5b83612cb919e33a1610fea16) 3. [](https://git.kernel.org/stable/c/8725882b0f691f8113b230aea9df0256030a63a6) 4. [](https://git.kernel.org/stable/c/1da2697307dad281dd690a19441b5ca4af92d786) 5. [](https://git.kernel.org/stable/c/2b84a231910cef2e0a16d29294afabfb69112087) 6. [](https://git.kernel.org/stable/c/897f496b946fdcfab5983c983e4b513ab6682364) 7. [](https://git.kernel.org/stable/c/1c5244299241cf49d8ae7b5054e299cc8faa4e09) 8. [](https://git.kernel.org/stable/c/f7c848431632598ff9bce57a659db6af60d75b39)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16075, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16075 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16075 - **State**: PUBLISHED - **Published Date**: June 07, 2018 at 02:00 UTC - **Last Updated**: September 16, 2024 at 20:51 UTC - **Reserved Date**: October 29, 2017 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description http-proxy.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm. ### Weakness Classification (CWE) - CWE-506: Security Weakness ### Affected Products **HackerOne - http-proxy.js node module** Affected versions: - All versions (Status: affected) ### References 1. [](https://nodesecurity.io/advisories/514)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10809, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10809 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10809 - **State**: PUBLISHED - **Published Date**: August 07, 2019 at 12:30 UTC - **Last Updated**: August 06, 2024 at 03:38 UTC - **Reserved Date**: July 31, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In cPanel before 57.9999.54, /scripts/checkinfopages exposed a TTY to an unprivileged process (SEC-114). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://documentation.cpanel.net/display/CL/58+Change+Log)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1515, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1515 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1515 - **State**: PUBLISHED - **Published Date**: January 26, 2018 at 21:00 UTC - **Last Updated**: September 17, 2024 at 03:59 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Doors Web Access 9.5 and 9.6 could allow an authenticated user to obtain sensitive information from HTTP internal server error responses. IBM X-Force ID: 129825. ### Affected Products **IBM - Rational DOORS** Affected versions: - 9.5 (Status: affected) - 9.5.0.1 (Status: affected) - 9.5.1 (Status: affected) - 9.5.1.1 (Status: affected) - 9.5.1.2 (Status: affected) - 9.5.2 (Status: affected) - 9.5.2.1 (Status: affected) - 9.6 (Status: affected) - 9.5.0.2 (Status: affected) - 9.5.0.3 (Status: affected) - 9.5.1.3 (Status: affected) - 9.5.1.4 (Status: affected) - 9.5.2.2 (Status: affected) - 9.5.2.3 (Status: affected) - 9.6.0.1 (Status: affected) - 9.6.0.2 (Status: affected) - 9.6.1 (Status: affected) - 9.6.1.1 (Status: affected) - 9.5.0.4 (Status: affected) - 9.5.1.5 (Status: affected) - 9.5.2.4 (Status: affected) - 9.6.0.3 (Status: affected) - 9.6.1.2 (Status: affected) - 9.6.1.3 (Status: affected) - 9.6.1.4 (Status: affected) - 9.5.0.5 (Status: affected) - 9.5.1.6 (Status: affected) - 9.5.2.5 (Status: affected) - 9.6.0.4 (Status: affected) - 9.5.0.6 (Status: affected) - 9.5.1.7 (Status: affected) - 9.5.2.6 (Status: affected) - 9.6.0.5 (Status: affected) - 9.6.1.5 (Status: affected) - 9.6.1.6 (Status: affected) - 9.6.1.7 (Status: affected) - 9.5.0.7 (Status: affected) - 9.5.1.8 (Status: affected) - 9.5.2.7 (Status: affected) - 9.6.0.6 (Status: affected) - 9.6.1.8 (Status: affected) - 9.6.1.9 (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/129825) 2. [](http://www.ibm.com/support/docview.wss?uid=swg22012789) 3. [102872](http://www.securityfocus.com/bid/102872)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1118, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1118 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1118 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:12 UTC - **Reserved Date**: September 09, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TNS Listener in Oracle Net Services for Oracle 9i 9.2.x and 9.0.x, and Oracle 8i 8.1.x, allows remote attackers to cause a denial of service (hang or crash) via a SERVICE_CURLOAD command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://otn.oracle.com/deploy/security/pdf/2002alert42rev1.pdf) 2. [oracle-net-services-dos(10283)](http://www.iss.net/security_center/static/10283.php) 3. [5678](http://www.securityfocus.com/bid/5678) 4. [20021009 R7-0006: Oracle 8i/9i Listener SERVICE_CURLOAD Denial of Service](http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0017.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5437, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5437 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5437 - **State**: REJECTED - **Published Date**: January 25, 2021 at 17:53 UTC - **Last Updated**: January 25, 2021 at 17:53 UTC - **Reserved Date**: January 03, 2020 at 00:00 UTC - **Assigned By**: pivotal ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4475 - **State**: PUBLISHED - **Published Date**: August 19, 2016 at 21:00 UTC - **Last Updated**: August 06, 2024 at 00:32 UTC - **Reserved Date**: May 02, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The (1) Organization and (2) Locations APIs and UIs in Foreman before 1.11.4 and 1.12.x before 1.12.0-RC3 allow remote authenticated users to bypass organization and location restrictions and (a) read, (b) edit, or (c) delete arbitrary organizations or locations via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://theforeman.org/security.html#2016-4475) 2. [](http://projects.theforeman.org/issues/15268) 3. [RHBA-2016:1615](https://access.redhat.com/errata/RHBA-2016:1615) 4. [](http://projects.theforeman.org/projects/foreman/repository/revisions/a30ab44ed6f140f1791afc51a1e448afc2ff28f9) 5. [92125](http://www.securityfocus.com/bid/92125)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0557, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0557 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0557 - **State**: PUBLISHED - **Published Date**: June 22, 2021 at 10:58 UTC - **Last Updated**: August 03, 2024 at 15:47 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In setRange of ABuffer.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-179046129 ### Affected Products **n/a - Android** Affected versions: - Android-11 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2021-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3846, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3846 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3846 - **State**: PUBLISHED - **Published Date**: April 21, 2025 at 22:31 UTC - **Last Updated**: April 22, 2025 at 02:15 UTC - **Reserved Date**: April 21, 2025 at 13:25 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in markparticle WebServer up to 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file code/http/httprequest.cpp of the component Registration. The manipulation of the argument username/password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **markparticle - WebServer** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-305774 | markparticle WebServer Registration httprequest.cpp sql injection](https://vuldb.com/?id.305774) 2. [VDB-305774 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.305774) 3. [Submit #556274 | markparticle WebServer 1.0 SQL Injection](https://vuldb.com/?submit.556274) 4. [](https://magnificent-dill-351.notion.site/SQL-Injection-of-Register-in-WebServer-1-0-1d1c693918ed80b69a0bfcd9b685de46) 5. [](https://magnificent-dill-351.notion.site/SQL-Injection-of-Login-in-WebServer-1-0-1d1c693918ed800b847bcc28bd691b7c) ### Credits - s0l42 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000078, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000078 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000078 - **State**: PUBLISHED - **Published Date**: March 13, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 12:33 UTC - **Reserved Date**: February 21, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appear to be exploitable via the victim must browse to a malicious gem on a vulnerable gem server. This vulnerability appears to have been fixed in 2.7.6. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-4219](https://www.debian.org/security/2018/dsa-4219) 2. [USN-3621-1](https://usn.ubuntu.com/3621-1/) 3. [RHSA-2018:3729](https://access.redhat.com/errata/RHSA-2018:3729) 4. [RHSA-2018:3730](https://access.redhat.com/errata/RHSA-2018:3730) 5. [[debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update](https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html) 6. [RHSA-2018:3731](https://access.redhat.com/errata/RHSA-2018:3731) 7. [[debian-lts-announce] 20180402 [SECURITY] [DLA 1337-1] jruby security update](https://lists.debian.org/debian-lts-announce/2018/04/msg00001.html) 8. [[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html) 9. [DSA-4259](https://www.debian.org/security/2018/dsa-4259) 10. [](http://blog.rubygems.org/2018/02/15/2.7.6-released.html) 11. [](https://github.com/rubygems/rubygems/commit/66a28b9275551384fdab45f3591a82d6b59952cb) 12. [[debian-lts-announce] 20180401 [SECURITY] [DLA 1336-1] rubygems security update](https://lists.debian.org/debian-lts-announce/2018/04/msg00000.html) 13. [[debian-lts-announce] 20190520 [SECURITY] [DLA 1796-1] jruby security update](https://lists.debian.org/debian-lts-announce/2019/05/msg00028.html) 14. [openSUSE-SU-2019:1771](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html) 15. [RHSA-2019:2028](https://access.redhat.com/errata/RHSA-2019:2028) 16. [RHSA-2020:0542](https://access.redhat.com/errata/RHSA-2020:0542) 17. [RHSA-2020:0591](https://access.redhat.com/errata/RHSA-2020:0591) 18. [RHSA-2020:0663](https://access.redhat.com/errata/RHSA-2020:0663)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40651 - **State**: PUBLISHED - **Published Date**: September 29, 2021 at 11:59 UTC - **Last Updated**: August 04, 2024 at 02:51 UTC - **Reserved Date**: September 07, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://youtu.be/wFwlbXANRCo) 2. [](https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md) 3. [](https://www.exploit-db.com/exploits/50259)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6926, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6926 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6926 - **State**: PUBLISHED - **Published Date**: September 04, 2024 at 06:00 UTC - **Last Updated**: September 04, 2024 at 14:19 UTC - **Reserved Date**: July 19, 2024 at 19:37 UTC - **Assigned By**: WPScan ### Vulnerability Description The Viral Signup WordPress plugin through 2.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection ### Weakness Classification (CWE) - CWE-89 SQL Injection: SQL Injection ### Affected Products **Unknown - Viral Signup** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/9ce96ce5-fcf0-4d7a-b562-f63ea3418d93/) ### Credits - Project Black - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2804, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2804 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2804 - **State**: PUBLISHED - **Published Date**: August 28, 2013 at 01:00 UTC - **Last Updated**: September 16, 2024 at 19:39 UTC - **Reserved Date**: April 11, 2013 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description The DNP Master Driver in Software Toolbox TOP Server before 5.12.140.0 allows remote attackers to cause a denial of service (master-station infinite loop) via crafted DNP3 packets to TCP port 20000 and allows physically proximate attackers to cause a denial of service (master-station infinite loop) via crafted input over a serial line. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.softwaretoolbox.com/app/answers/detail/a_id/3014) 2. [](http://ics-cert.us-cert.gov/advisories/ICSA-13-234-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-57906, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-57906 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-57906 - **State**: PUBLISHED - **Published Date**: January 19, 2025 at 11:52 UTC - **Last Updated**: May 04, 2025 at 13:01 UTC - **Reserved Date**: January 19, 2025 at 11:50 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: iio: adc: ti-ads8688: fix information leak in triggered buffer The 'buffer' local array is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Initialize the array to zero before using it to avoid pushing uninitialized information to userspace. ### Affected Products **Linux - Linux** Affected versions: - 26aa12ef64ee997d293659bbf645c6df99fb73e5 (Status: affected) - c923e9effe50b0a83e74e1940afbecef5456bfda (Status: affected) - 61fa5dfa5f52806f5ce37a0ba5712c271eb22f98 (Status: affected) - 61fa5dfa5f52806f5ce37a0ba5712c271eb22f98 (Status: affected) - 61fa5dfa5f52806f5ce37a0ba5712c271eb22f98 (Status: affected) - 61fa5dfa5f52806f5ce37a0ba5712c271eb22f98 (Status: affected) - 61fa5dfa5f52806f5ce37a0ba5712c271eb22f98 (Status: affected) - 91664385e6c49f1e961e822f2d024776ac22102a (Status: affected) - a65024fc5754f2fca73541373a2502bef603565b (Status: affected) - 3563bb70d6baa0a5e8082397e13f62f26053c04d (Status: affected) **Linux - Linux** Affected versions: - 5.14 (Status: affected) - 0 (Status: unaffected) - 5.4.290 (Status: unaffected) - 5.10.234 (Status: unaffected) - 5.15.177 (Status: unaffected) - 6.1.125 (Status: unaffected) - 6.6.72 (Status: unaffected) - 6.12.10 (Status: unaffected) - 6.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/1c80a0985a9a14f33dbf63cd703ca010f094f878) 2. [](https://git.kernel.org/stable/c/3bf8d1e87939b8a19c9b738564fddf5b73322f2f) 3. [](https://git.kernel.org/stable/c/aae96738006840533cf147ffd5f41830987f21c5) 4. [](https://git.kernel.org/stable/c/ebe2672bc42a0dfe31bb539f8ce79d024aa7e46d) 5. [](https://git.kernel.org/stable/c/455df95eb8f24a37abc549d6738fc8ee07eb623b) 6. [](https://git.kernel.org/stable/c/485570ed82b7a6bb109fa1d0a79998e21f7f4c73) 7. [](https://git.kernel.org/stable/c/2a7377ccfd940cd6e9201756aff1e7852c266e69)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36376, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36376 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36376 - **State**: PUBLISHED - **Published Date**: July 10, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 16:45 UTC - **Reserved Date**: June 21, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-Site Scripting (XSS) vulnerability in Hostel Management System v.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the add course section. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com) 2. [](https://medium.com/%40ridheshgohil1092/cve-2023-36376-xss-on-hostel-management-system-c6891993527)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-24411, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-24411 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-24411 - **State**: PUBLISHED - **Published Date**: October 20, 2020 at 21:55 UTC - **Last Updated**: September 16, 2024 at 19:15 UTC - **Reserved Date**: August 19, 2020 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Illustrator version 24.2 (and earlier) is affected by an out-of-bounds write vulnerability when handling crafted PDF files. This could result in a write past the end of an allocated memory structure, potentially resulting in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Adobe - Illustrator** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/illustrator/apsb20-53.html) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1270/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38499, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38499 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38499 - **State**: PUBLISHED - **Published Date**: November 03, 2021 at 00:03 UTC - **Last Updated**: August 04, 2024 at 01:44 UTC - **Reserved Date**: August 10, 2021 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description Mozilla developers reported memory safety bugs present in Firefox 92. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 93. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2021-43/) 2. [](https://bugzilla.mozilla.org/buglist.cgi?bug_id=1667102%2C1723170%2C1725356%2C1727364)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9170, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9170 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9170 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: December 01, 2014 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47194, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47194 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47194 - **State**: PUBLISHED - **Published Date**: April 10, 2024 at 18:56 UTC - **Last Updated**: May 04, 2025 at 07:06 UTC - **Reserved Date**: March 25, 2024 at 09:12 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type If the userspace tools switch from NL80211_IFTYPE_P2P_GO to NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it does not call the cleanup cfg80211_stop_ap(), this leads to the initialization of in-use data. For example, this path re-init the sdata->assigned_chanctx_list while it is still an element of assigned_vifs list, and makes that linked list corrupt. ### Affected Products **Linux - Linux** Affected versions: - ac800140c20e7ae51117e71289065bedd4930fc2 (Status: affected) - ac800140c20e7ae51117e71289065bedd4930fc2 (Status: affected) - ac800140c20e7ae51117e71289065bedd4930fc2 (Status: affected) - ac800140c20e7ae51117e71289065bedd4930fc2 (Status: affected) - ac800140c20e7ae51117e71289065bedd4930fc2 (Status: affected) - ac800140c20e7ae51117e71289065bedd4930fc2 (Status: affected) - ac800140c20e7ae51117e71289065bedd4930fc2 (Status: affected) - ac800140c20e7ae51117e71289065bedd4930fc2 (Status: affected) **Linux - Linux** Affected versions: - 3.6 (Status: affected) - 0 (Status: unaffected) - 4.4.293 (Status: unaffected) - 4.9.291 (Status: unaffected) - 4.14.256 (Status: unaffected) - 4.19.218 (Status: unaffected) - 5.4.162 (Status: unaffected) - 5.10.82 (Status: unaffected) - 5.15.5 (Status: unaffected) - 5.16 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/8f06bb8c216bcd172394f61e557727e691b4cb24) 2. [](https://git.kernel.org/stable/c/0738cdb636c21ab552eaecf905efa4a6070e3ebc) 3. [](https://git.kernel.org/stable/c/4e458abbb4a523f1413bfe15c079cf4e24c15b21) 4. [](https://git.kernel.org/stable/c/b8a045e2a9b234cfbc06cf36923886164358ddec) 5. [](https://git.kernel.org/stable/c/52affc201fc22a1ab9a59ef0ed641a9adfcb8d13) 6. [](https://git.kernel.org/stable/c/7b97b5776daa0b39dbdadfea176f9cc0646d4a66) 7. [](https://git.kernel.org/stable/c/5a9b671c8d74a3e1b999e7a0c7f366079bcc93dd) 8. [](https://git.kernel.org/stable/c/563fbefed46ae4c1f70cffb8eb54c02df480b2c2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3528, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3528 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3528 - **State**: PUBLISHED - **Published Date**: April 24, 2017 at 19:00 UTC - **Last Updated**: October 07, 2024 at 16:13 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Applications Framework component of Oracle E-Business Suite (subcomponent: Popup windows (lists of values, datepicker, etc.)). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). ### Affected Products **Oracle Corporation - Applications Framework** Affected versions: - 12.1.3 (Status: affected) - 12.2.3 (Status: affected) - 12.2.4 (Status: affected) - 12.2.5 (Status: affected) - 12.2.6 (Status: affected) ### References 1. [43592](https://www.exploit-db.com/exploits/43592/) 2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html) 3. [97780](http://www.securityfocus.com/bid/97780) 4. [1038299](http://www.securitytracker.com/id/1038299)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12870, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12870 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12870 - **State**: PUBLISHED - **Published Date**: September 30, 2020 at 20:40 UTC - **Last Updated**: August 04, 2024 at 12:11 UTC - **Reserved Date**: May 14, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RainbowFish PacsOne Server 6.8.4 allows SQL injection on the username parameter in the signup page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.pacsone.net/download.htm) 2. [](https://github.com/bzyo/cve-pocs/tree/master/CVE-2020-12870)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2416, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2416 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2416 - **State**: PUBLISHED - **Published Date**: May 22, 2008 at 10:00 UTC - **Last Updated**: August 07, 2024 at 08:58 UTC - **Reserved Date**: May 22, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in FicHive 1.0 allows remote attackers to execute arbitrary SQL commands via the category parameter in a Fiction action, possibly related to sources/fiction.class.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [fichive-index-sql-injection(42515)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42515) 2. [5639](https://www.exploit-db.com/exploits/5639) 3. [29265](http://www.securityfocus.com/bid/29265) 4. [ADV-2008-1564](http://www.vupen.com/english/advisories/2008/1564/references)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6448, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6448 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6448 - **State**: PUBLISHED - **Published Date**: November 03, 2016 at 21:00 UTC - **Last Updated**: August 06, 2024 at 01:29 UTC - **Reserved Date**: July 26, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Session Description Protocol (SDP) parser of Cisco Meeting Server could allow an unauthenticated, remote attacker to execute arbitrary code on an affected system. This vulnerability affects the following products: Cisco Meeting Server releases prior to Release 2.0.3, Acano Server releases 1.9.x prior to Release 1.9.5, Acano Server releases 1.8.x prior to Release 1.8.17. More Information: CSCva76004. Known Affected Releases: 1.8.x 1.92.0. ### Affected Products **n/a - Cisco Meeting Server before 2.0.3 and Acano Server before 1.9.5** Affected versions: - Cisco Meeting Server before 2.0.3 and Acano Server before 1.9.5 (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-cms1) 2. [1037181](http://www.securitytracker.com/id/1037181) 3. [94076](http://www.securityfocus.com/bid/94076)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37307, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37307 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37307 - **State**: PUBLISHED - **Published Date**: June 13, 2024 at 16:09 UTC - **Last Updated**: August 19, 2024 at 17:04 UTC - **Reserved Date**: June 05, 2024 at 20:10 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.13.0 and prior to versions 1.13.7, 1.14.12, and 1.15.6, the output of `cilium-bugtool` can contain sensitive data when the tool is run (with the `--envoy-dump` flag set) against Cilium deployments with the Envoy proxy enabled. Users of the TLS inspection, Ingress with TLS termination, Gateway API with TLS termination, and Kafka network policies with API key filtering features are affected. The sensitive data includes the CA certificate, certificate chain, and private key used by Cilium HTTP Network Policies, and when using Ingress/Gateway API and the API keys used in Kafka-related network policy. `cilium-bugtool` is a debugging tool that is typically invoked manually and does not run during the normal operation of a Cilium cluster. This issue has been patched in Cilium v1.15.6, v1.14.12, and v1.13.17. There is no workaround to this issue. ### CVSS Metrics - **CVSS Base Score**: 7.9/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **cilium - cilium** Affected versions: - >= 1.13.0, < 1.13.17 (Status: affected) - >= 1.14.0, < 1.14.12 (Status: affected) - >= 1.15.0, < 1.15.6 (Status: affected) ### References 1. [https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j](https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j) 2. [https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407](https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407) 3. [https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a](https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a) 4. [https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741](https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741) 5. [https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653](https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653) 6. [https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b](https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b) 7. [https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61](https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5959 - **State**: PUBLISHED - **Published Date**: January 31, 2013 at 21:00 UTC - **Last Updated**: August 06, 2024 at 21:21 UTC - **Reserved Date**: November 21, 2012 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka uuid) field within a string that contains a :: (colon colon) in a UDP packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20130129 Portable SDK for UPnP Devices Contains Buffer Overflow Vulnerabilities](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp) 2. [MDVSA-2013:098](http://www.mandriva.com/security/advisories?name=MDVSA-2013:098) 3. [](http://tsd.dlink.com.tw/temp/PMD/12960/DSR-150N_A2_Release_Notes_FW_v1.05B64_WW.pdf) 4. [](https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf) 5. [](http://tsd.dlink.com.tw/temp/PMD/12879/DSR-500_500N_1000_1000N_A1_Release_Notes_FW_v1.08B77_WW.pdf) 6. [DSA-2615](http://www.debian.org/security/2013/dsa-2615) 7. [](http://tsd.dlink.com.tw/temp/PMD/12966/DSR-150_A1_A2_Release_Notes_FW_v1.08B44_WW.pdf) 8. [](http://tsd.dlink.com.tw/temp/PMD/13039/DSR-250_250N_A1_A2_Release_Notes_FW_v1.08B44_WW_RU.pdf) 9. [DSA-2614](http://www.debian.org/security/2013/dsa-2614) 10. [57602](http://www.securityfocus.com/bid/57602) 11. [](https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb) 12. [](http://pupnp.sourceforge.net/ChangeLog) 13. [](https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play) 14. [VU#922681](http://www.kb.cert.org/vuls/id/922681) 15. [](https://www.tenable.com/security/research/tra-2017-10) 16. [openSUSE-SU-2013:0255](http://lists.opensuse.org/opensuse-updates/2013-02/msg00013.html) 17. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0037)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0839, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0839 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0839 - **State**: PUBLISHED - **Published Date**: January 24, 2013 at 21:00 UTC - **Last Updated**: August 06, 2024 at 14:41 UTC - **Reserved Date**: January 07, 2013 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use-after-free vulnerability in Google Chrome before 24.0.1312.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of fonts in CANVAS elements. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html) 2. [](https://code.google.com/p/chromium/issues/detail?id=151008) 3. [oval:org.mitre.oval:def:16327](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16327)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10975, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10975 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10975 - **State**: PUBLISHED - **Published Date**: May 10, 2018 at 16:00 UTC - **Last Updated**: September 17, 2024 at 00:01 UTC - **Reserved Date**: May 10, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In 2345 Security Guard 3.7, the driver file (2345BdPcSafe.sys, X64 version) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCTL 0x00222104. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222104)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29319, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29319 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29319 - **State**: PUBLISHED - **Published Date**: July 05, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 01:10 UTC - **Reserved Date**: March 19, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Volmarg Personal Management System 1.4.64 is vulnerable to SSRF (Server Side Request Forgery) via uploading a SVG file. The server can make unintended HTTP and DNS requests to a server that the attacker controls. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-29319)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16109, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16109 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16109 - **State**: PUBLISHED - **Published Date**: September 08, 2019 at 19:57 UTC - **Last Updated**: August 05, 2024 at 01:03 UTC - **Reserved Date**: September 08, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Plataformatec Devise before 4.7.1. It confirms accounts upon receiving a request with a blank confirmation_token, if a database record has a blank value in the confirmation_token column. (However, there is no scenario within Devise itself in which such database records would exist.) ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/plataformatec/devise/pull/5132) 2. [](https://github.com/plataformatec/devise/issues/5071) 3. [](https://github.com/plataformatec/devise/compare/v4.7.0...v4.7.1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0480, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0480 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0480 - **State**: PUBLISHED - **Published Date**: October 05, 2018 at 14:00 UTC - **Last Updated**: November 26, 2024 at 14:37 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the errdisable per VLAN feature of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause the device to crash, leading to a denial of service (DoS) condition. The vulnerability is due to a race condition that occurs when the VLAN and port enter an errdisabled state, resulting in an incorrect state in the software. An attacker could exploit this vulnerability by sending frames that trigger the errdisable condition. A successful exploit could allow the attacker to cause the affected device to crash, leading to a DoS condition. ### Weakness Classification (CWE) - CWE-362: Security Weakness ### Affected Products **Cisco - Cisco IOS XE Software** Affected versions: - n/a (Status: affected) ### References 1. [20180926 Cisco IOS XE Software Errdisable Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-errdisable) 2. [105400](http://www.securityfocus.com/bid/105400) 3. [1041737](http://www.securitytracker.com/id/1041737)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21342, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21342 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21342 - **State**: PUBLISHED - **Published Date**: March 22, 2021 at 23:40 UTC - **Last Updated**: August 03, 2024 at 18:09 UTC - **Reserved Date**: December 22, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **x-stream - xstream** Affected versions: - < 1.4.16 (Status: affected) ### References 1. [](https://x-stream.github.io/security.html#workaround) 2. [](http://x-stream.github.io/changes.html#1.4.16) 3. [](https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m) 4. [](https://x-stream.github.io/CVE-2021-21342.html) 5. [[debian-lts-announce] 20210403 [SECURITY] [DLA 2616-1] libxstream-java security update](https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html) 6. [[jmeter-dev] 20210406 [GitHub] [jmeter] sseide opened a new pull request #655: update x-stream to 1.4.16 (from 1.4.15)](https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0%40%3Cdev.jmeter.apache.org%3E) 7. [[activemq-users] 20210427 Release date for ActiveMQ v5.16.2 to fix CVEs](https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd%40%3Cusers.activemq.apache.org%3E) 8. [](https://security.netapp.com/advisory/ntap-20210430-0002/) 9. [](https://www.oracle.com//security-alerts/cpujul2021.html) 10. [FEDORA-2021-fbad11014a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/) 11. [FEDORA-2021-d894ca87dc](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/) 12. [](https://www.oracle.com/security-alerts/cpuoct2021.html) 13. [FEDORA-2021-5e376c0ed9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/) 14. [DSA-5004](https://www.debian.org/security/2021/dsa-5004) 15. [](https://www.oracle.com/security-alerts/cpujan2022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0218, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0218 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0218 - **State**: PUBLISHED - **Published Date**: April 22, 2019 at 21:16 UTC - **Last Updated**: August 04, 2024 at 17:44 UTC - **Reserved Date**: November 14, 2018 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description A vulnerability was discovered wherein a specially crafted URL could enable reflected XSS via JavaScript in the pony mail interface. ### Affected Products **The Apache Software Foundation - Apache Pony Mail (incubating)** Affected versions: - 0.8 to 0.10 (Status: affected) ### References 1. [[ponymail-users] 20190420 [CVE-2019-0218] Apache Pony Mail (incubating) Reflected XSS](https://lists.apache.org/thread.html/18a7ff26bc31a77e32e5e02e65dc86b1c41b610c753f8927d2cf955a%40%3Cdev.ponymail.apache.org%3E) 2. [[oss-security] 20190420 [CVE-2019-0218] Apache Pony Mail (incubating) Reflected XSS](https://www.openwall.com/lists/oss-security/2019/04/20/1) 3. [108046](http://www.securityfocus.com/bid/108046)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5609, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5609 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5609 - **State**: REJECTED - **Last Updated**: June 06, 2024 at 18:35 UTC - **Reserved Date**: June 03, 2024 at 19:44 UTC - **Assigned By**: Wordfence ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1326, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1326 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1326 - **State**: PUBLISHED - **Published Date**: March 21, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 17:03 UTC - **Reserved Date**: March 20, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Invision Power Board 2.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) result_type, (2) search_in, (3) nav, (4) forums, and (5) s parameters in the Search action to index.php; (6) st parameter to index.php with showtopics set to 1; (7) m, (8) y, and (9) d parameters in a calendar action; (10) t parameter in a Print action; (11) MID parameter in a Mail action; (12) HID parameter in a Help action; (13) active parameter in a search action; (14) sort_order, (15) max_results, or (16) sort_key parameter in a Members action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [25010](http://www.osvdb.org/25010) 2. [25013](http://www.osvdb.org/25013) 3. [25011](http://www.osvdb.org/25011) 4. [25014](http://www.osvdb.org/25014) 5. [20060317 XSS IN Invision Power Board](http://www.securityfocus.com/archive/1/428015/100/0/threaded) 6. [25012](http://www.osvdb.org/25012) 7. [17144](http://www.securityfocus.com/bid/17144) 8. [25009](http://www.osvdb.org/25009) 9. [25015](http://www.osvdb.org/25015)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5378 - **State**: PUBLISHED - **Published Date**: February 19, 2018 at 13:00 UTC - **Last Updated**: September 16, 2024 at 20:16 UTC - **Reserved Date**: January 12, 2018 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash. ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Quagga - bgpd** Affected versions: - bpgd (Status: affected) ### References 1. [](https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-0543.txt) 2. [USN-3573-1](https://usn.ubuntu.com/3573-1/) 3. [DSA-4115](https://www.debian.org/security/2018/dsa-4115) 4. [](http://savannah.nongnu.org/forum/forum.php?forum_id=9095) 5. [GLSA-201804-17](https://security.gentoo.org/glsa/201804-17) 6. [VU#940439](http://www.kb.cert.org/vuls/id/940439)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0769, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0769 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0769 - **State**: PUBLISHED - **Published Date**: February 28, 2025 at 20:01 UTC - **Last Updated**: February 28, 2025 at 20:29 UTC - **Reserved Date**: January 28, 2025 at 00:17 UTC - **Assigned By**: Fluid Attacks ### Vulnerability Description PixelYourSite - Your smart PIXEL (TAG) and API Manager 10.1.1.1 was found to be vulnerable. Unvalidated user input is used directly in an unserialize function in myapp/modules/facebook/facebook-server-a sync-task.php. ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **PixelYourSite - Unknown** Affected versions: - 10.1.1.1 (Status: affected) ### References 1. [](https://fluidattacks.com/advisories/skims-23/) 2. [](https://co.wordpress.org/plugins/pixelyoursite/#developers)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4246, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4246 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4246 - **State**: PUBLISHED - **Published Date**: August 08, 2007 at 23:00 UTC - **Last Updated**: August 07, 2024 at 14:46 UTC - **Reserved Date**: August 08, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability, possibly a buffer overflow, in Justsystem Ichitaro 2007 and earlier allows remote attackers to execute arbitrary code via a modified document, as actively exploited in August 2007 by malware such as Tarodrop.D (Tarodrop.Q), a different vulnerability than CVE-2006-4326, CVE-2006-5424, CVE-2006-6400, and CVE-2007-1938. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.symantec.com/enterprise/security_response/weblog/2007/08/unknown_exploit_compromises_ic.html) 2. [justsystems-unspecified-code-execution(35822)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35822) 3. [ADV-2007-2780](http://www.vupen.com/english/advisories/2007/2780) 4. [25187](http://www.securityfocus.com/bid/25187) 5. [](http://www.symantec.com/security_response/writeup.jsp?docid=2007-080210-4815-99) 6. [39393](http://osvdb.org/39393) 7. [](http://www.justsystem.co.jp/info/pd7003.html) 8. [26317](http://secunia.com/advisories/26317)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13762, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13762 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13762 - **State**: PUBLISHED - **Published Date**: June 02, 2020 at 19:25 UTC - **Last Updated**: August 04, 2024 at 12:25 UTC - **Reserved Date**: June 02, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Joomla! before 3.9.19, incorrect input validation of the module tag option in com_modules allows XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://developer.joomla.org/security-centre/815-20200603-core-xss-in-com-modules-tag-options)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30469, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30469 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30469 - **State**: PUBLISHED - **Published Date**: March 31, 2025 at 22:22 UTC - **Last Updated**: April 02, 2025 at 13:44 UTC - **Reserved Date**: March 22, 2025 at 00:04 UTC - **Assigned By**: apple ### Vulnerability Description This issue was addressed through improved state management. This issue is fixed in iOS 18.4 and iPadOS 18.4. A person with physical access to an iOS device may be able to access photos from the lock screen. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/122371)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2225, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2225 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2225 - **State**: PUBLISHED - **Published Date**: December 06, 2019 at 22:40 UTC - **Last Updated**: August 04, 2024 at 18:42 UTC - **Reserved Date**: December 10, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description When pairing with a Bluetooth device, it may be possible to pair a malicious device without any confirmation from the user, and that device may be able to interact with the phone. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-110433804 ### Affected Products **n/a - Android** Affected versions: - Android-8.0 Android-8.1 Android-9 Android-10 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2019-12-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7634, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7634 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7634 - **State**: PUBLISHED - **Published Date**: August 22, 2024 at 18:07 UTC - **Last Updated**: August 22, 2024 at 19:29 UTC - **Reserved Date**: August 08, 2024 at 23:25 UTC - **Assigned By**: f5 ### Vulnerability Description NGINX Agent's "config_dirs" restriction feature allows a highly privileged attacker to gain the ability to write/overwrite files outside of the designated secure directory. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **F5 - NGINX Agent** Affected versions: - 2.17.0 (Status: affected) ### References 1. [](https://my.f5.com/manage/s/article/K000140630) ### Credits - F5
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41943, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41943 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41943 - **State**: PUBLISHED - **Published Date**: December 12, 2022 at 00:00 UTC - **Last Updated**: April 22, 2025 at 20:13 UTC - **Reserved Date**: October 04, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Logrhythm Web Console 7.4.9 allows for HTML tag injection through Contextualize Action -> Create a new Contextualize Action -> Inject your HTML tag in the name field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://medium.com/%40idema16/how-i-found-a-cve-in-logrhythm-cve-2021-41943-61cef1797cb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2754, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2754 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2754 - **State**: PUBLISHED - **Published Date**: March 25, 2025 at 08:31 UTC - **Last Updated**: March 25, 2025 at 13:13 UTC - **Reserved Date**: March 24, 2025 at 16:47 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been declared as critical. Affected by this vulnerability is the function Assimp::AC3DImporter::ConvertObjectSection of the file code/AssetLib/AC/ACLoader.cpp of the component AC3D File Handler. The manipulation of the argument it leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow - CWE-119: Security Weakness ### Affected Products **Open Asset Import Library - Assimp** Affected versions: - 5.4.3 (Status: affected) ### References 1. [VDB-300859 | Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection heap-based overflow](https://vuldb.com/?id.300859) 2. [VDB-300859 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.300859) 3. [Submit #517788 | Open Asset Import Library Assimp >=5.4.3 Heap-based Buffer Overflow](https://vuldb.com/?submit.517788) 4. [](https://github.com/assimp/assimp/issues/6015) 5. [](https://github.com/assimp/assimp/issues/6015#issue-2877373501) ### Credits - d3ng03 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28368, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28368 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28368 - **State**: PUBLISHED - **Published Date**: April 11, 2023 at 00:00 UTC - **Last Updated**: February 10, 2025 at 20:54 UTC - **Reserved Date**: March 15, 2023 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description TP-Link L2 switch T2600G-28SQ firmware versions prior to 'T2600G-28SQ(UN)_V1_1.0.6 Build 20230227' uses vulnerable SSH host keys. A fake device may be prepared to spoof the affected device with the vulnerable host key.If the administrator may be tricked to login to the fake device, the credential information for the affected device may be obtained. ### Affected Products **TP-Link Corporation Limited - T2600G-28SQ** Affected versions: - firmware versions prior to 'T2600G-28SQ(UN)_V1_1.0.6 Build 20230227' (Status: affected) ### References 1. [](https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware) 2. [](https://jvn.jp/en/jp/JVN62420378/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32454 - **State**: PUBLISHED - **Published Date**: May 13, 2025 at 09:38 UTC - **Last Updated**: June 10, 2025 at 15:17 UTC - **Reserved Date**: April 08, 2025 at 15:46 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.14), Teamcenter Visualization V2312 (All versions < V2312.0010), Teamcenter Visualization V2406 (All versions < V2406.0008), Teamcenter Visualization V2412 (All versions < V2412.0004), Tecnomatix Plant Simulation V2404 (All versions < V2404.0013). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Siemens - Teamcenter Visualization V14.3** Affected versions: - 0 (Status: affected) **Siemens - Teamcenter Visualization V2312** Affected versions: - 0 (Status: affected) **Siemens - Teamcenter Visualization V2406** Affected versions: - 0 (Status: affected) **Siemens - Teamcenter Visualization V2412** Affected versions: - 0 (Status: affected) **Siemens - Tecnomatix Plant Simulation V2404** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-542540.html) 2. [](https://cert-portal.siemens.com/productcert/html/ssa-486186.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49918, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49918 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49918 - **State**: PUBLISHED - **Published Date**: October 21, 2024 at 18:01 UTC - **Last Updated**: May 04, 2025 at 09:41 UTC - **Reserved Date**: October 21, 2024 at 12:17 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer This commit addresses a potential null pointer dereference issue in the `dcn32_acquire_idle_pipe_for_head_pipe_in_layer` function. The issue could occur when `head_pipe` is null. The fix adds a check to ensure `head_pipe` is not null before asserting it. If `head_pipe` is null, the function returns NULL to prevent a potential null pointer dereference. Reported by smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn32/dcn32_resource.c:2690 dcn32_acquire_idle_pipe_for_head_pipe_in_layer() error: we previously assumed 'head_pipe' could be null (see line 2681) ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 6.10.14 (Status: unaffected) - 6.11.3 (Status: unaffected) - 6.12 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/4f47292f488fa7041284dca1f1244116c18721f1) 2. [](https://git.kernel.org/stable/c/96d4c2ee18d732a248d053aae8c4a27cb1d68d1c) 3. [](https://git.kernel.org/stable/c/ac2140449184a26eac99585b7f69814bd3ba8f2d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14134, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14134 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14134 - **State**: PUBLISHED - **Published Date**: April 16, 2020 at 10:46 UTC - **Last Updated**: August 05, 2024 at 00:12 UTC - **Reserved Date**: July 19, 2019 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Possible out of bound access in WLAN handler when the received value of length in rx path is shorter than the expected value of country IE in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ8074, QCA8081, QCS605, SDA845, SDM670, SDM710, SDM845, SDM850, SM6150, SM7150, SM8150, SXR1130 ### Affected Products **Qualcomm, Inc. - Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking** Affected versions: - IPQ8074, QCA8081, QCS605, SDA845, SDM670, SDM710, SDM845, SDM850, SM6150, SM7150, SM8150, SXR1130 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3583, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3583 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3583 - **State**: PUBLISHED - **Published Date**: July 05, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 14:21 UTC - **Reserved Date**: July 05, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in details_news.php in Girlserv ads 1.5 and earlier allows remote attackers to execute arbitrary SQL commands via the idnew parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [girlserv-detailsnews-sql-injection(35253)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35253) 2. [36365](http://osvdb.org/36365) 3. [24755](http://www.securityfocus.com/bid/24755) 4. [ADV-2007-2434](http://www.vupen.com/english/advisories/2007/2434) 5. [4142](https://www.exploit-db.com/exploits/4142) 6. [25925](http://secunia.com/advisories/25925)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-56614, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-56614 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-56614 - **State**: PUBLISHED - **Published Date**: December 27, 2024 at 14:51 UTC - **Last Updated**: May 04, 2025 at 09:59 UTC - **Reserved Date**: December 27, 2024 at 14:03 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: xsk: fix OOB map writes when deleting elements Jordy says: " In the xsk_map_delete_elem function an unsigned integer (map->max_entries) is compared with a user-controlled signed integer (k). Due to implicit type conversion, a large unsigned value for map->max_entries can bypass the intended bounds check: if (k >= map->max_entries) return -EINVAL; This allows k to hold a negative value (between -2147483648 and -2), which is then used as an array index in m->xsk_map[k], which results in an out-of-bounds access. spin_lock_bh(&m->lock); map_entry = &m->xsk_map[k]; // Out-of-bounds map_entry old_xs = unrcu_pointer(xchg(map_entry, NULL)); // Oob write if (old_xs) xsk_map_sock_delete(old_xs, map_entry); spin_unlock_bh(&m->lock); The xchg operation can then be used to cause an out-of-bounds write. Moreover, the invalid map_entry passed to xsk_map_sock_delete can lead to further memory corruption. " It indeed results in following splat: [76612.897343] BUG: unable to handle page fault for address: ffffc8fc2e461108 [76612.904330] #PF: supervisor write access in kernel mode [76612.909639] #PF: error_code(0x0002) - not-present page [76612.914855] PGD 0 P4D 0 [76612.917431] Oops: Oops: 0002 [#1] PREEMPT SMP [76612.921859] CPU: 11 UID: 0 PID: 10318 Comm: a.out Not tainted 6.12.0-rc1+ #470 [76612.929189] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019 [76612.939781] RIP: 0010:xsk_map_delete_elem+0x2d/0x60 [76612.944738] Code: 00 00 41 54 55 53 48 63 2e 3b 6f 24 73 38 4c 8d a7 f8 00 00 00 48 89 fb 4c 89 e7 e8 2d bf 05 00 48 8d b4 eb 00 01 00 00 31 ff <48> 87 3e 48 85 ff 74 05 e8 16 ff ff ff 4c 89 e7 e8 3e bc 05 00 31 [76612.963774] RSP: 0018:ffffc9002e407df8 EFLAGS: 00010246 [76612.969079] RAX: 0000000000000000 RBX: ffffc9002e461000 RCX: 0000000000000000 [76612.976323] RDX: 0000000000000001 RSI: ffffc8fc2e461108 RDI: 0000000000000000 [76612.983569] RBP: ffffffff80000001 R08: 0000000000000000 R09: 0000000000000007 [76612.990812] R10: ffffc9002e407e18 R11: ffff888108a38858 R12: ffffc9002e4610f8 [76612.998060] R13: ffff888108a38858 R14: 00007ffd1ae0ac78 R15: ffffc9002e4610c0 [76613.005303] FS: 00007f80b6f59740(0000) GS:ffff8897e0ec0000(0000) knlGS:0000000000000000 [76613.013517] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [76613.019349] CR2: ffffc8fc2e461108 CR3: 000000011e3ef001 CR4: 00000000007726f0 [76613.026595] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [76613.033841] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [76613.041086] PKRU: 55555554 [76613.043842] Call Trace: [76613.046331] <TASK> [76613.048468] ? __die+0x20/0x60 [76613.051581] ? page_fault_oops+0x15a/0x450 [76613.055747] ? search_extable+0x22/0x30 [76613.059649] ? search_bpf_extables+0x5f/0x80 [76613.063988] ? exc_page_fault+0xa9/0x140 [76613.067975] ? asm_exc_page_fault+0x22/0x30 [76613.072229] ? xsk_map_delete_elem+0x2d/0x60 [76613.076573] ? xsk_map_delete_elem+0x23/0x60 [76613.080914] __sys_bpf+0x19b7/0x23c0 [76613.084555] __x64_sys_bpf+0x1a/0x20 [76613.088194] do_syscall_64+0x37/0xb0 [76613.091832] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [76613.096962] RIP: 0033:0x7f80b6d1e88d [76613.100592] Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 b5 0f 00 f7 d8 64 89 01 48 [76613.119631] RSP: 002b:00007ffd1ae0ac68 EFLAGS: 00000206 ORIG_RAX: 0000000000000141 [76613.131330] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f80b6d1e88d [76613.142632] RDX: 0000000000000098 RSI: 00007ffd1ae0ad20 RDI: 0000000000000003 [76613.153967] RBP: 00007ffd1ae0adc0 R08: 0000000000000000 R09: 0000000000000000 [76613.166030] R10: 00007f80b6f77040 R11: 0000000000000206 R12: 00007ffd1ae0aed8 [76613.177130] R13: 000055ddf42ce1e9 R14: 000055ddf42d0d98 R15: 00 ---truncated--- ### Affected Products **Linux - Linux** Affected versions: - fbfc504a24f53f7ebe128ab55cb5dba634f4ece8 (Status: affected) - fbfc504a24f53f7ebe128ab55cb5dba634f4ece8 (Status: affected) - fbfc504a24f53f7ebe128ab55cb5dba634f4ece8 (Status: affected) - fbfc504a24f53f7ebe128ab55cb5dba634f4ece8 (Status: affected) - fbfc504a24f53f7ebe128ab55cb5dba634f4ece8 (Status: affected) **Linux - Linux** Affected versions: - 4.18 (Status: affected) - 0 (Status: unaffected) - 5.15.174 (Status: unaffected) - 6.1.120 (Status: unaffected) - 6.6.66 (Status: unaffected) - 6.12.5 (Status: unaffected) - 6.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/4d03f705e9d7aabebc6bfa5810f8aab6d176cbb7) 2. [](https://git.kernel.org/stable/c/ed08c93d5a9801cc8f224a046411fd603c538d07) 3. [](https://git.kernel.org/stable/c/f8abd03f83d5fe81e76eb93e2c4373eb9f75fd8a) 4. [](https://git.kernel.org/stable/c/d486b5741d987d3e0e6be4ac22cafdf94e6d1a47) 5. [](https://git.kernel.org/stable/c/32cd3db7de97c0c7a018756ce66244342fd583f0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24140, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24140 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24140 - **State**: PUBLISHED - **Published Date**: March 18, 2021 at 14:57 UTC - **Last Updated**: August 03, 2024 at 19:21 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description Unvalidated input in the Ajax Load More WordPress plugin, versions before 5.3.2, lead to SQL Injection in POST /wp-admin/admin-ajax.php with param repeater=' or sleep(5)#&type=test. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Unknown - Ajax Load More** Affected versions: - 5.3.2 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056) ### Credits - Nguyen Khanh
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5682, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5682 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5682 - **State**: PUBLISHED - **Published Date**: January 13, 2018 at 05:00 UTC - **Last Updated**: August 05, 2024 at 05:40 UTC - **Reserved Date**: January 12, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PrestaShop 1.7.2.4 allows user enumeration via the Reset Password feature, by noticing which reset attempts do not produce a "This account does not exist" error message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://forge.prestashop.com/browse/BOOM-4613)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13298, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13298 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13298 - **State**: PUBLISHED - **Published Date**: September 14, 2020 at 21:44 UTC - **Last Updated**: August 04, 2024 at 12:11 UTC - **Reserved Date**: May 21, 2020 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. Conan package upload functionality was not properly validating the supplied parameters, which resulted in the limited files disclosure. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **GitLab - GitLab** Affected versions: - >=13.3, <13.3.4 (Status: affected) - >=13.2, <13.2.8 (Status: affected) - >=13.1, <13.1.10 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/228841) 2. [](https://hackerone.com/reports/923027) 3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13298.json) ### Credits - Thanks [ledz1996](https://hackerone.com/ledz1996) for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30193 - **State**: PUBLISHED - **Published Date**: May 20, 2025 at 11:17 UTC - **Last Updated**: May 20, 2025 at 13:16 UTC - **Reserved Date**: March 18, 2025 at 08:39 UTC - **Assigned By**: OX ### Vulnerability Description In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.10 version. A workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting. We would like to thank Renaud Allard for bringing this issue to our attention. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-674: Security Weakness ### Affected Products **PowerDNS - DNSdist** Affected versions: - 1.9.10 (Status: unaffected) ### References 1. [](https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-03.html) ### Credits - Renaud Allard
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6906, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6906 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6906 - **State**: PUBLISHED - **Published Date**: August 06, 2009 at 17:00 UTC - **Last Updated**: August 07, 2024 at 11:49 UTC - **Reserved Date**: August 06, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in index.php in BabbleBoard 1.1.6 allows remote attackers to inject arbitrary web script or HTML via the username. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [babbleboard-username-xss(47403)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47403) 2. [7475](https://www.exploit-db.com/exploits/7475) 3. [32840](http://www.securityfocus.com/bid/32840)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7838, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7838 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7838 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 16:19 UTC - **Reserved Date**: April 12, 2017 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description Punycode format text will be displayed for entire qualified international domain names in some instances when a sub-domain triggers the punycode display instead of the primary domain being displayed in native script and the sub-domain only displaying as punycode. This could be used for limited spoofing attacks due to user confusion. This vulnerability affects Firefox < 57. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2017-24/) 2. [101832](http://www.securityfocus.com/bid/101832) 3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1399540) 4. [1039803](http://www.securitytracker.com/id/1039803)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3866, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3866 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3866 - **State**: PUBLISHED - **Published Date**: November 05, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 06:45 UTC - **Reserved Date**: November 05, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [36881](http://www.securityfocus.com/bid/36881) 2. [](http://support.apple.com/kb/HT3970) 3. [HPSBMU02799](http://marc.info/?l=bugtraq&m=134254866602253&w=2) 4. [](http://support.apple.com/kb/HT3969) 5. [GLSA-200911-02](http://security.gentoo.org/glsa/glsa-200911-02.xml) 6. [RHSA-2009:1694](http://www.redhat.com/support/errata/RHSA-2009-1694.html) 7. [APPLE-SA-2009-12-03-1](http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html) 8. [37231](http://secunia.com/advisories/37231) 9. [SUSE-SA:2009:058](http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html) 10. [oval:org.mitre.oval:def:6635](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6635) 11. [ADV-2009-3131](http://www.vupen.com/english/advisories/2009/3131) 12. [APPLE-SA-2009-12-03-2](http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html) 13. [37581](http://secunia.com/advisories/37581) 14. [](http://java.sun.com/javase/6/webnotes/6u17.html) 15. [37841](http://secunia.com/advisories/37841) 16. [](http://zerodayinitiative.com/advisories/ZDI-09-077/) 17. [269870](http://sunsolve.sun.com/search/document.do?assetkey=1-66-269870-1) 18. [37239](http://secunia.com/advisories/37239) 19. [37386](http://secunia.com/advisories/37386)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2958, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2958 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2958 - **State**: PUBLISHED - **Published Date**: November 30, 2016 at 11:00 UTC - **Last Updated**: August 05, 2024 at 23:40 UTC - **Reserved Date**: March 09, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Connections 4.0 through CR4, 4.5 through CR5, and 5.0 before CR4 allows remote authenticated users to obtain sensitive information by reading an "archaic" e-mail address in a response. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21990864) 2. [94328](http://www.securityfocus.com/bid/94328) 3. [LO90039](http://www-01.ibm.com/support/docview.wss?uid=swg1LO90039) 4. [1039231](http://www.securitytracker.com/id/1039231)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1449 - **State**: PUBLISHED - **Published Date**: March 21, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 19:01 UTC - **Reserved Date**: February 29, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The CAB file parser in NOD32 Antivirus 5795 and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a CAB file with a modified vMajor field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products](http://www.securityfocus.com/archive/1/522005) 2. [](http://www.ieee-security.org/TC/SP2012/program.html) 3. [52616](http://www.securityfocus.com/bid/52616)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1044, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1044 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1044 - **State**: PUBLISHED - **Published Date**: February 21, 2007 at 17:00 UTC - **Last Updated**: August 07, 2024 at 12:43 UTC - **Reserved Date**: February 21, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Pearson Education PowerSchool 4.3.6 allows remote attackers to list the contents of the admin folder via a URI composed of the admin/ directory name and an arbitrary filename ending in ".js." NOTE: it was later reported that this issue had been addressed by 5.1.2. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33741](http://osvdb.org/33741) 2. [2276](http://securityreason.com/securityalert/2276) 3. [powerschool-js-information-disclosure(32569)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32569) 4. [20071204 Re: Powerschool 404 Admin Exposure](http://www.securityfocus.com/archive/1/484569/100/200/threaded) 5. [22611](http://www.securityfocus.com/bid/22611) 6. [20070219 Powerschool 404 Admin Exposure](http://www.securityfocus.com/archive/1/460533/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52467, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52467 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52467 - **State**: PUBLISHED - **Published Date**: February 25, 2024 at 08:16 UTC - **Last Updated**: May 04, 2025 at 07:37 UTC - **Reserved Date**: February 20, 2024 at 12:30 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: mfd: syscon: Fix null pointer dereference in of_syscon_register() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. ### Affected Products **Linux - Linux** Affected versions: - e15d7f2b81d2e7d93115d46fa931b366c1cdebc2 (Status: affected) - e15d7f2b81d2e7d93115d46fa931b366c1cdebc2 (Status: affected) - e15d7f2b81d2e7d93115d46fa931b366c1cdebc2 (Status: affected) - e15d7f2b81d2e7d93115d46fa931b366c1cdebc2 (Status: affected) - e15d7f2b81d2e7d93115d46fa931b366c1cdebc2 (Status: affected) - e15d7f2b81d2e7d93115d46fa931b366c1cdebc2 (Status: affected) **Linux - Linux** Affected versions: - 5.9 (Status: affected) - 0 (Status: unaffected) - 5.10.209 (Status: unaffected) - 5.15.148 (Status: unaffected) - 6.1.75 (Status: unaffected) - 6.6.14 (Status: unaffected) - 6.7.2 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/927626a2073887ee30ba00633260d4d203f8e875) 2. [](https://git.kernel.org/stable/c/c3e3a2144bf50877551138ffce9f7aa6ddfe385b) 3. [](https://git.kernel.org/stable/c/527e8c5f3d00299822612c495d5adf1f8f43c001) 4. [](https://git.kernel.org/stable/c/3ef1130deee98997275904d9bfc37af75e1e906c) 5. [](https://git.kernel.org/stable/c/7f2c410ac470959b88e03dadd94b7a0b71df7973) 6. [](https://git.kernel.org/stable/c/41673c66b3d0c09915698fec5c13b24336f18dd1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4529, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4529 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4529 - **State**: PUBLISHED - **Published Date**: November 04, 2014 at 21:00 UTC - **Last Updated**: August 06, 2024 at 16:45 UTC - **Reserved Date**: June 12, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Buffer overflow in hw/pci/pcie_aer.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released](http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html) 2. [RHSA-2014:0927](http://rhn.redhat.com/errata/RHSA-2014-0927.html) 3. [[Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues](http://lists.gnu.org/archive/html/qemu-devel/2013-12/msg00394.html) 4. [FEDORA-2014-6288](http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4124 - **State**: PUBLISHED - **Published Date**: August 14, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 18:57 UTC - **Reserved Date**: August 14, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The libXm library in LessTif 0.95.0 and earlier allows local users to gain privileges via the DEBUG_FILE environment variable, which is used to create world-writable files when libXm is run from a setuid program. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2144](https://www.exploit-db.com/exploits/2144) 2. [19430](http://www.securityfocus.com/bid/19430) 3. [](http://karol.wiesek.pl/files/lesstif-advisory.pdf) 4. [ADV-2006-3230](http://www.vupen.com/english/advisories/2006/3230) 5. [21428](http://secunia.com/advisories/21428) 6. [lestif-libxm-privilege-escalation(28298)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28298)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1927, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1927 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1927 - **State**: PUBLISHED - **Published Date**: April 01, 2020 at 23:08 UTC - **Last Updated**: August 04, 2024 at 06:53 UTC - **Reserved Date**: December 02, 2019 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL. ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **Apache - Apache HTTP Server** Affected versions: - 2.4.0 to 2.4.41 (Status: affected) ### References 1. [[oss-security] 20200403 Re: CVE-2020-1927: mod_rewrite configurations vulnerable to open redirect](http://www.openwall.com/lists/oss-security/2020/04/03/1) 2. [[oss-security] 20200403 Re: CVE-2020-1927: mod_rewrite configurations vulnerable to open redirect](http://www.openwall.com/lists/oss-security/2020/04/04/1) 3. [[httpd-dev] 20200404 Odd vulnerabilities_24.html output](https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E) 4. [[httpd-dev] 20200404 Re: Odd vulnerabilities_24.html output](https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E) 5. [[httpd-cvs] 20200411 svn commit: r1876405 - in /httpd/test/framework/trunk/t: conf/core.conf.in security/CVE-2020-1927.t](https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E) 6. [[httpd-cvs] 20200412 svn commit: r1876426 - /httpd/test/framework/trunk/t/security/CVE-2020-1927.t](https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E) 7. [openSUSE-SU-2020:0597](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html) 8. [](https://www.oracle.com/security-alerts/cpujul2020.html) 9. [](https://httpd.apache.org/security/vulnerabilities_24.html) 10. [](https://security.netapp.com/advisory/ntap-20200413-0002/) 11. [USN-4458-1](https://usn.ubuntu.com/4458-1/) 12. [FEDORA-2020-189a1e6c3e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/) 13. [DSA-4757](https://www.debian.org/security/2020/dsa-4757) 14. [FEDORA-2020-0d3d3f5072](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/) 15. [[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E) 16. [[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/](https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E) 17. [[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/](https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E) 18. [[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E) 19. [[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E) 20. [[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E) 21. [[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E) 22. [[httpd-cvs] 20210330 svn commit: r1073158 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-1927.json security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E) 23. [[httpd-cvs] 20210330 svn commit: r1888215 - /httpd/site/trunk/content/security/json/CVE-2020-1927.json](https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E) 24. [[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E) 25. [](https://www.oracle.com/security-alerts/cpuApr2021.html) 26. [[debian-lts-announce] 20210709 [SECURITY] [DLA 2706-1] apache2 security update](https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html) 27. [](https://www.oracle.com/security-alerts/cpujul2022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5805, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5805 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5805 - **State**: PUBLISHED - **Published Date**: February 15, 2018 at 22:00 UTC - **Last Updated**: September 17, 2024 at 03:44 UTC - **Reserved Date**: February 01, 2017 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.2 was found. ### Affected Products **Hewlett Packard Enterprise - Intelligent Management Center (iMC) PLAT** Affected versions: - v7.2 (Status: affected) ### References 1. [1038377](http://www.securitytracker.com/id/1038377) 2. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03738en_us) 3. [98088](http://www.securityfocus.com/bid/98088)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0965, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0965 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0965 - **State**: PUBLISHED - **Published Date**: February 10, 2016 at 20:00 UTC - **Last Updated**: August 05, 2024 at 22:38 UTC - **Reserved Date**: December 22, 2015 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SU-2016:0400](http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html) 2. [1034970](http://www.securitytracker.com/id/1034970) 3. [GLSA-201603-07](https://security.gentoo.org/glsa/201603-07) 4. [RHSA-2016:0166](http://rhn.redhat.com/errata/RHSA-2016-0166.html) 5. [openSUSE-SU-2016:0415](http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html) 6. [openSUSE-SU-2016:0412](http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html) 7. [39460](https://www.exploit-db.com/exploits/39460/) 8. [](https://helpx.adobe.com/security/products/flash-player/apsb16-04.html) 9. [SUSE-SU-2016:0398](http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3474 - **State**: PUBLISHED - **Published Date**: August 12, 2012 at 21:00 UTC - **Last Updated**: September 17, 2024 at 02:48 UTC - **Reserved Date**: June 14, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The comments API in application/libraries/api/MY_Comments_Api_Object.php in the Ushahidi Platform before 2.5 allows remote attackers to obtain sensitive information about the e-mail address, IP address, and other attributes of the author of a comment via an API function call. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20120809 Re: CVE request for Ushahidi](http://openwall.com/lists/oss-security/2012/08/09/5) 2. [](https://github.com/ushahidi/Ushahidi_Web/commit/529f353)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2147, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2147 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2147 - **State**: REJECTED - **Published Date**: January 22, 2019 at 20:00 UTC - **Last Updated**: January 22, 2019 at 17:57 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3079, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3079 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3079 - **State**: PUBLISHED - **Published Date**: June 06, 2007 at 10:00 UTC - **Last Updated**: August 07, 2024 at 14:05 UTC - **Reserved Date**: June 05, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description listmembers.php in EQdkp 1.3.2c and earlier allows remote attackers to obtain sensitive information via an invalid compare parameter, which reveals the path. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [eqdkp-listmembers-information-disclosure(34694)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34694) 2. [20070604 Full Path Disclosure eqDKP 1.3.2c and prior](http://marc.info/?l=full-disclosure&m=118093304724372&w=2) 3. [38363](http://osvdb.org/38363)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6514, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6514 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6514 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 04, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7027, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7027 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7027 - **State**: PUBLISHED - **Published Date**: May 24, 2019 at 18:00 UTC - **Last Updated**: August 04, 2024 at 20:38 UTC - **Reserved Date**: January 28, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-07.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2436, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2436 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2436 - **State**: PUBLISHED - **Published Date**: April 09, 2024 at 18:58 UTC - **Last Updated**: August 01, 2024 at 19:11 UTC - **Reserved Date**: March 13, 2024 at 19:24 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Lightweight Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.5.16 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **someguy9 - Lightweight Accordion** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/545dae6b-7983-4f02-a9a0-0be8cf935a78?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/lightweight-accordion/trunk/lightweight-accordion.php#L39) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3056945@lightweight-accordion/trunk&old=2889281@lightweight-accordion/trunk&sfp_email=&sfph_mail=) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6119, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6119 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6119 - **State**: PUBLISHED - **Published Date**: November 26, 2006 at 22:00 UTC - **Last Updated**: August 07, 2024 at 20:12 UTC - **Reserved Date**: November 26, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description mmgallery 1.55 allows remote attackers to obtain sensitive information via a direct request for thumbs.php, which reveals the installation path in various error messages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1917](http://securityreason.com/securityalert/1917) 2. [1017283](http://securitytracker.com/id?1017283) 3. [20061124 mmgallery Multiple vulnerabilities](http://www.securityfocus.com/archive/1/452558/100/0/threaded) 4. [23130](http://secunia.com/advisories/23130)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20892, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20892 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20892 - **State**: PUBLISHED - **Published Date**: June 25, 2020 at 09:07 UTC - **Last Updated**: August 05, 2024 at 02:53 UTC - **Reserved Date**: June 25, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description net-snmp before 5.8.1.pre1 has a double free in usm_free_usmStateReference in snmplib/snmpusm.c via an SNMPv3 GetBulk request. NOTE: this affects net-snmp packages shipped to end users by multiple Linux distributions, but might not affect an upstream release. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.launchpad.net/ubuntu/+source/net-snmp/+bug/1877027) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1663027) 3. [](https://sourceforge.net/p/net-snmp/bugs/2923/) 4. [](https://github.com/net-snmp/net-snmp/commit/5f881d3bf24599b90d67a45cae7a3eb099cd71c9) 5. [[oss-security] 20200625 [cve-request@...re.org: Re: [scr916814] net-snmp - Perhaps only unreleased development versions; fix appears to be in v5.8.1.pre1]](http://www.openwall.com/lists/oss-security/2020/06/25/4) 6. [USN-4410-1](https://usn.ubuntu.com/4410-1/) 7. [GLSA-202008-12](https://security.gentoo.org/glsa/202008-12) 8. [](https://www.oracle.com/security-alerts/cpujan2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11336, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11336 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11336 - **State**: PUBLISHED - **Published Date**: May 14, 2019 at 13:57 UTC - **Last Updated**: August 04, 2024 at 22:48 UTC - **Reserved Date**: April 18, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Sony Bravia Smart TV devices allow remote attackers to retrieve the static Wi-Fi password (used when the TV is acting as an access point) by using the Photo Sharing Plus application to execute a backdoor API command, a different vulnerability than CVE-2019-10886. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20190423 Multiple vulnerabilities in Sony Smart TVs](http://seclists.org/fulldisclosure/2019/Apr/32) 2. [](http://packetstormsecurity.com/files/152612/Sony-Smart-TV-Information-Disclosure-File-Read.html) 3. [20190424 Multiple vulnerabilities in Sony Smart TVs](https://seclists.org/bugtraq/2019/Apr/34) 4. [108072](http://www.securityfocus.com/bid/108072) 5. [](https://www.darkmatter.ae/xen1thlabs/sony-smart-tv-photo-sharing-plus-information-disclosure-vulnerability-xl-19-003/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28692, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28692 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28692 - **State**: PUBLISHED - **Published Date**: August 30, 2023 at 15:27 UTC - **Last Updated**: February 19, 2025 at 21:25 UTC - **Reserved Date**: March 21, 2023 at 07:14 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kevon Adonis WP Abstracts plugin <= 2.6.3 versions. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Kevon Adonis - WP Abstracts** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-abstracts-manuscripts-manager/wordpress-wp-abstracts-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - qilin_99 (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-20901, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-20901 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-20901 - **State**: REJECTED - **Published Date**: September 20, 2021 at 15:20 UTC - **Last Updated**: September 27, 2021 at 15:51 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22997, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22997 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22997 - **State**: PUBLISHED - **Published Date**: March 31, 2021 at 17:35 UTC - **Last Updated**: August 03, 2024 at 18:58 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description On all 7.x and 6.x versions (fixed in 8.0.0), BIG-IQ HA ElasticSearch service does not implement any form of authentication for the clustering transport services, and all data used by ElasticSearch for transport is unencrypted. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. ### Affected Products **n/a - BIG-IQ** Affected versions: - All 7.x and 6.x versions (Status: affected) ### References 1. [](https://support.f5.com/csp/article/K34074377)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1677, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1677 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1677 - **State**: PUBLISHED - **Published Date**: June 05, 2016 at 23:00 UTC - **Last Updated**: August 05, 2024 at 23:02 UTC - **Reserved Date**: January 12, 2016 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://crbug.com/602970) 2. [90876](http://www.securityfocus.com/bid/90876) 3. [](https://codereview.chromium.org/1936083002) 4. [openSUSE-SU-2016:1496](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html) 5. [1035981](http://www.securitytracker.com/id/1035981) 6. [DSA-3590](http://www.debian.org/security/2016/dsa-3590) 7. [](http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html) 8. [USN-2992-1](http://www.ubuntu.com/usn/USN-2992-1) 9. [openSUSE-SU-2016:1430](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html) 10. [RHSA-2016:1190](https://access.redhat.com/errata/RHSA-2016:1190) 11. [GLSA-201607-07](https://security.gentoo.org/glsa/201607-07) 12. [openSUSE-SU-2016:1433](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0749, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0749 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0749 - **State**: PUBLISHED - **Published Date**: March 02, 2009 at 20:00 UTC - **Last Updated**: August 07, 2024 at 04:48 UTC - **Reserved Date**: March 02, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Use-after-free vulnerability in the GIFReadNextExtension function in lib/pngxtern/gif/gifread.c in OptiPNG 0.6.2 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted GIF image that causes the realloc function to return a new pointer, which triggers memory corruption when the old pointer is accessed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [34201](http://secunia.com/advisories/34201) 2. [34259](http://secunia.com/advisories/34259) 3. [34035](http://secunia.com/advisories/34035) 4. [33873](http://www.securityfocus.com/bid/33873) 5. [SUSE-SR:2009:006](http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html) 6. [ADV-2009-0510](http://www.vupen.com/english/advisories/2009/0510) 7. [](http://optipng.sourceforge.net) 8. [](http://sourceforge.net/tracker/index.php?func=detail&aid=2582013&group_id=151404&atid=780913) 9. [35685](http://secunia.com/advisories/35685) 10. [SUSE-SR:2009:012](http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html) 11. [[oss-security] 20090224 CVE request: optipng security release](http://www.openwall.com/lists/oss-security/2009/02/24/2) 12. [[oss-security] 20090225 Re: CVE request: optipng security release](http://www.openwall.com/lists/oss-security/2009/02/25/4) 13. [GLSA-200903-12](http://www.gentoo.org/security/en/glsa/glsa-200903-12.xml) 14. [optipng-gifreadnextextension-code-execution(48879)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48879)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38163, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38163 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38163 - **State**: PUBLISHED - **Published Date**: September 14, 2021 at 11:21 UTC - **Last Updated**: January 29, 2025 at 20:20 UTC - **Reserved Date**: August 07, 2021 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable. ### CVSS Metrics - **CVSS Base Score**: 9.9/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Affected Products **SAP SE - SAP NetWeaver (Visual Composer 7.0 RT)** Affected versions: - 7.30 (Status: affected) - 7.31 (Status: affected) - 7.40 (Status: affected) - 7.50 (Status: affected) ### References 1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405) 2. [](https://launchpad.support.sap.com/#/notes/3084487)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4717, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4717 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4717 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0635, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0635 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0635 - **State**: PUBLISHED - **Published Date**: January 14, 2020 at 23:11 UTC - **Last Updated**: August 04, 2024 at 06:11 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An elevation of privilege vulnerability exists in Microsoft Windows when Windows fails to properly handle certain symbolic links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0644. ### Affected Products **Microsoft - Windows** Affected versions: - 10 Version 1803 for 32-bit Systems (Status: affected) - 10 Version 1803 for x64-based Systems (Status: affected) - 10 Version 1803 for ARM64-based Systems (Status: affected) - 10 Version 1809 for 32-bit Systems (Status: affected) - 10 Version 1809 for x64-based Systems (Status: affected) - 10 Version 1809 for ARM64-based Systems (Status: affected) - 10 Version 1709 for 32-bit Systems (Status: affected) - 10 Version 1709 for x64-based Systems (Status: affected) - 10 Version 1709 for ARM64-based Systems (Status: affected) - 10 for 32-bit Systems (Status: affected) - 10 for x64-based Systems (Status: affected) - 10 Version 1607 for 32-bit Systems (Status: affected) - 10 Version 1607 for x64-based Systems (Status: affected) - 7 for 32-bit Systems Service Pack 1 (Status: affected) - 7 for x64-based Systems Service Pack 1 (Status: affected) - 8.1 for 32-bit systems (Status: affected) - 8.1 for x64-based systems (Status: affected) - RT 8.1 (Status: affected) **Microsoft - Windows Server** Affected versions: - version 1803 (Core Installation) (Status: affected) - 2019 (Status: affected) - 2019 (Core installation) (Status: affected) - 2016 (Status: affected) - 2016 (Core installation) (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected) - 2008 for Itanium-Based Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected) - 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected) - 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected) - 2012 (Status: affected) - 2012 (Core installation) (Status: affected) - 2012 R2 (Status: affected) - 2012 R2 (Core installation) (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0635) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-143/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5629 - **State**: PUBLISHED - **Published Date**: December 17, 2008 at 17:00 UTC - **Last Updated**: August 07, 2024 at 10:56 UTC - **Reserved Date**: December 17, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in Turnkey Arcade Script allows remote attackers to execute arbitrary SQL commands via the id parameter in a play action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [7256](https://www.exploit-db.com/exploits/7256) 2. [arcadescript-index-sql-injection(46935)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46935) 3. [32890](http://secunia.com/advisories/32890) 4. [32511](http://www.securityfocus.com/bid/32511)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35908, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35908 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35908 - **State**: PUBLISHED - **Published Date**: September 29, 2023 at 00:00 UTC - **Last Updated**: September 23, 2024 at 16:52 UTC - **Reserved Date**: July 15, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cambium Enterprise Wi-Fi System Software before 6.4.2 does not sanitize the ping host argument in device-agent. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.cambiumnetworks.com/support/security/) 2. [](https://community.cambiumnetworks.com/t/enterprise-wi-fi-system-software-release-6-4-2/87229)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16458, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16458 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16458 - **State**: PUBLISHED - **Published Date**: September 04, 2018 at 11:00 UTC - **Last Updated**: August 05, 2024 at 10:24 UTC - **Reserved Date**: September 04, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in baigo CMS v2.1.1. There is an index.php?m=article&c=request CSRF that can cause publication of any article. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/baigoStudio/baigoCMS/issues/5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33174, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33174 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33174 - **State**: PUBLISHED - **Published Date**: July 11, 2023 at 17:02 UTC - **Last Updated**: January 01, 2025 at 01:51 UTC - **Reserved Date**: May 17, 2023 at 21:16 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Cryptographic Information Disclosure Vulnerability ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Cryptographic Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33174)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-29648, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-29648 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-29648 - **State**: PUBLISHED - **Published Date**: April 16, 2025 at 00:00 UTC - **Last Updated**: April 23, 2025 at 23:38 UTC - **Reserved Date**: March 11, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection vulnerability exists in the TP-Link EAP120 router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the login fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29648)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-37935, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-37935 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-37935 - **State**: PUBLISHED - **Published Date**: February 18, 2023 at 01:27 UTC - **Last Updated**: March 12, 2025 at 17:43 UTC - **Reserved Date**: August 08, 2022 at 18:49 UTC - **Assigned By**: hpe ### Vulnerability Description HPE OneView for VMware vCenter, in certain circumstances, may disclose the “HPE OneView” Username and Password. ### Affected Products **Hewlett Packard Enterprise (HPE) - HPE OneView for VMware vCenter,** Affected versions: - 9.6 (Status: affected) ### References 1. [](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04449en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14465, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14465 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14465 - **State**: PUBLISHED - **Published Date**: October 03, 2019 at 15:15 UTC - **Last Updated**: August 05, 2024 at 09:29 UTC - **Reserved Date**: July 20, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print(). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES) 2. [](https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739) 3. [[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update](https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html) 4. [openSUSE-SU-2019:2344](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html) 5. [openSUSE-SU-2019:2348](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html) 6. [20191021 [SECURITY] [DSA 4547-1] tcpdump security update](https://seclists.org/bugtraq/2019/Oct/28) 7. [DSA-4547](https://www.debian.org/security/2019/dsa-4547) 8. [FEDORA-2019-85d92df70f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/) 9. [FEDORA-2019-d06bc63433](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/) 10. [FEDORA-2019-6db0d5b9d9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/) 11. [](https://support.apple.com/kb/HT210788) 12. [20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra](https://seclists.org/bugtraq/2019/Dec/23) 13. [20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra](http://seclists.org/fulldisclosure/2019/Dec/26) 14. [](https://security.netapp.com/advisory/ntap-20200120-0001/) 15. [USN-4252-2](https://usn.ubuntu.com/4252-2/) 16. [USN-4252-1](https://usn.ubuntu.com/4252-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2090 - **State**: PUBLISHED - **Published Date**: January 20, 2021 at 14:50 UTC - **Last Updated**: September 26, 2024 at 18:18 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Email Center product of Oracle E-Business Suite (component: Message Display). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N` ### Affected Products **Oracle Corporation - Email Center** Affected versions: - 12.1.1-12.1.3 (Status: affected) - 12.2.3-12.2.10 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31149, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31149 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31149 - **State**: PUBLISHED - **Published Date**: May 10, 2023 at 19:20 UTC - **Last Updated**: January 27, 2025 at 18:18 UTC - **Reserved Date**: April 24, 2023 at 23:19 UTC - **Assigned By**: SEL ### Vulnerability Description An Improper Input Validation vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to execute arbitrary code. See SEL Service Bulletin dated 2022-11-15 for more details. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Schweitzer Engineering Laboratories - SEL-3505** Affected versions: - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3505-3** Affected versions: - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3530** Affected versions: - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3530-4** Affected versions: - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3532** Affected versions: - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3555** Affected versions: - R134-V0 (Status: affected) - R134-V0 (Status: affected) - R134-V0 (Status: affected) - R134-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3560S** Affected versions: - R144-V2 (Status: affected) - R144-V2 (Status: affected) - R144-V2 (Status: affected) - R144-V2 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3560E** Affected versions: - R144-V2 (Status: affected) - R144-V2 (Status: affected) - R144-V2 (Status: affected) - R144-V2 (Status: affected) **Schweitzer Engineering Laboratories - SEL-2241 RTAC module** Affected versions: - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3350** Affected versions: - R148-V0 (Status: affected) - R148-V0 (Status: affected) - R148-V0 (Status: affected) ### References 1. [](https://selinc.com/support/security-notifications/external-reports/) 2. [](https://www.nozominetworks.com/blog/) ### Credits - Andrea Palanca, Nozomi Networks
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000210 - **State**: PUBLISHED - **Published Date**: November 17, 2017 at 01:00 UTC - **Last Updated**: September 16, 2024 at 16:22 UTC - **Reserved Date**: November 16, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description picoTCP (versions 1.7.0 - 1.5.0) is vulnerable to stack buffer overflow resulting in code execution or denial of service attack ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/tass-belgium/picotcp/pull/473)