System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44557
- **State**: PUBLISHED
- **Published Date**: August 26, 2024 at 00:00 UTC
- **Last Updated**: August 26, 2024 at 19:07 UTC
- **Reserved Date**: August 21, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function setIptvInfo.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-setIptvInfo-5aee8fa8b7754d319ee35027d3628f2e?pvs=4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4999, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4999
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 23, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23893
- **State**: PUBLISHED
- **Published Date**: January 26, 2024 at 10:17 UTC
- **Last Updated**: May 29, 2025 at 15:13 UTC
- **Reserved Date**: January 23, 2024 at 10:55 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/costcentermodify.php, in the costcenterid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Cups Easy - Cups Easy (Purchase & Inventory)**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy)
### Credits
- Rafael Pedrero |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8728, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8728
- **State**: PUBLISHED
- **Published Date**: April 24, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 18:13 UTC
- **Reserved Date**: October 17, 2016 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable heap out of bounds write vulnerability exists in the Fitz graphical library part of the MuPDF renderer. A specially crafted PDF file can cause a out of bounds write resulting in heap metadata and sensitive process memory corruption leading to potential code execution. Victim needs to open the specially crafted file in a vulnerable reader in order to trigger this vulnerability.
### Affected Products
**Artifex Software Inc. - MuPDF**
Affected versions:
- 1.10-rc1 (Status: affected)
### References
1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0242) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3332, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3332
- **State**: PUBLISHED
- **Published Date**: June 28, 2023 at 01:25 UTC
- **Last Updated**: December 04, 2024 at 20:52 UTC
- **Reserved Date**: June 20, 2023 at 01:14 UTC
- **Assigned By**: NEC
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to
execute an arbitrary script, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NEC Corporation - Aterm WG2600HP2**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WG2600HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WG2200HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WG2200HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WG1800HP2**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WG1800HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WG1400HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WG600HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WG300HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WF300HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WR9500N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WR9300N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WR8750N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WR8700N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WR8600N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WR8370N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WR8175N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - Aterm WR8170N**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html)
### Credits
- Mr. Taizoh Tsukamoto in Mitsui Bussan Secure Directions, Inc. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12718
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 18:43 UTC
- **Reserved Date**: August 09, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
A Classic Buffer Overflow issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. A third-party component used in the pump does not verify input buffer size prior to copying, leading to a buffer overflow, allowing remote code execution on the target device. The pump receives the potentially malicious input infrequently and under certain conditions, increasing the difficulty of exploitation.
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**n/a - Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump**
Affected versions:
- Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSMA-17-250-02A)
2. [101252](http://www.securityfocus.com/bid/101252)
3. [100665](http://www.securityfocus.com/bid/100665)
4. [43776](https://www.exploit-db.com/exploits/43776/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2370, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2370 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2370
- **State**: PUBLISHED
- **Published Date**: July 14, 2015 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 05:10 UTC
- **Reserved Date**: March 19, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The authentication implementation in the RPC subsystem in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not prevent DCE/RPC connection reflection, which allows local users to gain privileges via a crafted application, aka "Windows RPC Elevation of Privilege Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032907](http://www.securitytracker.com/id/1032907)
2. [37768](https://www.exploit-db.com/exploits/37768/)
3. [MS15-076](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-076) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8878, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8878
- **State**: PUBLISHED
- **Published Date**: March 20, 2020 at 18:40 UTC
- **Last Updated**: August 04, 2024 at 10:12 UTC
- **Reserved Date**: February 11, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PSD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9625.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Foxit - Studio Photo**
Affected versions:
- 3.6.6.916 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-301/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36752, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36752 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36752
- **State**: PUBLISHED
- **Published Date**: July 12, 2023 at 04:38 UTC
- **Last Updated**: October 22, 2024 at 19:17 UTC
- **Reserved Date**: July 11, 2023 at 15:54 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Coming Soon & Maintenance Mode Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.57. This is due to missing or incorrect nonce validation on the save_meta_box() function. This makes it possible for unauthenticated attackers to save meta boxes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Affected Products
**wpconcern - Coming Soon & Maintenance Mode Page**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d283527a-a955-4f82-9827-81a71158d8e2?source=cve)
2. [](https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/)
3. [](https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/)
4. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/)
5. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/)
6. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/)
7. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/)
8. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/)
9. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2368978%40nifty-coming-soon-and-under-construction-page&new=2368978%40nifty-coming-soon-and-under-construction-page&sfp_email=&sfph_mail=)
### Credits
- Jerome Bruandet |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18269, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18269
- **State**: PUBLISHED
- **Published Date**: December 16, 2019 at 19:21 UTC
- **Last Updated**: August 05, 2024 at 01:47 UTC
- **Reserved Date**: October 22, 2019 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability.
### Weakness Classification (CWE)
- CWE-412: Security Weakness
### Affected Products
**Omron - Omron PLC CJ Series**
Affected versions:
- all versions (Status: affected)
**Omron - Omron PLC CS series**
Affected versions:
- all versions (Status: affected)
**Omron - Omron PLC NX1P2 series**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://www.us-cert.gov/ics/advisories/icsa-19-346-02)
2. [](https://www.omron-cxone.com/security/2019-12-06_PLC_EN.pdf)
### Credits
- Jipeng You (XDU) and n0b0dy reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21805
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 20:00 UTC
- **Last Updated**: May 04, 2025 at 07:21 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/rtrs: Add missing deinit() call
A warning is triggered when repeatedly connecting and disconnecting the
rnbd:
list_add corruption. prev->next should be next (ffff88800b13e480), but was ffff88801ecd1338. (prev=ffff88801ecd1340).
WARNING: CPU: 1 PID: 36562 at lib/list_debug.c:32 __list_add_valid_or_report+0x7f/0xa0
Workqueue: ib_cm cm_work_handler [ib_cm]
RIP: 0010:__list_add_valid_or_report+0x7f/0xa0
? __list_add_valid_or_report+0x7f/0xa0
ib_register_event_handler+0x65/0x93 [ib_core]
rtrs_srv_ib_dev_init+0x29/0x30 [rtrs_server]
rtrs_ib_dev_find_or_add+0x124/0x1d0 [rtrs_core]
__alloc_path+0x46c/0x680 [rtrs_server]
? rtrs_rdma_connect+0xa6/0x2d0 [rtrs_server]
? rcu_is_watching+0xd/0x40
? __mutex_lock+0x312/0xcf0
? get_or_create_srv+0xad/0x310 [rtrs_server]
? rtrs_rdma_connect+0xa6/0x2d0 [rtrs_server]
rtrs_rdma_connect+0x23c/0x2d0 [rtrs_server]
? __lock_release+0x1b1/0x2d0
cma_cm_event_handler+0x4a/0x1a0 [rdma_cm]
cma_ib_req_handler+0x3a0/0x7e0 [rdma_cm]
cm_process_work+0x28/0x1a0 [ib_cm]
? _raw_spin_unlock_irq+0x2f/0x50
cm_req_handler+0x618/0xa60 [ib_cm]
cm_work_handler+0x71/0x520 [ib_cm]
Commit 667db86bcbe8 ("RDMA/rtrs: Register ib event handler") introduced a
new element .deinit but never used it at all. Fix it by invoking the
`deinit()` to appropriately unregister the IB event handler.
### Affected Products
**Linux - Linux**
Affected versions:
- 667db86bcbe82e789d82c2e8c8c40756ec2e1999 (Status: affected)
- 667db86bcbe82e789d82c2e8c8c40756ec2e1999 (Status: affected)
- 667db86bcbe82e789d82c2e8c8c40756ec2e1999 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.12 (Status: affected)
- 0 (Status: unaffected)
- 6.12.13 (Status: unaffected)
- 6.13.2 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/5a79cc9bc961fafe90787f86e8f53ba6fad8d63b)
2. [](https://git.kernel.org/stable/c/1af2c769032b6b334cd2a867d7d8c7cbbc527b2d)
3. [](https://git.kernel.org/stable/c/81468c4058a62e84e475433b83b3edc613294f5e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-5013, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-5013 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-5013
- **State**: PUBLISHED
- **Published Date**: November 02, 2011 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 04:09 UTC
- **Reserved Date**: November 02, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in listing_detail.asp in Mckenzie Creations Virtual Real Estate Manager (VRM) 3.5 allows remote attackers to execute arbitrary SQL commands via the Lid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8510](http://securityreason.com/securityalert/8510)
2. [65415](http://osvdb.org/65415)
3. [40687](http://www.securityfocus.com/bid/40687)
4. [13789](http://www.exploit-db.com/exploits/13789)
5. [virtrealestate-listingdetail-sql-injection(59290)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59290)
6. [](http://packetstormsecurity.org/1006-exploits/virtualrealestate-sql.txt)
7. [40166](http://secunia.com/advisories/40166) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27079
- **State**: PUBLISHED
- **Published Date**: May 01, 2024 at 13:04 UTC
- **Last Updated**: May 04, 2025 at 09:03 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Fix NULL domain on device release
In the kdump kernel, the IOMMU operates in deferred_attach mode. In this
mode, info->domain may not yet be assigned by the time the release_device
function is called. It leads to the following crash in the crash kernel:
BUG: kernel NULL pointer dereference, address: 000000000000003c
...
RIP: 0010:do_raw_spin_lock+0xa/0xa0
...
_raw_spin_lock_irqsave+0x1b/0x30
intel_iommu_release_device+0x96/0x170
iommu_deinit_device+0x39/0xf0
__iommu_group_remove_device+0xa0/0xd0
iommu_bus_notifier+0x55/0xb0
notifier_call_chain+0x5a/0xd0
blocking_notifier_call_chain+0x41/0x60
bus_notify+0x34/0x50
device_del+0x269/0x3d0
pci_remove_bus_device+0x77/0x100
p2sb_bar+0xae/0x1d0
...
i801_probe+0x423/0x740
Use the release_domain mechanism to fix it. The scalable mode context
entry which is not part of release domain should be cleared in
release_device().
### Affected Products
**Linux - Linux**
Affected versions:
- 586081d3f6b13ec9dfdfdf3d7842a688b376fa5e (Status: affected)
- 586081d3f6b13ec9dfdfdf3d7842a688b376fa5e (Status: affected)
**Linux - Linux**
Affected versions:
- 5.18 (Status: affected)
- 0 (Status: unaffected)
- 6.8.2 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/333fe86968482ca701c609af590003bcea450e8f)
2. [](https://git.kernel.org/stable/c/81e921fd321614c2ad8ac333b041aae1da7a1c6d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0173, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0173 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0173
- **State**: PUBLISHED
- **Published Date**: March 23, 2011 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 23:41 UTC
- **Reserved Date**: December 23, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple format string vulnerabilities in AppleScript in Apple Mac OS X before 10.6.7 allow context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via format string specifiers in a (1) display dialog or (2) display alert command in a dialog in an AppleScript Studio application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2011-03-21-1](http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html)
2. [](http://support.apple.com/kb/HT4581) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42248, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42248
- **State**: PUBLISHED
- **Published Date**: March 06, 2023 at 00:00 UTC
- **Last Updated**: March 06, 2025 at 17:05 UTC
- **Reserved Date**: October 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
QlikView 12.60.2 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the QvsViewClient functionality.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://qlikview.com)
2. [](https://github.com/Ozozuz/Qlik-View-Stored-XSS) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11837
- **State**: PUBLISHED
- **Published Date**: November 15, 2017 at 03:00 UTC
- **Last Updated**: September 16, 2024 at 22:50 UTC
- **Reserved Date**: July 31, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
### Affected Products
**Microsoft Corporation - ChakraCore, Microsoft Edge, Internet Explorer**
Affected versions:
- Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709. (Status: affected)
### References
1. [1039781](http://www.securitytracker.com/id/1039781)
2. [1039780](http://www.securitytracker.com/id/1039780)
3. [101722](http://www.securityfocus.com/bid/101722)
4. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11837) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23838
- **State**: PUBLISHED
- **Published Date**: January 24, 2025 at 10:52 UTC
- **Last Updated**: January 27, 2025 at 15:18 UTC
- **Reserved Date**: January 16, 2025 at 11:30 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Bauernregeln allows Reflected XSS. This issue affects Bauernregeln: from n/a through 1.0.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - Bauernregeln**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/bauernregeln/vulnerability/wordpress-bauernregeln-plugin-1-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- 0xd4rk5id3 (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2543, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2543
- **State**: PUBLISHED
- **Published Date**: November 20, 2005 at 21:00 UTC
- **Last Updated**: August 08, 2024 at 01:29 UTC
- **Reserved Date**: November 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Secure Computing Corporation Sidewinder G2 6.1.0.01 might allow remote attackers to cause a denial of service (proxy failure) via invalid traffic to the (1) T.120 or (2) RTSP proxy, or (3) invalid MIME messages to the mail filter. NOTE: this might not be a vulnerability because the embedded monitoring sub-system automatically restarts after the failure.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6234](http://www.osvdb.org/6234)
2. [6233](http://www.osvdb.org/6233)
3. [sidewinder-mail-filter-dos(16186)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16186)
4. [](http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf)
5. [sidewinder-rtsp-dos(16184)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16184)
6. [11632](http://secunia.com/advisories/11632)
7. [6232](http://www.osvdb.org/6232)
8. [sidewinder-t120-dos(16183)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16183) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26008
- **State**: PUBLISHED
- **Published Date**: March 23, 2023 at 16:48 UTC
- **Last Updated**: February 19, 2025 at 21:37 UTC
- **Reserved Date**: February 17, 2023 at 14:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ajay D'Souza Top 10 – Popular posts plugin for WordPress plugin <= 3.2.4 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Ajay D'Souza - Top 10 – Popular posts plugin for WordPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/top-10/wordpress-top-10-plugin-3-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- deokhunKim (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9554
- **State**: PUBLISHED
- **Published Date**: October 06, 2024 at 11:31 UTC
- **Last Updated**: October 07, 2024 at 13:49 UTC
- **Reserved Date**: October 05, 2024 at 16:57 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic was found in Sovell Smart Canteen System up to 3.0.7303.30513. Affected by this vulnerability is the function Check_ET_CheckPwdz201 of the file suanfa.py of the component Password Reset Handler. The manipulation leads to authorization bypass. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**Sovell - Smart Canteen System**
Affected versions:
- 3.0.7303.30513 (Status: affected)
### References
1. [VDB-279361 | Sovell Smart Canteen System Password Reset suanfa.py Check_ET_CheckPwdz201 authorization](https://vuldb.com/?id.279361)
2. [VDB-279361 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.279361)
3. [Submit #412954 | 杭州雄伟科技开发股份有限公司 餐厅数字化 最新 Authorization Bypass](https://vuldb.com/?submit.412954)
4. [](https://github.com/qieziwa/Code_vulnerability/blob/main/%E9%9B%84%E4%BC%9F-%E9%A4%90%E5%8E%85%E6%95%B0%E5%AD%97%E5%8C%96%E4%BB%BB%E6%84%8F%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE.md)
### Credits
- qieziwa (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20874, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20874 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20874
- **State**: PUBLISHED
- **Published Date**: July 21, 2022 at 03:45 UTC
- **Last Updated**: November 01, 2024 at 19:00 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20220720 Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9025
- **State**: PUBLISHED
- **Published Date**: June 18, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 22:35 UTC
- **Reserved Date**: March 26, 2018 at 00:00 UTC
- **Assigned By**: ca
### Vulnerability Description
An input validation vulnerability in CA Privileged Access Manager 2.x allows remote attackers to poison log files with specially crafted input.
### Affected Products
**CA Technologies - CA Privileged Access Manager**
Affected versions:
- 2.x (Status: affected)
### References
1. [104496](http://www.securityfocus.com/bid/104496)
2. [](https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20180614-01--security-notice-for-ca-privileged-access-manager.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50144
- **State**: PUBLISHED
- **Published Date**: November 07, 2024 at 09:31 UTC
- **Last Updated**: May 04, 2025 at 09:47 UTC
- **Reserved Date**: October 21, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/xe: fix unbalanced rpm put() with fence_fini()
Currently we can call fence_fini() twice if something goes wrong when
sending the GuC CT for the tlb request, since we signal the fence and
return an error, leading to the caller also calling fini() on the error
path in the case of stack version of the flow, which leads to an extra
rpm put() which might later cause device to enter suspend when it
shouldn't. It looks like we can just drop the fini() call since the
fence signaller side will already call this for us.
There are known mysterious splats with device going to sleep even with
an rpm ref, and this could be one candidate.
v2 (Matt B):
- Prefer warning if we detect double fini()
(cherry picked from commit cfcbc0520d5055825f0647ab922b655688605183)
### Affected Products
**Linux - Linux**
Affected versions:
- f002702290fccbd473f5bb94e52f25c96917fff2 (Status: affected)
- f002702290fccbd473f5bb94e52f25c96917fff2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.11 (Status: affected)
- 0 (Status: unaffected)
- 6.11.6 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/046bd018c0123b1a49c22abed5f9ea31d1454c78)
2. [](https://git.kernel.org/stable/c/03a86c24aea0920a1ca20a0d7771d5e176db538d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12664
- **State**: PUBLISHED
- **Published Date**: September 25, 2019 at 20:16 UTC
- **Last Updated**: November 21, 2024 at 19:13 UTC
- **Reserved Date**: June 04, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Dialer interface feature for ISDN connections in Cisco IOS XE Software for Cisco 4000 Series Integrated Services Routers (ISRs) could allow an unauthenticated, adjacent attacker to pass IPv4 traffic through an ISDN channel prior to successful PPP authentication. The vulnerability is due to insufficient validation of the state of the PPP IP Control Protocol (IPCP). An attacker could exploit this vulnerability by making an ISDN call to an affected device and sending traffic through the ISDN channel prior to successful PPP authentication. Alternatively, an unauthenticated, remote attacker could exploit this vulnerability by sending traffic through an affected device that is configured to exit via an ISDN connection for which both the Dialer interface and the Basic Rate Interface (BRI) have been configured, but the Challenge Handshake Authentication Protocol (CHAP) password for PPP does not match the remote end. A successful exploit could allow the attacker to pass IPv4 traffic through an unauthenticated ISDN connection for a few seconds, from initial ISDN call setup until PPP authentication fails.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Cisco - Cisco IOS XE Software**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190925 Cisco IOS XE Software ISDN Data Leak Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-isdn-data-leak) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37348, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37348
- **State**: PUBLISHED
- **Published Date**: September 19, 2022 at 18:00 UTC
- **Last Updated**: August 03, 2024 at 10:29 UTC
- **Reserved Date**: August 02, 2022 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure Vulnerability that could allow an attacker to read sensitive information from other memory locations and cause a crash on an affected machine. This vulnerability is similar to, but not the same as CVE-2022-37347.
### Affected Products
**Trend Micro - Trend Micro Security (Consumer)**
Affected versions:
- 2022 (17.7.1383 and below) (Status: affected)
### References
1. [](https://helpcenter.trendmicro.com/en-us/article/tmka-11058)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1177/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20244
- **State**: PUBLISHED
- **Published Date**: February 27, 2019 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 22:24 UTC
- **Reserved Date**: December 19, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
In Apache Airflow before 1.10.2, a malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views.
### Affected Products
**Apache Software Foundation - Apache Airflow**
Affected versions:
- Apache Airflow <= 1.10.1 (Status: affected)
### References
1. [](https://lists.apache.org/thread.html/f656fddf9c49293b3ec450437c46709eb01a12d1645136b2f1b8573b%40%3Cdev.airflow.apache.org%3E)
2. [[airflow-dev] 20190410 CVE-2019-0216, CVE-2019-0229 vulnerabilities affecting Apache Airflow <= 1.10.2 webserver component](https://lists.apache.org/thread.html/2de387213d45bc626d27554a1bde7b8c67d08720901f82a50b6f4231%40%3Cdev.airflow.apache.org%3E)
3. [[oss-security] 20190410 CVE-2019-0216, CVE-2019-0229 vulnerabilities affecting Apache Airflow <= 1.10.2 webserver component](http://www.openwall.com/lists/oss-security/2019/04/10/6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4004
- **State**: PUBLISHED
- **Published Date**: April 28, 2025 at 06:00 UTC
- **Last Updated**: May 02, 2025 at 10:48 UTC
- **Reserved Date**: April 26, 2025 at 09:11 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul COVID19 Testing Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /password-recovery.php. The manipulation of the argument username/contactno leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - COVID19 Testing Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-306340 | PHPGurukul COVID19 Testing Management System password-recovery.php sql injection](https://vuldb.com/?id.306340)
2. [VDB-306340 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.306340)
3. [Submit #558125 | PHPGurukul COVID19 Testing Management System V1.0 SQL Injection](https://vuldb.com/?submit.558125)
4. [](https://github.com/wyl091256/CVE/issues/1)
5. [](https://phpgurukul.com/)
### Credits
- wyl091256 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0126
- **State**: PUBLISHED
- **Published Date**: March 28, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 18:16 UTC
- **Reserved Date**: December 13, 2011 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in the WBEM implementation in HP HP-UX 11.11 and 11.23 allows remote attackers to obtain access to diagnostic information via unknown vectors, a related issue to CVE-2012-0125.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1026849](http://www.securitytracker.com/id?1026849)
2. [HPSBUX02755](http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03221589)
3. [SSRT100667](http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03221589)
4. [52734](http://www.securityfocus.com/bid/52734)
5. [hpux-wbem-security-bypass(74390)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74390)
6. [48593](http://secunia.com/advisories/48593) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1415, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1415
- **State**: PUBLISHED
- **Published Date**: February 22, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 21:56 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Maximo Asset Management 7.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 138821.
### Affected Products
**IBM - Maximo Asset Management**
Affected versions:
- 7.6 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg22013796)
2. [103169](http://www.securityfocus.com/bid/103169)
3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/138821) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1164
- **State**: PUBLISHED
- **Published Date**: June 05, 2024 at 06:50 UTC
- **Last Updated**: August 01, 2024 at 18:33 UTC
- **Reserved Date**: February 01, 2024 at 17:09 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Brizy – Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's contact form widget error message and redirect URL in all versions up to, and including, 2.4.43 due to insufficient input sanitization and output escaping on user supplied error messages. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**themefusecom - Brizy – Page Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/9746cd9f-afb2-41b2-9e31-7c77222d9cfd?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3086506%40brizy%2Ftrunk&old=3058896%40brizy%2Ftrunk&sfp_email=&sfph_mail=)
### Credits
- Maxuel |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-53108, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-53108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-53108
- **State**: PUBLISHED
- **Published Date**: May 02, 2025 at 15:55 UTC
- **Last Updated**: May 04, 2025 at 07:50 UTC
- **Reserved Date**: May 02, 2025 at 15:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net/iucv: Fix size of interrupt data
iucv_irq_data needs to be 4 bytes larger.
These bytes are not used by the iucv module, but written by
the z/VM hypervisor in case a CPU is deconfigured.
Reported as:
BUG dma-kmalloc-64 (Not tainted): kmalloc Redzone overwritten
-----------------------------------------------------------------------------
0x0000000000400564-0x0000000000400567 @offset=1380. First byte 0x80 instead of 0xcc
Allocated in iucv_cpu_prepare+0x44/0xd0 age=167839 cpu=2 pid=1
__kmem_cache_alloc_node+0x166/0x450
kmalloc_node_trace+0x3a/0x70
iucv_cpu_prepare+0x44/0xd0
cpuhp_invoke_callback+0x156/0x2f0
cpuhp_issue_call+0xf0/0x298
__cpuhp_setup_state_cpuslocked+0x136/0x338
__cpuhp_setup_state+0xf4/0x288
iucv_init+0xf4/0x280
do_one_initcall+0x78/0x390
do_initcalls+0x11a/0x140
kernel_init_freeable+0x25e/0x2a0
kernel_init+0x2e/0x170
__ret_from_fork+0x3c/0x58
ret_from_fork+0xa/0x40
Freed in iucv_init+0x92/0x280 age=167839 cpu=2 pid=1
__kmem_cache_free+0x308/0x358
iucv_init+0x92/0x280
do_one_initcall+0x78/0x390
do_initcalls+0x11a/0x140
kernel_init_freeable+0x25e/0x2a0
kernel_init+0x2e/0x170
__ret_from_fork+0x3c/0x58
ret_from_fork+0xa/0x40
Slab 0x0000037200010000 objects=32 used=30 fp=0x0000000000400640 flags=0x1ffff00000010200(slab|head|node=0|zone=0|
Object 0x0000000000400540 @offset=1344 fp=0x0000000000000000
Redzone 0000000000400500: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
Redzone 0000000000400510: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
Redzone 0000000000400520: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
Redzone 0000000000400530: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
Object 0000000000400540: 00 01 00 03 00 00 00 00 00 00 00 00 00 00 00 00 ................
Object 0000000000400550: f3 86 81 f2 f4 82 f8 82 f0 f0 f0 f0 f0 f0 f0 f2 ................
Object 0000000000400560: 00 00 00 00 80 00 00 00 cc cc cc cc cc cc cc cc ................
Object 0000000000400570: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
Redzone 0000000000400580: cc cc cc cc cc cc cc cc ........
Padding 00000000004005d4: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
Padding 00000000004005e4: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
Padding 00000000004005f4: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZ
CPU: 6 PID: 121030 Comm: 116-pai-crypto. Not tainted 6.3.0-20230221.rc0.git4.99b8246b2d71.300.fc37.s390x+debug #1
Hardware name: IBM 3931 A01 704 (z/VM 7.3.0)
Call Trace:
[<000000032aa034ec>] dump_stack_lvl+0xac/0x100
[<0000000329f5a6cc>] check_bytes_and_report+0x104/0x140
[<0000000329f5aa78>] check_object+0x370/0x3c0
[<0000000329f5ede6>] free_debug_processing+0x15e/0x348
[<0000000329f5f06a>] free_to_partial_list+0x9a/0x2f0
[<0000000329f5f4a4>] __slab_free+0x1e4/0x3a8
[<0000000329f61768>] __kmem_cache_free+0x308/0x358
[<000000032a91465c>] iucv_cpu_dead+0x6c/0x88
[<0000000329c2fc66>] cpuhp_invoke_callback+0x156/0x2f0
[<000000032aa062da>] _cpu_down.constprop.0+0x22a/0x5e0
[<0000000329c3243e>] cpu_device_down+0x4e/0x78
[<000000032a61dee0>] device_offline+0xc8/0x118
[<000000032a61e048>] online_store+0x60/0xe0
[<000000032a08b6b0>] kernfs_fop_write_iter+0x150/0x1e8
[<0000000329fab65c>] vfs_write+0x174/0x360
[<0000000329fab9fc>] ksys_write+0x74/0x100
[<000000032aa03a5a>] __do_syscall+0x1da/0x208
[<000000032aa177b2>] system_call+0x82/0xb0
INFO: lockdep is turned off.
FIX dma-kmalloc-64: Restoring kmalloc Redzone 0x0000000000400564-0x0000000000400567=0xcc
FIX dma-kmalloc-64: Object at 0x0000000000400540 not freed
### Affected Products
**Linux - Linux**
Affected versions:
- 2356f4cb191100a5e92d537f13e5efdbc697e9cb (Status: affected)
- 2356f4cb191100a5e92d537f13e5efdbc697e9cb (Status: affected)
- 2356f4cb191100a5e92d537f13e5efdbc697e9cb (Status: affected)
- 2356f4cb191100a5e92d537f13e5efdbc697e9cb (Status: affected)
- 2356f4cb191100a5e92d537f13e5efdbc697e9cb (Status: affected)
- 2356f4cb191100a5e92d537f13e5efdbc697e9cb (Status: affected)
- 2356f4cb191100a5e92d537f13e5efdbc697e9cb (Status: affected)
- 2356f4cb191100a5e92d537f13e5efdbc697e9cb (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.21 (Status: affected)
- 0 (Status: unaffected)
- 4.14.311 (Status: unaffected)
- 4.19.279 (Status: unaffected)
- 5.4.238 (Status: unaffected)
- 5.10.176 (Status: unaffected)
- 5.15.104 (Status: unaffected)
- 6.1.21 (Status: unaffected)
- 6.2.8 (Status: unaffected)
- 6.3 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/a908eae0f71811afee86be7088692f1aa5855c3b)
2. [](https://git.kernel.org/stable/c/b0d2bb5e31a693ebc8888eb407f8a257a3680efa)
3. [](https://git.kernel.org/stable/c/71da5991b6438ad6da13ceb25465ee2760a1c52f)
4. [](https://git.kernel.org/stable/c/bd2e78462ae18484e55ae4d285df2c86b86bdd12)
5. [](https://git.kernel.org/stable/c/3cfdefdaaa4b2a77e84d0db5e0a47a7aa3bb615a)
6. [](https://git.kernel.org/stable/c/c78f1345db4e4b3b78f9b768f4074ebd60abe966)
7. [](https://git.kernel.org/stable/c/93a970494881004c348d8feb38463ee72496e99a)
8. [](https://git.kernel.org/stable/c/3d87debb8ed2649608ff432699e7c961c0c6f03b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5046, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5046
- **State**: PUBLISHED
- **Published Date**: December 11, 2013 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 16:59 UTC
- **Reserved Date**: August 06, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 7 through 11 allows local users to bypass the Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code, aka "Internet Explorer Elevation of Privilege Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS13-097](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-097) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4575, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4575
- **State**: PUBLISHED
- **Published Date**: June 15, 2022 at 15:40 UTC
- **Last Updated**: September 17, 2024 at 03:23 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.2.0 through 3.2.9 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 166801.
### Affected Products
**IBM - Financial Transaction Manager**
Affected versions:
- 3.2.0 (Status: affected)
- 3.2.9 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6594797)
2. [ibm-ftm-cve20194575-sql-injection (166801)](https://exchange.xforce.ibmcloud.com/vulnerabilities/166801) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15032, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15032
- **State**: PUBLISHED
- **Published Date**: July 07, 2020 at 15:33 UTC
- **Last Updated**: August 04, 2024 at 13:00 UTC
- **Reserved Date**: June 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Monitoring-Incidents.php id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nedi.ch/download/)
2. [](https://gist.github.com/p4nk4jv/68ae8b773dbea6d8769295ba96d9f1e3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3159
- **State**: PUBLISHED
- **Published Date**: April 06, 2024 at 14:53 UTC
- **Last Updated**: February 13, 2025 at 17:48 UTC
- **Reserved Date**: April 01, 2024 at 19:47 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Out of bounds memory access in V8 in Google Chrome prior to 123.0.6312.105 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 123.0.6312.105 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html)
2. [](https://issues.chromium.org/issues/330760873)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51135
- **State**: PUBLISHED
- **Published Date**: December 30, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:32 UTC
- **Reserved Date**: December 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formPasswordSetup.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36)
2. [](https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/29/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6548, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6548 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6548
- **State**: PUBLISHED
- **Published Date**: May 09, 2019 at 14:28 UTC
- **Last Updated**: August 04, 2024 at 20:23 UTC
- **Reserved Date**: January 22, 2019 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
GE Communicator, all versions prior to 4.0.517, contains two backdoor accounts with hardcoded credentials, which may allow control over the database. This service is inaccessible to attackers if Windows default firewall settings are used by the end user.
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**n/a - GE Communicator**
Affected versions:
- All versions prior to 4.0.517 (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-19-122-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57681
- **State**: PUBLISHED
- **Published Date**: January 16, 2025 at 00:00 UTC
- **Last Updated**: February 03, 2025 at 19:48 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An access control issue in the component form2alg.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the agl service of the device via a crafted POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dlink.com/en/security-bulletin/)
2. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2alg.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2783, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2783 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2783
- **State**: PUBLISHED
- **Published Date**: June 14, 2013 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 17:53 UTC
- **Reserved Date**: April 11, 2013 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The DNP3 driver in IOServer drivers 1.0.19.0 allows remote attackers to cause a denial of service (infinite loop) or obtain unspecified control via crafted data to TCP port 20000.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://ics-cert.us-cert.gov/advisories/ICSA-13-161-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27412, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27412
- **State**: PUBLISHED
- **Published Date**: July 02, 2021 at 10:52 UTC
- **Last Updated**: August 03, 2024 at 20:48 UTC
- **Reserved Date**: February 19, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Delta Electronics DOPSoft Versions 4.0.10.17 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**n/a - Delta Electronics DOPSoft**
Affected versions:
- DOPSoft Version 4.0.10.17 and prior (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-182-03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48645, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48645
- **State**: PUBLISHED
- **Published Date**: April 28, 2024 at 13:00 UTC
- **Last Updated**: May 04, 2025 at 08:20 UTC
- **Reserved Date**: February 25, 2024 at 13:44 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: enetc: deny offload of tc-based TSN features on VF interfaces
TSN features on the ENETC (taprio, cbs, gate, police) are configured
through a mix of command BD ring messages and port registers:
enetc_port_rd(), enetc_port_wr().
Port registers are a region of the ENETC memory map which are only
accessible from the PCIe Physical Function. They are not accessible from
the Virtual Functions.
Moreover, attempting to access these registers crashes the kernel:
$ echo 1 > /sys/bus/pci/devices/0000\:00\:00.0/sriov_numvfs
pci 0000:00:01.0: [1957:ef00] type 00 class 0x020001
fsl_enetc_vf 0000:00:01.0: Adding to iommu group 15
fsl_enetc_vf 0000:00:01.0: enabling device (0000 -> 0002)
fsl_enetc_vf 0000:00:01.0 eno0vf0: renamed from eth0
$ tc qdisc replace dev eno0vf0 root taprio num_tc 8 map 0 1 2 3 4 5 6 7 \
queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 base-time 0 \
sched-entry S 0x7f 900000 sched-entry S 0x80 100000 flags 0x2
Unable to handle kernel paging request at virtual address ffff800009551a08
Internal error: Oops: 96000007 [#1] PREEMPT SMP
pc : enetc_setup_tc_taprio+0x170/0x47c
lr : enetc_setup_tc_taprio+0x16c/0x47c
Call trace:
enetc_setup_tc_taprio+0x170/0x47c
enetc_setup_tc+0x38/0x2dc
taprio_change+0x43c/0x970
taprio_init+0x188/0x1e0
qdisc_create+0x114/0x470
tc_modify_qdisc+0x1fc/0x6c0
rtnetlink_rcv_msg+0x12c/0x390
Split enetc_setup_tc() into separate functions for the PF and for the
VF drivers. Also remove enetc_qos.o from being included into
enetc-vf.ko, since it serves absolutely no purpose there.
### Affected Products
**Linux - Linux**
Affected versions:
- 34c6adf1977b611fca3b824ad12a2a415e1e420e (Status: affected)
- 34c6adf1977b611fca3b824ad12a2a415e1e420e (Status: affected)
- 34c6adf1977b611fca3b824ad12a2a415e1e420e (Status: affected)
**Linux - Linux**
Affected versions:
- 5.5 (Status: affected)
- 0 (Status: unaffected)
- 5.15.71 (Status: unaffected)
- 5.19.12 (Status: unaffected)
- 6.0 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/510e703e4ed0e011db860bc21228aff48fc9eea7)
2. [](https://git.kernel.org/stable/c/23022b74b1a23bed044f6bc96cf92f6ca5f3e75f)
3. [](https://git.kernel.org/stable/c/5641c751fe2f92d3d9e8a8e03c1263ac8caa0b42) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10659, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10659 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10659
- **State**: PUBLISHED
- **Published Date**: March 30, 2019 at 16:43 UTC
- **Last Updated**: August 04, 2024 at 22:32 UTC
- **Reserved Date**: March 30, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Grandstream GXV3370 before 1.0.1.41 and WP820 before 1.0.3.6 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in a /manager?action=getlogcat priority field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1)
2. [](https://github.com/scarvell/grandstream_exploits) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35375, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35375 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35375
- **State**: REJECTED
- **Published Date**: July 11, 2022 at 19:40 UTC
- **Last Updated**: July 11, 2022 at 19:40 UTC
- **Reserved Date**: July 07, 2022 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31457
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 17:39 UTC
- **Last Updated**: August 02, 2024 at 01:52 UTC
- **Reserved Date**: April 03, 2024 at 17:55 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. gin-vue-admin pseudoversion 0.0.0-20240407133540-7bc7c3051067, corresponding to version 2.6.1, has a code injection vulnerability in the backend. In the Plugin System -> Plugin Template feature, an attacker can perform directory traversal by manipulating the `plugName` parameter. They can create specific folders such as `api`, `config`, `global`, `model`, `router`, `service`, and `main.go` function within the specified traversal directory. Moreover, the Go files within these folders can have arbitrary code inserted based on a specific PoC parameter. The main reason for the existence of this vulnerability is the controllability of the PlugName field within the struct. Pseudoversion 0.0.0-20240409100909-b1b7427c6ea6, corresponding to commit b1b7427c6ea6c7a027fa188c6be557f3795e732b, contains a patch for the issue. As a workaround, one may manually use a filtering method available in the GitHub Security Advisory to rectify the directory traversal problem.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**flipped-aurora - gin-vue-admin**
Affected versions:
- < 0.0.0-20240409100909-b1b7427c6ea6 (Status: affected)
### References
1. [https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4](https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4)
2. [https://github.com/flipped-aurora/gin-vue-admin/commit/b1b7427c6ea6c7a027fa188c6be557f3795e732b](https://github.com/flipped-aurora/gin-vue-admin/commit/b1b7427c6ea6c7a027fa188c6be557f3795e732b)
3. [https://pkg.go.dev/github.com/flipped-aurora/gin-vue-admin/server?tab=versions](https://pkg.go.dev/github.com/flipped-aurora/gin-vue-admin/server?tab=versions) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0715
- **State**: PUBLISHED
- **Published Date**: September 12, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:05 UTC
- **Reserved Date**: September 02, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#483492](http://www.kb.cert.org/vuls/id/483492)
2. [CA-2003-23](http://www.cert.org/advisories/CA-2003-23.html)
3. [oval:org.mitre.oval:def:1813](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1813)
4. [oval:org.mitre.oval:def:20](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A20)
5. [oval:org.mitre.oval:def:1202](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1202)
6. [oval:org.mitre.oval:def:4224](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4224)
7. [oval:org.mitre.oval:def:264](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A264)
8. [20030910 EEYE: Microsoft RPC Heap Corruption Vulnerability - Part II](http://marc.info/?l=bugtraq&m=106322856608909&w=2)
9. [MS03-039](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-039) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1226
- **State**: PUBLISHED
- **Published Date**: April 02, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 05:04 UTC
- **Reserved Date**: April 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
core/admin/delete.php in Podcast Generator 1.1 and earlier does not properly restrict access to administrative functions, which allows remote attackers to delete arbitrary files via the file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [34317](http://www.securityfocus.com/bid/34317)
2. [34555](http://secunia.com/advisories/34555)
3. [8324](https://www.exploit-db.com/exploits/8324) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0318
- **State**: PUBLISHED
- **Published Date**: November 25, 2016 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 22:15 UTC
- **Reserved Date**: December 08, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Lifecycle Query Engine (LQE) in IBM Jazz Reporting Service 6.0 and 6.0.1 before 6.0.1 iFix006 does not destroy a Session ID upon a logout action, which allows remote attackers to obtain access by leveraging an unattended workstation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21983137)
2. [92466](http://www.securityfocus.com/bid/92466) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4346, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4346 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4346
- **State**: PUBLISHED
- **Published Date**: September 30, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 10:08 UTC
- **Reserved Date**: September 30, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in TalkBack 2.3.6 and 2.3.6.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter to comments.php, a different vector than CVE-2008-3371.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6451](https://www.exploit-db.com/exploits/6451)
2. [talkback-comments-file-include(45102)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45102)
3. [ADV-2008-2565](http://www.vupen.com/english/advisories/2008/2565)
4. [4267](http://securityreason.com/securityalert/4267)
5. [31879](http://secunia.com/advisories/31879)
6. [31164](http://www.securityfocus.com/bid/31164) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17137, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17137 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17137
- **State**: PUBLISHED
- **Published Date**: September 17, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 10:39 UTC
- **Reserved Date**: September 17, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Prezi Next 1.3.101.11 has a documented purpose of creating HTML5 presentations but has SE_DEBUG_PRIVILEGE on Windows, which might allow attackers to bypass intended access restrictions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/GitHubAssessments/CVE_Assessment_04_2018) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0580
- **State**: PUBLISHED
- **Published Date**: April 07, 2017 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 13:11 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the Synaptics Touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-34325986.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Kernel-3.18 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-04-01)
2. [97335](http://www.securityfocus.com/bid/97335)
3. [1038201](http://www.securitytracker.com/id/1038201) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3891, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3891
- **State**: PUBLISHED
- **Published Date**: October 09, 2013 at 14:44 UTC
- **Last Updated**: August 06, 2024 at 16:22 UTC
- **Reserved Date**: June 03, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Word 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:18643](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18643)
2. [MS13-086](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-086)
3. [TA13-288A](http://www.us-cert.gov/ncas/alerts/TA13-288A) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3483
- **State**: PUBLISHED
- **Published Date**: August 05, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 09:37 UTC
- **Reserved Date**: August 05, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in ScrewTurn Wiki 2.0.29 and 2.0.30 allows remote attackers to inject arbitrary web script or HTML via error messages in the "/admin.aspx - System Log" page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30429](http://www.securityfocus.com/bid/30429)
2. [](http://www.portcullis.co.uk/281.php)
3. [screwturnwiki-systemlog-xss(42858)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42858)
4. [31242](http://secunia.com/advisories/31242)
5. [](http://www.screwturn.eu/Wiki.ashx#History_2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13976
- **State**: PUBLISHED
- **Published Date**: September 04, 2019 at 15:26 UTC
- **Last Updated**: August 05, 2024 at 00:05 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
eGain Chat 15.0.3 allows unrestricted file upload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/%40dr.spitfire/bypass-file-upload-restrictions-cve-2019-13976-35682bd1fdd3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36392
- **State**: PUBLISHED
- **Published Date**: June 02, 2024 at 13:24 UTC
- **Last Updated**: August 02, 2024 at 03:37 UTC
- **Reserved Date**: May 27, 2024 at 13:04 UTC
- **Assigned By**: INCD
### Vulnerability Description
MileSight DeviceHub - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**MileSight - DeviceHub**
Affected versions:
- v3.0.1-r1 for Ubuntu 20.04 (Status: affected)
### References
1. [](https://www.gov.il/en/Departments/faq/cve_advisories)
### Credits
- Claroty Research – Team 82 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18315, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18315
- **State**: PUBLISHED
- **Published Date**: November 28, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 21:20 UTC
- **Reserved Date**: June 15, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Buffer over-read vulnerabilities in an older version of ASN.1 parser in Snapdragon Mobile in versions SD 600.
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile**
Affected versions:
- SD 600 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins)
2. [105838](http://www.securityfocus.com/bid/105838) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46101
- **State**: PUBLISHED
- **Published Date**: January 31, 2022 at 12:35 UTC
- **Last Updated**: August 04, 2024 at 05:02 UTC
- **Reserved Date**: January 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Git for windows through 2.34.1 when using git pull to update the local warehouse, git.cmd can be run directly.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/0xADY/git_rce) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48926
- **State**: PUBLISHED
- **Published Date**: May 28, 2025 at 00:00 UTC
- **Last Updated**: May 29, 2025 at 18:54 UTC
- **Reserved Date**: May 28, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The admin panel in the TeleMessage service through 2025-05-05 allows attackers to discover usernames, e-mail addresses, passwords, and telephone numbers, as exploited in the wild in May 2025.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-288: Security Weakness
### Affected Products
**TeleMessage - service**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3367, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3367
- **State**: PUBLISHED
- **Published Date**: November 18, 2020 at 17:40 UTC
- **Last Updated**: November 13, 2024 at 17:38 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Cisco - Cisco Web Security Appliance (WSA)**
Affected versions:
- n/a (Status: affected)
### References
1. [20201118 Cisco Secure Web Appliance Privilege Escalation Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7245, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7245
- **State**: PUBLISHED
- **Published Date**: March 23, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 15:56 UTC
- **Reserved Date**: March 23, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [97067](http://www.securityfocus.com/bid/97067)
2. [](https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/)
3. [RHSA-2018:2486](https://access.redhat.com/errata/RHSA-2018:2486)
4. [GLSA-201710-25](https://security.gentoo.org/glsa/201710-25) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0477, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0477
- **State**: PUBLISHED
- **Published Date**: June 11, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:49 UTC
- **Reserved Date**: June 07, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Standalone Macromedia Flash Player 5.0 before 5,0,30,2 allows remote attackers to execute arbitrary programs via a .SWF file containing the "exec" FSCommand.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.macromedia.com/support/flash/ts/documents/swf_clear.htm)
2. [20020109 Shockwave Flash player issue](http://marc.info/?l=bugtraq&m=101071988413107&w=2)
3. [20020319 More SWF vulnerabilities?](http://www.securityfocus.com/archive/1/262990)
4. [flash-fscommand-exec(8587)](http://www.iss.net/security_center/static/8587.php)
5. [](http://www.macromedia.com/support/flash/ts/documents/standalone_update.htm)
6. [4321](http://www.securityfocus.com/bid/4321) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1144
- **State**: PUBLISHED
- **Published Date**: September 05, 2008 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 08:08 UTC
- **Reserved Date**: March 04, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Marvell driver for the Netgear WN802T Wi-Fi access point with firmware 1.3.16 on the Marvell 88W8361P-BEM1 chipset does not properly parse EAPoL-Key packets, which allows remote authenticated users to cause a denial of service (device reboot or hang) or possibly execute arbitrary code via a malformed EAPoL-Key packet with a crafted "advertised length."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4227](http://securityreason.com/securityalert/4227)
2. [20080904 Marvell Driver EAPoL-Key Length Overflow](http://www.securityfocus.com/archive/1/495982/100/0/threaded)
3. [31770](http://secunia.com/advisories/31770)
4. [31013](http://www.securityfocus.com/bid/31013)
5. [netgear-wn802t-eapolkey-dos(44919)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44919) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1038, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1038
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 18:06 UTC
- **Last Updated**: August 03, 2024 at 15:55 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In UserDetailsActivity of AndroidManifest.xml, there is a possible DoS due to a tapjacking/overlay attack. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-183411279
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 Android-12 Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/aaos/2021-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4024
- **State**: PUBLISHED
- **Published Date**: November 28, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 06:45 UTC
- **Reserved Date**: November 20, 2009 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Argument injection vulnerability in the ping function in Ping.php in the Net_Ping package before 2.4.5 for PEAR allows remote attackers to execute arbitrary shell commands via the host parameter. NOTE: this has also been reported as a shell metacharacter problem.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2009-11613](https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01152.html)
2. [](http://pear.php.net/package/Net_Ping/download/2.4.5)
3. [](http://svn.php.net/viewvc/pear/packages/Net_Ping/trunk/Ping.php?r1=274728&r2=290669&pathrev=290669)
4. [](http://pear.php.net/advisory20091114-01.txt)
5. [FEDORA-2009-12156](https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01130.html)
6. [netping-ping-command-execution(54390)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54390)
7. [](http://blog.pear.php.net/2009/11/14/net_traceroute-and-net_ping-security-advisory/)
8. [37093](http://www.securityfocus.com/bid/37093)
9. [ADV-2009-3320](http://www.vupen.com/english/advisories/2009/3320)
10. [37502](http://secunia.com/advisories/37502)
11. [FEDORA-2009-11523](https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01044.html)
12. [DSA-1949](http://www.debian.org/security/2009/dsa-1949)
13. [37451](http://secunia.com/advisories/37451) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7938, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7938 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7938
- **State**: PUBLISHED
- **Published Date**: September 04, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 06:37 UTC
- **Reserved Date**: March 09, 2018 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
P10 Huawei smartphones with the versions before Victoria-AL00AC00B217 have an information leak vulnerability due to the lack of permission validation. An attacker tricks a user into installing a malicious application on the smart phone, and the application can read some hardware serial number, which may cause sensitive information leak.
### Affected Products
**Huawei Technologies Co., Ltd. - P10**
Affected versions:
- The versions before Victoria-AL00AC00B217 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180827-01-smartphone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34655
- **State**: PUBLISHED
- **Published Date**: September 04, 2024 at 05:32 UTC
- **Last Updated**: September 04, 2024 at 12:59 UTC
- **Reserved Date**: May 07, 2024 at 04:43 UTC
- **Assigned By**: SamsungMobile
### Vulnerability Description
Incorrect use of privileged API in UniversalCredentialManager prior to SMR Sep-2024 Release 1 allows local attackers to access privileged API related to UniversalCredentialManager.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR Sep-2024 Release in Android 12, 13, 14 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20715
- **State**: PUBLISHED
- **Published Date**: April 16, 2020 at 15:40 UTC
- **Last Updated**: August 05, 2024 at 02:53 UTC
- **Reserved Date**: April 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by stored XSS. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6100 before 1.0.0.63, D7800 before 1.0.1.47, DM200 before 1.0.0.61, R7500v2 before 1.0.3.40, R7800 before 1.0.2.60, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, and RBS50 before 2.3.0.32.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000061213/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0248) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2858, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2858 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2858
- **State**: PUBLISHED
- **Published Date**: July 23, 2019 at 22:31 UTC
- **Last Updated**: October 01, 2024 at 16:35 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Identity Manager component of Oracle Fusion Middleware (subcomponent: Advanced Console). Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Identity Manager. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Identity Manager accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
### Affected Products
**Oracle Corporation - Identity Manager**
Affected versions:
- 11.1.2.3.0 (Status: affected)
- 12.2.1.3.0 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3966, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3966
- **State**: PUBLISHED
- **Published Date**: August 01, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 18:48 UTC
- **Reserved Date**: August 01, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in /lib/tree/layersmenu.inc.php in the PHP Layers Menu 2.3.5 package for MyNewsGroups :) 0.6b and earlier allows remote attackers to execute arbitrary PHP code via a URL in the myng_root parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19258](http://www.securityfocus.com/bid/19258)
2. [27666](http://www.osvdb.org/27666)
3. [2096](https://www.exploit-db.com/exploits/2096)
4. [20060731 MyNewsGroups <= 0.6b (myng_root) Remote Inclusion Vulnerability](http://www.securityfocus.com/archive/1/441734/100/0/threaded)
5. [mynewsgroups-myngroot-file-include(28091)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28091)
6. [ADV-2006-3073](http://www.vupen.com/english/advisories/2006/3073)
7. [1016613](http://securitytracker.com/id?1016613)
8. [1316](http://securityreason.com/securityalert/1316)
9. [](http://www.bb-pcsecurity.de/sicherheit_266.htm)
10. [21263](http://secunia.com/advisories/21263) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12335, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12335
- **State**: PUBLISHED
- **Published Date**: June 17, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 08:30 UTC
- **Reserved Date**: June 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Incorrect access control in ECOS System Management Appliance (aka SMA) 5.2.68 allows a user to compromise authentication keys, and access and manipulate security relevant configurations, via unrestricted database access during Easy Enrollment.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://telematik.prakinf.tu-ilmenau.de/ecos-sbs/advisory.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5782, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5782 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5782
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 02:21 UTC
- **Reserved Date**: February 01, 2017 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A missing HSTS Header vulnerability in HPE Matrix Operating Environment version v7.6 was found.
### Affected Products
**Hewlett Packard Enterprise - Matrix Operating Environment**
Affected versions:
- v7.6 (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35624
- **State**: PUBLISHED
- **Published Date**: December 12, 2023 at 18:10 UTC
- **Last Updated**: January 01, 2025 at 02:18 UTC
- **Reserved Date**: June 15, 2023 at 01:03 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure Connected Machine Agent Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**Microsoft - Azure Connected Machine Agent**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Azure Connected Machine Agent Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35624) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29964, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29964
- **State**: PUBLISHED
- **Published Date**: April 19, 2024 at 04:39 UTC
- **Last Updated**: September 18, 2024 at 22:30 UTC
- **Reserved Date**: March 22, 2024 at 05:23 UTC
- **Assigned By**: brocade
### Vulnerability Description
Brocade SANnav versions before v2.3.0a do not correctly set permissions on files, including docker files. An unprivileged attacker who gains access to the server can read sensitive information from these files.
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-732: Security Weakness
### Affected Products
**Brocade - Brocade SANnav**
Affected versions:
- before v2.3.0a (Status: affected)
### References
1. [](https://support.broadcom.com/external/content/SecurityAdvisories/0/23249) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6681
- **State**: PUBLISHED
- **Published Date**: April 09, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 11:42 UTC
- **Reserved Date**: April 09, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in dijit.Editor in Dojo before 1.1 allows remote attackers to inject arbitrary web script or HTML via XML entities in a TEXTAREA element.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [dojo-dijiteditor-xss(49883)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49883)
2. [34661](http://www.securityfocus.com/bid/34661)
3. [](http://www.dojotoolkit.org/book/dojo-1-1-release-notes)
4. [](http://trac.dojotoolkit.org/ticket/2140) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48314, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48314
- **State**: PUBLISHED
- **Published Date**: December 01, 2023 at 22:02 UTC
- **Last Updated**: June 03, 2025 at 02:18 UTC
- **Reserved Date**: November 14, 2023 at 17:41 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Collabora Online is a collaborative online office suite based on LibreOffice technology. Users of Nextcloud with Collabora Online Built-in CODE Server app can be vulnerable to attack via proxy.php. This vulnerability has been fixed in Collabora Online - Built-in CODE Server (richdocumentscode) release 23.5.403. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**CollaboraOnline - online**
Affected versions:
- < 23.5.403 (Status: affected)
### References
1. [https://github.com/CollaboraOnline/online/security/advisories/GHSA-qjrm-q4h5-v3r2](https://github.com/CollaboraOnline/online/security/advisories/GHSA-qjrm-q4h5-v3r2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3179, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3179 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3179
- **State**: PUBLISHED
- **Published Date**: July 15, 2008 at 18:03 UTC
- **Last Updated**: August 07, 2024 at 09:28 UTC
- **Reserved Date**: July 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in website.php in Web 2 Business (W2B) phpDatingClub (aka Dating Club) 3.7 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31040](http://secunia.com/advisories/31040)
2. [phpdatingclub-website-file-include(43710)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43710)
3. [3992](http://securityreason.com/securityalert/3992)
4. [ADV-2008-2060](http://www.vupen.com/english/advisories/2008/2060/references)
5. [30176](http://www.securityfocus.com/bid/30176)
6. [6037](https://www.exploit-db.com/exploits/6037) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6165
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 20:27 UTC
- **Last Updated**: August 04, 2024 at 08:55 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SilverStripe 4.5.0 allows attackers to read certain records that should not have been placed into a result set. This affects silverstripe/recipe-cms. The automatic permission-checking mechanism in the silverstripe/graphql module does not provide complete protection against lists that are limited (e.g., through pagination), resulting in records that should have failed a permission check being added to the final result set. GraphQL endpoints are configured by default (e.g., for assets), but the admin/graphql endpoint is access protected by default. This limits the vulnerability to all authenticated users, including those with limited permissions (e.g., where viewing records exposed through admin/graphql requires administrator permissions). However, if custom GraphQL endpoints have been configured for a specific implementation (usually under /graphql), this vulnerability could also be exploited through unauthenticated requests. This vulnerability only applies to reading records; it does not allow unauthorised changing of records.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.silverstripe.org/download/security-releases/CVE-2020-6165) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2047, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2047 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2047
- **State**: REJECTED
- **Published Date**: January 05, 2018 at 14:00 UTC
- **Last Updated**: January 05, 2018 at 13:57 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3005, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3005 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3005
- **State**: PUBLISHED
- **Published Date**: January 03, 2021 at 03:37 UTC
- **Last Updated**: August 03, 2024 at 16:45 UTC
- **Reserved Date**: January 03, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MK-AUTH through 19.01 K4.9 allows remote attackers to obtain sensitive information (e.g., a CPF number) via a modified titulo (aka invoice number) value to the central/recibo.php URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://mk-auth.com.br/)
2. [](https://gist.github.com/alacerda/3b925cb333eb839ae808d6f01642aeb3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7127, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7127
- **State**: PUBLISHED
- **Published Date**: September 12, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 01:50 UTC
- **Reserved Date**: September 02, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate gamma values, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by providing different signs for the second and third arguments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92757](http://www.securityfocus.com/bid/92757)
2. [](http://www.php.net/ChangeLog-7.php)
3. [](https://bugs.php.net/bug.php?id=72730)
4. [GLSA-201611-22](https://security.gentoo.org/glsa/201611-22)
5. [1036680](http://www.securitytracker.com/id/1036680)
6. [RHSA-2016:2750](http://rhn.redhat.com/errata/RHSA-2016-2750.html)
7. [](http://www.php.net/ChangeLog-5.php)
8. [](https://www.tenable.com/security/tns-2016-19)
9. [[oss-security] 20160902 Re: CVE assignment for PHP 5.6.25 and 7.0.10 - and libcurl](http://openwall.com/lists/oss-security/2016/09/02/9)
10. [](https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5905, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5905
- **State**: PUBLISHED
- **Published Date**: September 19, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 05:47 UTC
- **Reserved Date**: January 19, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, a race condition while accessing num of clients in DIAG services can lead to out of boundary access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=6eb2f4f6fde1b210712d6ac66b40b9e7684d77db)
2. [](https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin)
3. [](https://source.android.com/security/bulletin/pixel/2018-08-01#qualcomm-components)
4. [](http://support.blackberry.com/kb/articleDetail?articleNumber=000051163) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8287, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8287
- **State**: PUBLISHED
- **Published Date**: February 18, 2016 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 08:13 UTC
- **Reserved Date**: November 19, 2015 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Swann SRNVW-470LCD devices with firmware through 0114 and SWNVW-470CAM devices with firmware through 1022 allow remote attackers to watch live video by visiting an unspecified URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#923388](http://www.kb.cert.org/vuls/id/923388) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36668
- **State**: PUBLISHED
- **Published Date**: June 05, 2024 at 19:00 UTC
- **Last Updated**: February 13, 2025 at 15:59 UTC
- **Reserved Date**: May 30, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component admin/type_deal.php?mudi=del
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sigubbs/cms/blob/main/35/csrf.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43303
- **State**: PUBLISHED
- **Published Date**: February 16, 2022 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 03, 2021 at 00:00 UTC
- **Assigned By**: JFROG
### Vulnerability Description
Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**teluu - pjsip**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9)
2. [[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html)
3. [[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update](https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html)
4. [DSA-5285](https://www.debian.org/security/2022/dsa-5285)
5. [[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update](https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0865, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0865
- **State**: PUBLISHED
- **Published Date**: July 15, 2019 at 18:56 UTC
- **Last Updated**: August 04, 2024 at 17:58 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A denial of service vulnerability exists when SymCrypt improperly handles a specially crafted digital signature.An attacker could exploit the vulnerability by creating a specially crafted connection or message.The security update addresses the vulnerability by correcting the way SymCrypt handles digital signatures., aka 'SymCrypt Denial of Service Vulnerability'.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1703 for 32-bit Systems (Status: affected)
- 10 Version 1703 for x64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0865) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28676
- **State**: PUBLISHED
- **Published Date**: March 13, 2024 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 15:25 UTC
- **Reserved Date**: March 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DedeCMS v5.7 was discovered to contain a cross-site scripting (XSS) vulnerability via /dede/article_edit.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/777erp/cms/blob/main/18.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34936
- **State**: PUBLISHED
- **Published Date**: June 28, 2023 at 00:00 UTC
- **Last Updated**: November 27, 2024 at 16:32 UTC
- **Reserved Date**: June 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stack overflow in the UpdateMacClone function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34936.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0649
- **State**: PUBLISHED
- **Published Date**: February 13, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:41 UTC
- **Reserved Date**: February 13, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in DataparkSearch before 4.37 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18751](http://secunia.com/advisories/18751)
2. [dataparksearch-scripts-xss(24627)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24627)
3. [](http://www.dataparksearch.org/ChangeLog)
4. [16572](http://www.securityfocus.com/bid/16572)
5. [ADV-2006-0488](http://www.vupen.com/english/advisories/2006/0488) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4366
- **State**: PUBLISHED
- **Published Date**: May 24, 2024 at 07:30 UTC
- **Last Updated**: August 01, 2024 at 20:40 UTC
- **Reserved Date**: April 30, 2024 at 19:05 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘block_id’ parameter in versions up to, and including, 2.13.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**brainstormforce - Spectra – WordPress Gutenberg Blocks**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/72a74483-e159-4c51-a9e0-4a128cbf72dd?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3080971/)
### Credits
- Ngô Thiên An |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0244
- **State**: PUBLISHED
- **Published Date**: January 19, 2014 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 14:18 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Drupal 6.x before 6.28 and 7.x before 7.19, when running with older versions of jQuery that are vulnerable to CVE-2011-4969, allows remote attackers to inject arbitrary web script or HTML via vectors involving unspecified Javascript functions that are used to select DOM elements.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/119598/Drupal-Core-6.x-7.x-Cross-Site-Scripting-Access-Bypass.html)
2. [[oss-security] 20130130 Re: CVE](http://seclists.org/oss-sec/2013/q1/211)
3. [89306](http://osvdb.org/89306)
4. [DSA-2776](http://www.debian.org/security/2013/dsa-2776)
5. [20130116 [Security-news] SA-CORE-2013-001 - Drupal core - Multiple vulnerabilities](http://seclists.org/fulldisclosure/2013/Jan/120)
6. [](https://drupal.org/SA-CORE-2013-001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1777, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1777 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1777
- **State**: PUBLISHED
- **Published Date**: April 18, 2019 at 00:25 UTC
- **Last Updated**: November 21, 2024 at 19:39 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based interface of the Cisco Registered Envelope Service could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against another user of the service. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected software. An attacker could exploit this vulnerability by sending an email with a malicious payload to another user. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. This vulnerability affects software versions 5.3.4.x.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Cisco - Cisco Registered Envelope Service**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190417 Cisco Registered Envelope Service Stored Cross-Site Scripting Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-res-xss)
2. [108015](http://www.securityfocus.com/bid/108015) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5729, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5729
- **State**: PUBLISHED
- **Published Date**: October 30, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 15:39 UTC
- **Reserved Date**: October 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The NE2000 emulator in QEMU 0.8.2 allows local users to execute arbitrary code by writing Ethernet frames with a size larger than the MTU to the EN0_TCNT register, which triggers a heap-based buffer overflow in the slirp library, aka NE2000 "mtu" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the mtu overflow vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23731](http://www.securityfocus.com/bid/23731)
2. [MDKSA-2007:203](http://www.mandriva.com/security/advisories?name=MDKSA-2007:203)
3. [42986](http://osvdb.org/42986)
4. [DSA-1284](http://www.debian.org/security/2007/dsa-1284)
5. [qemu-ne2000-code-execution(38238)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38238)
6. [25073](http://secunia.com/advisories/25073)
7. [](http://taviso.decsystem.org/virtsec.pdf)
8. [27486](http://secunia.com/advisories/27486)
9. [MDVSA-2008:162](http://www.mandriva.com/security/advisories?name=MDVSA-2008:162)
10. [SUSE-SR:2009:002](http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html)
11. [33568](http://secunia.com/advisories/33568)
12. [ADV-2007-1597](http://www.vupen.com/english/advisories/2007/1597)
13. [29129](http://secunia.com/advisories/29129)
14. [25095](http://secunia.com/advisories/25095)
15. [20071030 Clarification on old QEMU/NE2000/Xen issues](http://www.attrition.org/pipermail/vim/2007-October/001842.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1206
- **State**: PUBLISHED
- **Published Date**: February 12, 2025 at 15:00 UTC
- **Last Updated**: February 12, 2025 at 15:15 UTC
- **Reserved Date**: February 10, 2025 at 18:46 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. This affects an unknown part of the file /dashboard/admin/viewdetailroutine.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**Codezips - Gym Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-295143 | Codezips Gym Management System viewdetailroutine.php sql injection](https://vuldb.com/?id.295143)
2. [VDB-295143 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.295143)
3. [Submit #496961 | Codezips Gym Management System in PHP with Source Code V1.0 SQL Injection](https://vuldb.com/?submit.496961)
4. [](https://github.com/sekaino-sakura/CVE/blob/main/CVE_1.md)
### Credits
- sekainosakura (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5324, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5324 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5324
- **State**: PUBLISHED
- **Published Date**: October 08, 2012 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 21:05 UTC
- **Reserved Date**: October 08, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in the Pdf Printer Preferences ActiveX Control in pdfxctrl.dll in Tracker Software PDF-XChange 3.60.0128 allow remote attackers to execute arbitrary code via a long string in the (1) sub_path parameter to the StoreInRegistry function or (2) sub_key parameter to the InitFromRegistry function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [51712](http://www.securityfocus.com/bid/51712)
2. [18427](http://www.exploit-db.com/exploits/18427)
3. [pdfxchange-activex-buffer-overflow(72774)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72774)
4. [](http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5067.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4617, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4617
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:42 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-25046, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-25046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-25046
- **State**: PUBLISHED
- **Published Date**: December 27, 2022 at 21:13 UTC
- **Last Updated**: April 11, 2025 at 22:53 UTC
- **Reserved Date**: July 29, 2022 at 16:42 UTC
- **Assigned By**: Go
### Vulnerability Description
Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
### Affected Products
**code.cloudfoundry.org/archiver - code.cloudfoundry.org/archiver/extractor**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/cloudfoundry/archiver/commit/09b5706aa9367972c09144a450bb4523049ee840)
2. [](https://snyk.io/research/zip-slip-vulnerability)
3. [](https://pkg.go.dev/vuln/GO-2020-0025) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31106, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31106
- **State**: REJECTED
- **Last Updated**: March 27, 2025 at 03:55 UTC
- **Reserved Date**: March 26, 2025 at 14:23 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2674, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2674 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2674
- **State**: PUBLISHED
- **Published Date**: May 30, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 17:58 UTC
- **Reserved Date**: May 30, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Tamber Forum 1.9.13 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) frm_id parameter to (a) show_forum.asp, (2) a search field to (b) forum_search.asp, (3) Email address or (4) Password to (c) admin/index.asp, (5) frm_cat_id parameter to (d) browse_forum_cat.asp, or (6) Message Subject or (7) Message Text field to (e) post_message.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [tamberforum-multiple-sql-injection(26797)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26797)
2. [26565](http://www.osvdb.org/26565)
3. [20060525 Tamber Forum <= 1.9.13 Multiple SQL Injection Vulnerabilities](http://www.securityfocus.com/archive/1/435125/100/0/threaded)
4. [26564](http://www.osvdb.org/26564)
5. [986](http://securityreason.com/securityalert/986)
6. [26566](http://www.osvdb.org/26566)
7. [26567](http://www.osvdb.org/26567)
8. [26568](http://www.osvdb.org/26568) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52483
- **State**: PUBLISHED
- **Published Date**: December 02, 2024 at 13:48 UTC
- **Last Updated**: December 02, 2024 at 15:40 UTC
- **Reserved Date**: November 11, 2024 at 06:40 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Igor Benić LeanPress allows Reflected XSS.This issue affects LeanPress: from n/a through 1.0.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Igor Benić - LeanPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/leanpress/vulnerability/wordpress-leanpress-plugin-1-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Zlrqh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2279
- **State**: PUBLISHED
- **Published Date**: March 21, 2013 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 02:36 UTC
- **Reserved Date**: February 26, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CA SiteMinder Federation (FSS) 12.5, 12.0, and r6; Federation (Standalone) 12.1 and 12.0; Agent for SharePoint 2010; and SiteMinder for Secure Proxy Server 6.0, 12.0, and 12.5 does not properly verify XML signatures for SAML statements, which allows remote attackers to spoof other users and gain privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [52610](http://secunia.com/advisories/52610)
2. [20130319 CA20130319-01: Security Notice for SiteMinder products using SAML](http://archives.neohapsis.com/archives/bugtraq/2013-03/0118.html)
3. [](https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7B53E50CBD-6F6A-4B3A-85FF-36E44ABED8D5%7D)
4. [58609](http://www.securityfocus.com/bid/58609) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35947
- **State**: PUBLISHED
- **Published Date**: May 19, 2024 at 11:14 UTC
- **Last Updated**: May 04, 2025 at 09:09 UTC
- **Reserved Date**: May 17, 2024 at 13:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
dyndbg: fix old BUG_ON in >control parser
Fix a BUG_ON from 2009. Even if it looks "unreachable" (I didn't
really look), lets make sure by removing it, doing pr_err and return
-EINVAL instead.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.19.314 (Status: unaffected)
- 5.4.276 (Status: unaffected)
- 5.10.217 (Status: unaffected)
- 5.15.159 (Status: unaffected)
- 6.1.91 (Status: unaffected)
- 6.6.31 (Status: unaffected)
- 6.8.10 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/3c718bddddca9cbef177ac475b94c5c91147fb38)
2. [](https://git.kernel.org/stable/c/343081c21e56bd6690d342e2f5ae8c00183bf081)
3. [](https://git.kernel.org/stable/c/41d8ac238ab1cab01a8c71798d61903304f4e79b)
4. [](https://git.kernel.org/stable/c/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561)
5. [](https://git.kernel.org/stable/c/a66c869b17c4c4dcf81d273b02cb0efe88e127ab)
6. [](https://git.kernel.org/stable/c/a69e1bdd777ce51061111dc419801e8a2fd241cc)
7. [](https://git.kernel.org/stable/c/529e1852785599160415e964ca322ee7add7aef0)
8. [](https://git.kernel.org/stable/c/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.