System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3468, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3468 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3468
- **State**: PUBLISHED
- **Published Date**: August 29, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 16:07 UTC
- **Reserved Date**: May 06, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The Cisco Unified IP Phone 8945 with software 9.3(2) allows remote attackers to cause a denial of service (device hang) via a malformed PNG file, aka Bug ID CSCud04270.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1028964](http://www.securitytracker.com/id/1028964)
2. [96669](http://osvdb.org/96669)
3. [20130828 Cisco Unified IP Phone 8945 Crafted PNG Image Lockup Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3468) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53292, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53292
- **State**: PUBLISHED
- **Published Date**: December 11, 2024 at 07:55 UTC
- **Last Updated**: December 11, 2024 at 15:09 UTC
- **Reserved Date**: November 20, 2024 at 06:05 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell VxVerify, versions prior to x.40.405, contain a Plain-text Password Storage Vulnerability in the shell wrapper. A local high privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable component with privileges of the compromised account.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-256: Security Weakness
### Affected Products
**Dell - Dell VxRail HCI**
Affected versions:
- N/A (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000258964/dsa-2024-492-security-update-dell-vxverify-on-vxrail-plaintext-password-storage-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3065
- **State**: PUBLISHED
- **Published Date**: June 19, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 18:16 UTC
- **Reserved Date**: June 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in engine/shards/blog.php in blur6ex 0.3.462 allows remote attackers to execute arbitrary SQL commands via the ID parameter in a proc_reply action in the blog shard. NOTE: This is a similar vulnerability to CVE-2006-1763, but the affected code and versions are different.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1113](http://securityreason.com/securityalert/1113)
2. [ADV-2006-2341](http://www.vupen.com/english/advisories/2006/2341)
3. [blur6ex-blog-id-sql-injection(27120)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27120)
4. [1904](https://www.exploit-db.com/exploits/1904)
5. [20060612 blur6ex <= 0.3.462 'ID' blind sql injection](http://www.securityfocus.com/archive/1/437015/100/0/threaded)
6. [20646](http://secunia.com/advisories/20646) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6390
- **State**: REJECTED
- **Published Date**: June 30, 2022 at 20:23 UTC
- **Last Updated**: June 30, 2022 at 20:23 UTC
- **Reserved Date**: November 04, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23001
- **State**: PUBLISHED
- **Published Date**: March 31, 2021 at 17:38 UTC
- **Last Updated**: August 03, 2024 at 18:58 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, the upload functionality in BIG-IP Advanced WAF and BIG-IP ASM allows an authenticated user to upload files to the BIG-IP system using a call to an undisclosed iControl REST endpoint. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
### Affected Products
**n/a - BIG-IP Advanced WAF and BIG-IP ASM**
Affected versions:
- 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K06440657) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31766, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31766 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31766
- **State**: PUBLISHED
- **Published Date**: October 11, 2022 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 13:48 UTC
- **Reserved Date**: May 27, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.1.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.1.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V7.1.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.1.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.1.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.1.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V7.1.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.1.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.1.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.1.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.1.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.1.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.1.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.1.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V7.1.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V7.1.2), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions >= V1.1.0 < V3.0.0). Affected devices with TCP Event service enabled do not properly handle malformed packets.
This could allow an unauthenticated remote attacker to cause a denial of service condition and reboot the device thus possibly affecting other network resources.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Siemens - RUGGEDCOM RM1224 LTE(4G) EU**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RM1224 LTE(4G) NAM**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M804PB**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M812-1 ADSL-Router**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M812-1 ADSL-Router**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M816-1 ADSL-Router**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M816-1 ADSL-Router**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M826-2 SHDSL-Router**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M874-2**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M874-3**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M876-3**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M876-3 (ROK)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M876-4**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M876-4 (EU)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M876-4 (NAM)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE MUM853-1 (EU)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE MUM856-1 (EU)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE MUM856-1 (RoW)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE S615 EEC LAN-Router**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE S615 LAN-Router**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE WAM763-1**
Affected versions:
- V1.1.0 (Status: affected)
**Siemens - SCALANCE WAM766-1**
Affected versions:
- V1.1.0 (Status: affected)
**Siemens - SCALANCE WAM766-1 (US)**
Affected versions:
- V1.1.0 (Status: affected)
**Siemens - SCALANCE WAM766-1 EEC**
Affected versions:
- V1.1.0 (Status: affected)
**Siemens - SCALANCE WAM766-1 EEC (US)**
Affected versions:
- V1.1.0 (Status: affected)
**Siemens - SCALANCE WUM763-1**
Affected versions:
- V1.1.0 (Status: affected)
**Siemens - SCALANCE WUM763-1**
Affected versions:
- V1.1.0 (Status: affected)
**Siemens - SCALANCE WUM766-1**
Affected versions:
- V1.1.0 (Status: affected)
**Siemens - SCALANCE WUM766-1 (USA)**
Affected versions:
- V1.1.0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-697140.pdf)
2. [](https://cert-portal.siemens.com/productcert/html/ssa-697140.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54557
- **State**: PUBLISHED
- **Published Date**: January 27, 2025 at 21:45 UTC
- **Last Updated**: January 31, 2025 at 21:33 UTC
- **Reserved Date**: December 03, 2024 at 22:50 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An attacker may gain access to protected parts of the file system.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/121839)
2. [](https://support.apple.com/en-us/121842)
3. [](https://support.apple.com/en-us/121840) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16277
- **State**: PUBLISHED
- **Published Date**: September 13, 2019 at 11:07 UTC
- **Last Updated**: August 05, 2024 at 01:10 UTC
- **Reserved Date**: September 13, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PicoC 2.1 has a heap-based buffer overflow in StringStrcpy in cstdlib/string.c when called from ExpressionParseFunctionCall in expression.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/zsaleeba/picoc/issues/44) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33893
- **State**: PUBLISHED
- **Published Date**: August 02, 2024 at 00:00 UTC
- **Last Updated**: October 30, 2024 at 19:18 UTC
- **Reserved Date**: April 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x below 22.1s3 are vulnerable to XSS when displaying the logs due to improper input sanitization. This is fixed in version 21.2s10 and 22.1s3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ewon.biz/products/cosy/ewon-cosy-wifi)
2. [](https://www.hms-networks.com/cyber-security)
3. [](https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf)
4. [](https://blog.syss.com/posts/hacking-a-secure-industrial-remote-access-gateway/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27840
- **State**: PUBLISHED
- **Published Date**: May 12, 2021 at 14:06 UTC
- **Last Updated**: August 04, 2024 at 16:25 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**n/a - samba**
Affected versions:
- samba 4.14.1, samba 4.13.6, samba 4.12.13 (Status: affected)
### References
1. [](https://security.netapp.com/advisory/ntap-20210326-0007/)
2. [FEDORA-2021-c2d8628d33](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/)
3. [[debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update](https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html)
4. [DSA-4884](https://www.debian.org/security/2021/dsa-4884)
5. [FEDORA-2021-1a8e93a285](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/)
6. [FEDORA-2021-c93a3a5d3f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/)
7. [](https://bugzilla.redhat.com/show_bug.cgi?id=1941400)
8. [](https://www.samba.org/samba/security/CVE-2020-27840.html)
9. [GLSA-202105-22](https://security.gentoo.org/glsa/202105-22) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6866
- **State**: PUBLISHED
- **Published Date**: April 30, 2020 at 21:19 UTC
- **Last Updated**: August 04, 2024 at 09:11 UTC
- **Reserved Date**: January 13, 2020 at 00:00 UTC
- **Assigned By**: zte
### Vulnerability Description
A ZTE product is impacted by a resource management error vulnerability. An attacker could exploit this vulnerability to cause a denial of service by issuing a specific command. This affects: ZXCTN 6500 version V2.10.00R3B87.
### Affected Products
**n/a - ZXCTN 6500**
Affected versions:
- V2.10.00R3B87 (Status: affected)
### References
1. [](http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012803) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30717, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30717
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 20:31 UTC
- **Last Updated**: April 17, 2025 at 13:57 UTC
- **Reserved Date**: March 25, 2025 at 20:11 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Teleservice product of Oracle E-Business Suite (component: Service Diagnostics Scripts). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Teleservice. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Teleservice accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - Oracle Teleservice**
Affected versions:
- 12.2.3 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2025.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2944, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2944 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2944
- **State**: PUBLISHED
- **Published Date**: January 11, 2017 at 04:40 UTC
- **Last Updated**: August 05, 2024 at 14:09 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability when parsing crafted TIFF image files. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**n/a - Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier.**
Affected versions:
- Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. (Status: affected)
### References
1. [95345](http://www.securityfocus.com/bid/95345)
2. [1037574](http://www.securitytracker.com/id/1037574)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb17-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3906
- **State**: PUBLISHED
- **Published Date**: October 27, 2021 at 21:20 UTC
- **Last Updated**: August 03, 2024 at 17:09 UTC
- **Reserved Date**: October 26, 2021 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**bookstackapp - bookstackapp/bookstack**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/f115bdf5-c06b-4627-a6fa-ba6904a43ba3)
2. [](https://github.com/bookstackapp/bookstack/commit/64937ab826b56d086af9ecea532510d37520ebc8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7824
- **State**: PUBLISHED
- **Published Date**: June 09, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 02:04 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Buffalo NC01WH devices with firmware version 1.0.0.8 and earlier allows authenticated attackers to bypass access restriction to enable the debug option via unspecified vectors.
### Affected Products
**BUFFALO INC. - WNC01WH**
Affected versions:
- firmware version 1.0.0.8 and earlier (Status: affected)
### References
1. [JVN#40613060](https://jvn.jp/en/jp/JVN40613060/index.html)
2. [](http://buffalo.jp/support_s/s20161201.html)
3. [94648](http://www.securityfocus.com/bid/94648) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4535, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4535
- **State**: PUBLISHED
- **Published Date**: November 21, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 20:42 UTC
- **Reserved Date**: August 21, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2012:1540](http://rhn.redhat.com/errata/RHSA-2012-1540.html)
2. [SUSE-SU-2014:0470](http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html)
3. [55082](http://secunia.com/advisories/55082)
4. [1027759](http://www.securitytracker.com/id?1027759)
5. [[Xen-announce] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability](http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html)
6. [51413](http://secunia.com/advisories/51413)
7. [51200](http://secunia.com/advisories/51200)
8. [GLSA-201309-24](http://security.gentoo.org/glsa/glsa-201309-24.xml)
9. [DSA-2582](http://www.debian.org/security/2012/dsa-2582)
10. [87298](http://osvdb.org/87298)
11. [SUSE-SU-2012:1486](http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html)
12. [[oss-security] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability](http://www.openwall.com/lists/oss-security/2012/11/13/1)
13. [openSUSE-SU-2012:1572](http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html)
14. [51468](http://secunia.com/advisories/51468)
15. [xen-vcpu-dos(80022)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80022)
16. [SUSE-SU-2012:1487](http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html)
17. [SUSE-SU-2014:0446](http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html)
18. [51352](http://secunia.com/advisories/51352)
19. [51324](http://secunia.com/advisories/51324)
20. [GLSA-201604-03](https://security.gentoo.org/glsa/201604-03)
21. [56498](http://www.securityfocus.com/bid/56498)
22. [SUSE-SU-2012:1615](http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html)
23. [openSUSE-SU-2012:1573](http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5006
- **State**: PUBLISHED
- **Published Date**: July 20, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 05:18 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.4 and earlier have a Server-Side Request Forgery vulnerability. Successful exploitation could lead to sensitive information disclosure.
### Affected Products
**n/a - Adobe Experience Manager AEM 6.4 and earlier**
Affected versions:
- Adobe Experience Manager AEM 6.4 and earlier (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb18-23.html)
2. [104702](http://www.securityfocus.com/bid/104702) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0417
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 04:02 UTC
- **Last Updated**: April 01, 2025 at 14:13 UTC
- **Reserved Date**: January 13, 2025 at 12:24 UTC
- **Assigned By**: NCSC-FI
### Vulnerability Description
Lack of protection against brute force attacks in Valmet DNA visualization in DNA Operate. The possibility to make an arbitrary number of login attempts without any rate limit gives an attacker an increased chance of guessing passwords and then performing switching operations.
### Weakness Classification (CWE)
- CWE-307: Security Weakness
### Affected Products
**Valmet - Valmet DNA**
Affected versions:
- C2007 (Status: affected)
### References
1. [](https://www.valmet.com/about-us/about/research-and-development/vulnerabilityadvisories/cve-2025-0417/)
### Credits
- Sixtus Leonhardsberger and Felix Eberstaller of LimesSecurity |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4138, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4138 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4138
- **State**: PUBLISHED
- **Published Date**: September 14, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 14:46 UTC
- **Reserved Date**: August 02, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The Winbind nss_info extension (nsswitch/idmap_ad.c) in idmap_ad.so in Samba 3.0.25 through 3.0.25c, when the "winbind nss info" option is set to rfc2307 or sfu, grants all local users the privileges of gid 0 when the (1) RFC2307 or (2) Services for UNIX (SFU) primary group attribute is not defined.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.samba.org/samba/security/CVE-2007-4138.html)
2. [RHSA-2007:1016](http://www.redhat.com/support/errata/RHSA-2007-1016.html)
3. [25636](http://www.securityfocus.com/bid/25636)
4. [20070911 [SECURITY] Winbind's rfc2307 & SFU nss_info plugin in Samba 3.0.25[a-c] assigns users a primary gid of 0 by default](http://www.securityfocus.com/archive/1/479078/100/0/threaded)
5. [TA07-352A](http://www.us-cert.gov/cas/techalerts/TA07-352A.html)
6. [SSA:2007-255-02](http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.419439)
7. [3135](http://securityreason.com/securityalert/3135)
8. [ADV-2007-3120](http://www.vupen.com/english/advisories/2007/3120)
9. [26764](http://secunia.com/advisories/26764)
10. [26834](http://secunia.com/advisories/26834)
11. [26795](http://secunia.com/advisories/26795)
12. [1018681](http://www.securitytracker.com/id?1018681)
13. [FEDORA-2007-2145](https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00201.html)
14. [](http://docs.info.apple.com/article.html?artnum=307179)
15. [samba-smb-privilege-escalation(36560)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36560)
16. [](https://issues.rpath.com/browse/RPL-1705)
17. [oval:org.mitre.oval:def:10375](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10375)
18. [26776](http://secunia.com/advisories/26776)
19. [RHSA-2007:1017](http://www.redhat.com/support/errata/RHSA-2007-1017.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1455
- **State**: PUBLISHED
- **Published Date**: February 13, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 15:04 UTC
- **Reserved Date**: January 29, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Joomla! 3.0.x through 3.0.2 allows attackers to obtain sensitive information via unspecified vectors related to an "Undefined variable."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://developer.joomla.org/security/news/549-20130202-core-information-disclosure.html)
2. [joomla-variable-information-disclosure(81926)](https://exchange.xforce.ibmcloud.com/vulnerabilities/81926) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0166, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0166
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 21:08 UTC
- **Last Updated**: August 04, 2024 at 17:44 UTC
- **Reserved Date**: November 13, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
### Affected Products
**n/a - Intel(R) AMT**
Affected versions:
- See provided reference (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5577, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5577 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5577
- **State**: PUBLISHED
- **Published Date**: June 14, 2024 at 07:31 UTC
- **Last Updated**: August 01, 2024 at 21:18 UTC
- **Reserved Date**: May 31, 2024 at 19:50 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Where I Was, Where I Will Be plugin for WordPress is vulnerable to Remote File Inclusion in version <= 1.1.1 via the WIW_HEADER parameter of the /system/include/include_user.php file. This makes it possible for unauthenticated attackers to include and execute arbitrary files hosted on external servers, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution. This requires allow_url_include to be set to true in order to exploit, which is not commonly enabled.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**mcnardelli - Where I Was, Where I Will Be**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/68e0f54d-08ec-4e41-ac9b-d72cdde5a724?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/where-i-was-where-i-will-be/trunk/system/include/include_user.php)
### Credits
- Jonas Höbenreich |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1058
- **State**: PUBLISHED
- **Published Date**: April 04, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 16:56 UTC
- **Reserved Date**: March 07, 2006 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25098](http://secunia.com/advisories/25098)
2. [17330](http://www.securityfocus.com/bid/17330)
3. [oval:org.mitre.oval:def:9483](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483)
4. [19477](http://secunia.com/advisories/19477)
5. [](http://bugs.busybox.net/view.php?id=604)
6. [25848](http://secunia.com/advisories/25848)
7. [](http://support.avaya.com/elmodocs2/security/ASA-2007-250.htm)
8. [RHSA-2007:0244](http://www.redhat.com/support/errata/RHSA-2007-0244.html)
9. [busybox-passwd-weak-security(25569)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25569) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3030
- **State**: PUBLISHED
- **Published Date**: September 21, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:53 UTC
- **Reserved Date**: September 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the archive decompression library in AhnLab V3Pro 2004 build 6.0.0.383, V3 VirusBlock 2005 build 6.0.0.383, and V3Net for Windows Server 6.0 build 6.0.0.383 allows remote attackers to write arbitrary files via a .. (dot dot) in the filename in a compressed archive.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://secunia.com/secunia_research/2005-17/advisory/)
2. [20050915 Secunia Research: Ahnlab V3 Antivirus Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=112680062609377&w=2)
3. [14848](http://www.securityfocus.com/bid/14848)
4. [](http://info.ahnlab.com/english/advisory/01.html)
5. [15674](http://secunia.com/advisories/15674/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21457
- **State**: PUBLISHED
- **Published Date**: July 01, 2024 at 14:17 UTC
- **Last Updated**: August 01, 2024 at 22:20 UTC
- **Reserved Date**: December 12, 2023 at 06:07 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
INformation disclosure while handling Multi-link IE in beacon frame.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AR8035 (Status: affected)
- CSR8811 (Status: affected)
- FastConnect 7800 (Status: affected)
- Immersive Home 214 Platform (Status: affected)
- Immersive Home 216 Platform (Status: affected)
- Immersive Home 316 Platform (Status: affected)
- Immersive Home 318 Platform (Status: affected)
- Immersive Home 3210 Platform (Status: affected)
- Immersive Home 326 Platform (Status: affected)
- IPQ5010 (Status: affected)
- IPQ5028 (Status: affected)
- IPQ5300 (Status: affected)
- IPQ5302 (Status: affected)
- IPQ5312 (Status: affected)
- IPQ5332 (Status: affected)
- IPQ6000 (Status: affected)
- IPQ6010 (Status: affected)
- IPQ6018 (Status: affected)
- IPQ6028 (Status: affected)
- IPQ8070A (Status: affected)
- IPQ8071A (Status: affected)
- IPQ8072A (Status: affected)
- IPQ8074A (Status: affected)
- IPQ8076 (Status: affected)
- IPQ8076A (Status: affected)
- IPQ8078 (Status: affected)
- IPQ8078A (Status: affected)
- IPQ8173 (Status: affected)
- IPQ8174 (Status: affected)
- IPQ9008 (Status: affected)
- IPQ9554 (Status: affected)
- IPQ9570 (Status: affected)
- IPQ9574 (Status: affected)
- QAM8255P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QAMSRV1H (Status: affected)
- QAMSRV1M (Status: affected)
- QCA0000 (Status: affected)
- QCA4024 (Status: affected)
- QCA6554A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6678AQ (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA8075 (Status: affected)
- QCA8081 (Status: affected)
- QCA8082 (Status: affected)
- QCA8084 (Status: affected)
- QCA8085 (Status: affected)
- QCA8337 (Status: affected)
- QCA8386 (Status: affected)
- QCA9888 (Status: affected)
- QCA9889 (Status: affected)
- QCC2073 (Status: affected)
- QCC2076 (Status: affected)
- QCC710 (Status: affected)
- QCF8000 (Status: affected)
- QCF8001 (Status: affected)
- QCN5022 (Status: affected)
- QCN5024 (Status: affected)
- QCN5052 (Status: affected)
- QCN5122 (Status: affected)
- QCN5124 (Status: affected)
- QCN5152 (Status: affected)
- QCN5154 (Status: affected)
- QCN5164 (Status: affected)
- QCN6023 (Status: affected)
- QCN6024 (Status: affected)
- QCN6112 (Status: affected)
- QCN6122 (Status: affected)
- QCN6132 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN6402 (Status: affected)
- QCN6412 (Status: affected)
- QCN6422 (Status: affected)
- QCN6432 (Status: affected)
- QCN9000 (Status: affected)
- QCN9022 (Status: affected)
- QCN9024 (Status: affected)
- QCN9070 (Status: affected)
- QCN9072 (Status: affected)
- QCN9074 (Status: affected)
- QCN9100 (Status: affected)
- QCN9274 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- SA7255P (Status: affected)
- SA7775P (Status: affected)
- SA8255P (Status: affected)
- SA8620P (Status: affected)
- SA8650P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SDX55 (Status: affected)
- SDX65M (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X72 5G Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- SRV1H (Status: affected)
- SRV1M (Status: affected)
- WCD9340 (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8556
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT209599)
2. [](https://support.apple.com/HT209601)
3. [](https://support.apple.com/HT209603)
4. [](https://support.apple.com/HT209604)
5. [](https://support.apple.com/HT209605) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-45617, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-45617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-45617
- **State**: PUBLISHED
- **Published Date**: May 05, 2025 at 00:00 UTC
- **Last Updated**: May 06, 2025 at 03:06 UTC
- **Reserved Date**: April 22, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Incorrect access control in the component /user/list of production_ssm v0.0.1-SNAPSHOT allows attackers to access sensitive information via a crafted payload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/megagao/production_ssm/issues/33) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1298, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1298 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1298
- **State**: PUBLISHED
- **Published Date**: November 06, 2019 at 18:47 UTC
- **Last Updated**: August 06, 2024 at 22:21 UTC
- **Reserved Date**: March 06, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An Integer Overflow exists in WebKit in Google Chrome before Blink M11 in the macOS WebCore::GraphicsContext::fillRect function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.chromium.org/p/chromium/issues/detail?id=75155)
2. [](http://trac.webkit.org/changeset/80579)
3. [](http://trac.webkit.org/changeset/81431) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1695, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1695 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1695
- **State**: PUBLISHED
- **Published Date**: February 20, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 01:00 UTC
- **Reserved Date**: February 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
EmuLive Server4 Commerce Edition Build 7560 allows remote attackers to bypass authentication for the remote administration feature via a URL that contains an extra leading / (slash).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040921 Multiple Vulnerabilities In EmuLive Server4](http://marc.info/?l=bugtraq&m=109577497718374&w=2)
2. [](http://www.gulftech.org/?node=research&article_id=00051-09202004)
3. [12616](http://secunia.com/advisories/12616)
4. [emuliveserver4-url-gain-access(17450)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17450)
5. [11226](http://www.securityfocus.com/bid/11226) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3953
- **State**: REJECTED
- **Last Updated**: November 21, 2022 at 00:00 UTC
- **Reserved Date**: November 11, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7871, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7871
- **State**: PUBLISHED
- **Published Date**: August 07, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 08:06 UTC
- **Reserved Date**: October 19, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.ntp.org/bin/view/Main/NtpBug2941)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1274265)
3. [1033951](http://www.securitytracker.com/id/1033951)
4. [DSA-3388](http://www.debian.org/security/2015/dsa-3388)
5. [77287](http://www.securityfocus.com/bid/77287)
6. [GLSA-201604-03](https://security.gentoo.org/glsa/201604-03)
7. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839)
8. [GLSA-201607-15](https://security.gentoo.org/glsa/201607-15)
9. [](https://security.netapp.com/advisory/ntap-20171004-0001/)
10. [](https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44666, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44666 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44666
- **State**: PUBLISHED
- **Published Date**: December 13, 2022 at 00:00 UTC
- **Last Updated**: May 01, 2025 at 03:55 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Contacts Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Contacts Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44666) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6833
- **State**: PUBLISHED
- **Published Date**: April 23, 2024 at 05:35 UTC
- **Last Updated**: August 02, 2024 at 08:42 UTC
- **Reserved Date**: December 15, 2023 at 01:42 UTC
- **Assigned By**: Hitachi
### Vulnerability Description
Insertion of Sensitive Information into Log File vulnerability in Hitachi Ops Center Administrator allows local users to gain sensitive information.This issue affects Hitachi Ops Center Administrator: before 11.0.1.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**Hitachi - Hitachi Ops Center Administrator**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-121/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1400
- **State**: PUBLISHED
- **Published Date**: June 11, 2010 at 17:28 UTC
- **Last Updated**: August 07, 2024 at 01:21 UTC
- **Reserved Date**: April 15, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving caption elements.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2011:039](http://www.mandriva.com/security/advisories?name=MDVSA-2011:039)
2. [](http://support.apple.com/kb/HT4220)
3. [ADV-2010-2722](http://www.vupen.com/english/advisories/2010/2722)
4. [43068](http://secunia.com/advisories/43068)
5. [USN-1006-1](http://www.ubuntu.com/usn/USN-1006-1)
6. [41856](http://secunia.com/advisories/41856)
7. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212)
8. [](http://support.apple.com/kb/HT4225)
9. [APPLE-SA-2010-06-07-1](http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html)
10. [40196](http://secunia.com/advisories/40196)
11. [40105](http://secunia.com/advisories/40105)
12. [ADV-2010-1373](http://www.vupen.com/english/advisories/2010/1373)
13. [APPLE-SA-2010-06-16-1](http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html)
14. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html)
15. [ADV-2010-1512](http://www.vupen.com/english/advisories/2010/1512)
16. [oval:org.mitre.oval:def:7031](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7031)
17. [40620](http://www.securityfocus.com/bid/40620)
18. [ADV-2011-0552](http://www.vupen.com/english/advisories/2011/0552)
19. [1024067](http://securitytracker.com/id?1024067)
20. [](http://support.apple.com/kb/HT4196)
21. [APPLE-SA-2010-06-21-1](http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html)
22. [20100607 Multiple Vendor WebKit HTML Caption Use After Free Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=870) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39356, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39356 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39356
- **State**: PUBLISHED
- **Published Date**: November 02, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 16:41 UTC
- **Reserved Date**: September 02, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Discourse is a platform for community discussion. Users who receive an invitation link that is not scoped to a single email address can enter any non-admin user's email and gain access to their account when accepting the invitation. All users should upgrade to the latest version. A workaround is temporarily disabling invitations with `SiteSetting.max_invites_per_day = 0` or scope them to individual email addresses.
### CVSS Metrics
- **CVSS Base Score**: 8.9/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**discourse - discourse**
Affected versions:
- <= 2.8.9 (Status: affected)
- <= 2.9.0.beta10 (Status: affected)
### References
1. [](https://github.com/discourse/discourse/security/advisories/GHSA-x8w7-rwmr-w278)
2. [](https://github.com/discourse/discourse/pull/18817) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4560, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4560 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4560
- **State**: PUBLISHED
- **Published Date**: November 28, 2011 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 00:09 UTC
- **Reserved Date**: November 28, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Petition Node module 6.x-1.x before 6.x-1.5 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors related to signing a petition.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [49982](http://www.securityfocus.com/bid/49982)
2. [76094](http://osvdb.org/76094)
3. [drupal-petitionnode-unspecified-xss(70342)](https://exchange.xforce.ibmcloud.com/vulnerabilities/70342)
4. [](http://drupal.org/node/1300238)
5. [46333](http://secunia.com/advisories/46333) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27348, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27348
- **State**: PUBLISHED
- **Published Date**: April 08, 2022 at 08:23 UTC
- **Last Updated**: August 03, 2024 at 05:25 UTC
- **Reserved Date**: March 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Social Codia SMS v1 was discovered to contain a stored cross-site scripting (XSS) vulnerability via add_post.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Post Title text field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/D4rkP0w4r/sms-Add_Student-Stored_XSS-POC)
2. [](https://drive.google.com/file/d/1PLRmIi7EBMAXkLMUhUy09PVph1CW6otF/view?usp=sharing)
3. [](http://packetstormsecurity.com/files/166650/Social-Codia-SMS-1-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0987, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0987 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0987
- **State**: PUBLISHED
- **Published Date**: December 05, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:38 UTC
- **Reserved Date**: October 27, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the process_menu function in yardradius 1.0.20 allows remote attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278384)
2. [DSA-598](http://www.debian.org/security/2004/dsa-598)
3. [11753](http://www.securityfocus.com/bid/11753)
4. [yardradius-processmenu-bo(18270)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18270) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8481
- **State**: PUBLISHED
- **Published Date**: April 29, 2020 at 01:30 UTC
- **Last Updated**: August 04, 2024 at 10:03 UTC
- **Reserved Date**: January 30, 2020 at 00:00 UTC
- **Assigned By**: ABB
### Vulnerability Description
For ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, confidential data is written in an unprotected file. An attacker who successfully exploited this vulnerability could take full control of the computer.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**ABB - Central Licensing System**
Affected versions:
- 5.1 (Status: affected)
**ABB - ABB Ability System 800xA**
Affected versions:
- 5.1 (Status: affected)
- 6.0 (Status: affected)
- 6.1 (Status: affected)
**ABB - Compact HMI**
Affected versions:
- 5.1 (Status: affected)
- 6.0 (Status: affected)
**ABB - Control Builder Safe**
Affected versions:
- 1.0 (Status: affected)
- 1.1 (Status: affected)
- 2.0 (Status: affected)
**ABB - Symphony Plus S+ Operations**
Affected versions:
- 3 (Status: affected)
**ABB - Symphony Plus S+ Engineering **
Affected versions:
- 1.1 (Status: affected)
**ABB - Composer Harmony**
Affected versions:
- 5.1 (Status: affected)
- 6.0 (Status: affected)
- 6.1 (Status: affected)
**ABB - Composer Melody **
Affected versions:
- 5.3 (Status: affected)
- 6 (Status: affected)
**ABB - Harmony OPC Server Standalone**
Affected versions:
- 6.0 (Status: affected)
- 6.1 (Status: affected)
- 7.0 (Status: affected)
**ABB - Advant OCS Control Builder A**
Affected versions:
- 1.3 (Status: affected)
- 1.4 (Status: affected)
**ABB - Composer CTK**
Affected versions:
- 6.1 (Status: affected)
- 6.2 (Status: affected)
**ABB - AdvaBuild**
Affected versions:
- 3.7 SP1 (Status: affected)
- 3.7 SP2 (Status: affected)
**ABB - OPC Server for Mod 300 (non-800xA)**
Affected versions:
- 1.4 (Status: affected)
**ABB - OPC Data Link**
Affected versions:
- 2.1 (Status: affected)
- 2.2 (Status: affected)
**ABB - Knowledge Manager**
Affected versions:
- 8.0 (Status: affected)
- 9.0 (Status: affected)
- 9.1 (Status: affected)
**ABB - Manufacturing Operations Management**
Affected versions:
- 1812 (Status: affected)
- 1909 (Status: affected)
**ABB - Advant OCS AC 100 OPS Server**
Affected versions:
- 5.1 (Status: affected)
- 6.0 (Status: affected)
- 6.1 (Status: affected)
### References
1. [](https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231&LanguageCode=en&DocumentPartId=&Action=Launch)
2. [](https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230&LanguageCode=en&DocumentPartId=&Action=Launch) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3603, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3603 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3603
- **State**: PUBLISHED
- **Published Date**: April 04, 2019 at 13:38 UTC
- **Last Updated**: August 06, 2024 at 10:50 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The (1) HttpResource and (2) FileBackedHttpResource implementations in Shibboleth Identity Provider (IdP) before 2.4.1 and OpenSAML Java 2.6.2 do not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
### Affected Products
**Shibboleth; OpenSAML Java - Identity Provider (IdP)**
Affected versions:
- < 2.4.1 (Status: affected)
**Shibboleth; OpenSAML Java - OpenSAML Java**
Affected versions:
- < 2.6.2 (Status: affected)
### References
1. [60816](http://secunia.com/advisories/60816)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1131823)
3. [](http://shibboleth.net/community/advisories/secadv_20140813.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24304
- **State**: PUBLISHED
- **Published Date**: April 07, 2025 at 02:35 UTC
- **Last Updated**: April 07, 2025 at 15:29 UTC
- **Reserved Date**: January 20, 2025 at 02:01 UTC
- **Assigned By**: OpenHarmony
### Vulnerability Description
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds write.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**OpenHarmony - OpenHarmony**
Affected versions:
- v4.1.0 (Status: affected)
### References
1. [](https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6763, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6763
- **State**: PUBLISHED
- **Published Date**: October 15, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 07:29 UTC
- **Reserved Date**: August 31, 2015 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Multiple unspecified vulnerabilities in Google Chrome before 46.0.2490.71 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://code.google.com/p/chromium/issues/detail?id=529520)
2. [38763](https://www.exploit-db.com/exploits/38763/)
3. [](https://code.google.com/p/chromium/issues/detail?id=529310)
4. [](http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html)
5. [77071](http://www.securityfocus.com/bid/77071)
6. [](https://code.google.com/p/chromium/issues/detail?id=522128)
7. [](https://code.google.com/p/chromium/issues/detail?id=512053)
8. [DSA-3376](http://www.debian.org/security/2015/dsa-3376)
9. [](https://code.google.com/p/chromium/issues/detail?id=522131)
10. [](http://packetstormsecurity.com/files/134482/Google-Chrome-Integer-Overflow.html)
11. [](https://code.google.com/p/chromium/issues/detail?id=529530)
12. [](https://code.google.com/p/chromium/issues/detail?id=528799)
13. [](https://code.google.com/p/chromium/issues/detail?id=516690)
14. [](https://code.google.com/p/chromium/issues/detail?id=527423)
15. [](https://code.google.com/p/chromium/issues/detail?id=542517)
16. [GLSA-201603-09](https://security.gentoo.org/glsa/201603-09)
17. [1033816](http://www.securitytracker.com/id/1033816)
18. [USN-2770-1](http://www.ubuntu.com/usn/USN-2770-1)
19. [RHSA-2015:1912](http://rhn.redhat.com/errata/RHSA-2015-1912.html)
20. [](https://code.google.com/p/chromium/issues/detail?id=528798)
21. [USN-2770-2](http://www.ubuntu.com/usn/USN-2770-2)
22. [](https://code.google.com/p/chromium/issues/detail?id=525763) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2641, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2641 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2641
- **State**: PUBLISHED
- **Published Date**: December 12, 2022 at 01:49 UTC
- **Last Updated**: April 16, 2025 at 16:05 UTC
- **Reserved Date**: August 03, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Horner Automation’s RCC 972 with firmware version 15.40 has a static encryption key on the device. This could allow an attacker to perform unauthorized changes to the device, remotely execute arbitrary code, or cause a denial-of-service condition.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-321: Security Weakness
### Affected Products
**Horner Automation - Remote Compact Controller (RCC) 972**
Affected versions:
- Firmware Version 15.40 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-335-02)
### Credits
- m1etz reported these vulnerabilities through the Computer Emergency Response Team, CERT-Bund, to CISA |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47681
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 11:53 UTC
- **Last Updated**: May 04, 2025 at 09:37 UTC
- **Reserved Date**: September 30, 2024 at 16:00 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he
Fix the NULL pointer dereference in mt7996_mcu_sta_bfer_he
routine adding an sta interface to the mt7996 driver.
Found by code review.
### Affected Products
**Linux - Linux**
Affected versions:
- 98686cd21624c75a043e96812beadddf4f6f48e5 (Status: affected)
- 98686cd21624c75a043e96812beadddf4f6f48e5 (Status: affected)
- 98686cd21624c75a043e96812beadddf4f6f48e5 (Status: affected)
- 98686cd21624c75a043e96812beadddf4f6f48e5 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.2 (Status: affected)
- 0 (Status: unaffected)
- 6.6.54 (Status: unaffected)
- 6.10.13 (Status: unaffected)
- 6.11.2 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/8e4b60ae8a047ad2fb175fcfdd54feee80983a45)
2. [](https://git.kernel.org/stable/c/174c803b432596cdd7dd3ec5e0ec52b561969ee2)
3. [](https://git.kernel.org/stable/c/1afdde3b5f56217d875a543cf565075c11bbddad)
4. [](https://git.kernel.org/stable/c/f503ae90c7355e8506e68498fe84c1357894cd5b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19129
- **State**: PUBLISHED
- **Published Date**: November 09, 2018 at 11:00 UTC
- **Last Updated**: August 05, 2024 at 11:30 UTC
- **Reserved Date**: November 09, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Libav 12.3, a NULL pointer dereference (RIP points to zero) issue in ff_mpa_synth_filter_float in libavcodec/mpegaudiodsp_template.c can cause a segmentation fault (application crash) via a crafted mov file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.libav.org/show_bug.cgi?id=1138) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1233, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1233 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1233
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:51 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netware Enterprise Web Server 5.1 running GroupWise WebAccess 5.5 with Novell Directory Services (NDS) enabled allows remote attackers to enumerate user names, group names and other system information by accessing ndsobj.nlm.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010815 Groupwise Webaccess, NetWare web server, and Novell](http://www.securityfocus.com/archive/1/204875)
2. [netware-nds-information-leak(6987)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6987) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26339
- **State**: PUBLISHED
- **Published Date**: February 12, 2025 at 13:26 UTC
- **Last Updated**: February 17, 2025 at 10:07 UTC
- **Reserved Date**: February 07, 2025 at 09:03 UTC
- **Assigned By**: Nozomi
### Vulnerability Description
A CWE-306 "Missing Authentication for Critical Function" in maxtime/handleRoute.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to affect the device confidentiality, integrity, or availability in multiple unspecified ways via crafted HTTP requests.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**Q-Free - MaxTime**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26339)
### Credits
- Andrea Palanca of Nozomi Networks found this bug during a security research activity.
- Q-Free |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0519, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0519
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:41 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A NETBIOS/SMB share password is the default, null, or missing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0519) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47949
- **State**: PUBLISHED
- **Published Date**: December 24, 2022 at 00:00 UTC
- **Last Updated**: April 14, 2025 at 18:36 UTC
- **Reserved Date**: December 24, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Nintendo NetworkBuffer class, as used in Animal Crossing: New Horizons before 2.0.6 and other products, allows remote attackers to execute arbitrary code via a large UDP packet that causes a buffer overflow, aka ENLBufferPwn. The victim must join a game session with the attacker. Other affected products include Mario Kart 7 before 1.2, Mario Kart 8, Mario Kart 8 Deluxe before 2.1.0, ARMS before 5.4.1, Splatoon, Splatoon 2 before 5.5.1, Splatoon 3 before late 2022, Super Mario Maker 2 before 3.0.2, and Nintendo Switch Sports before late 2022.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/PabloMK7/ENLBufferPwn) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-44905, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-44905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-44905
- **State**: PUBLISHED
- **Published Date**: May 30, 2025 at 00:00 UTC
- **Last Updated**: May 30, 2025 at 22:01 UTC
- **Reserved Date**: April 22, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5Z__filter_scaleoffset function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc5.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25375, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25375 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25375
- **State**: PUBLISHED
- **Published Date**: February 20, 2022 at 19:47 UTC
- **Last Updated**: August 03, 2024 at 04:36 UTC
- **Reserved Date**: February 20, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10)
2. [](https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826)
3. [](https://github.com/szymonh/rndis-co)
4. [[oss-security] 20220221 CVE-2022-25375 : Linux RNDIS USB Gadget memory extraction via packet filter](http://www.openwall.com/lists/oss-security/2022/02/21/1)
5. [DSA-5092](https://www.debian.org/security/2022/dsa-5092)
6. [[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html)
7. [[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html)
8. [DSA-5096](https://www.debian.org/security/2022/dsa-5096) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42179, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42179 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42179
- **State**: PUBLISHED
- **Published Date**: January 12, 2025 at 21:46 UTC
- **Last Updated**: January 13, 2025 at 15:14 UTC
- **Reserved Date**: July 29, 2024 at 21:32 UTC
- **Assigned By**: HCL
### Vulnerability Description
HCL MyXalytics is affected by sensitive information disclosure vulnerability. The HTTP response header exposes the Microsoft-HTTP API∕2.0 as the server's name & version.
### CVSS Metrics
- **CVSS Base Score**: 2/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**HCL Software - DRYiCE MyXalytics**
Affected versions:
- 6.3 (Status: affected)
### References
1. [](https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118149) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37412, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37412
- **State**: PUBLISHED
- **Published Date**: September 15, 2021 at 16:26 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The TechRadar app 1.1 for Confluence Server allows XSS via the Title field of a Radar.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-040.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45875
- **State**: PUBLISHED
- **Published Date**: November 08, 2023 at 00:00 UTC
- **Last Updated**: September 04, 2024 at 15:12 UTC
- **Reserved Date**: October 15, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Couchbase Server 7.2.0. There is a private key leak in debug.log while adding a pre-7.0 node to a 7.2 cluster.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://forums.couchbase.com/tags/security)
2. [](https://docs.couchbase.com/server/current/release-notes/relnotes.html)
3. [](https://www.couchbase.com/alerts/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46839, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46839
- **State**: REJECTED
- **Published Date**: September 27, 2024 at 12:39 UTC
- **Last Updated**: October 01, 2024 at 13:53 UTC
- **Reserved Date**: September 11, 2024 at 15:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3597, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3597 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3597
- **State**: PUBLISHED
- **Published Date**: January 19, 2011 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 03:18 UTC
- **Reserved Date**: September 20, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.0 allows local users to affect availability, related to Outside In Viewer SDK.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2011-0143](http://www.vupen.com/english/advisories/2011/0143)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21660640)
3. [1024981](http://www.securitytracker.com/id?1024981)
4. [oracle-outside-viewer-dos(64778)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64778)
5. [45901](http://www.securityfocus.com/bid/45901)
6. [42992](http://secunia.com/advisories/42992)
7. [](http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27249, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27249 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27249
- **State**: PUBLISHED
- **Published Date**: March 23, 2023 at 00:00 UTC
- **Last Updated**: February 25, 2025 at 20:23 UTC
- **Reserved Date**: February 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
swfdump v0.9.2 was discovered to contain a heap buffer overflow in the function swf_GetPlaceObject at swfobject.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://swfdump.com)
2. [](https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc)
3. [](https://github.com/matthiaskramm/swftools)
4. [](https://github.com/matthiaskramm/swftools/issues/197)
5. [](https://github.com/keepinggg/poc/tree/main/poc_of_swfdump) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0886, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0886
- **State**: PUBLISHED
- **Published Date**: March 25, 2014 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 09:27 UTC
- **Reserved Date**: January 06, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The Admin Web UI in IBM Lotus Protector for Mail Security 2.8.x before 2.8.1-22905 allows remote authenticated users to bypass intended access restrictions and execute arbitrary commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21668124)
2. [ibm-lpms-cve20140886-command(91172)](https://exchange.xforce.ibmcloud.com/vulnerabilities/91172) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8715
- **State**: PUBLISHED
- **Published Date**: September 28, 2024 at 02:31 UTC
- **Last Updated**: September 28, 2024 at 17:38 UTC
- **Reserved Date**: September 11, 2024 at 17:05 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Simple LDAP Login plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.6.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**clifgriffin - Simple LDAP Login**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/cbaa95d4-899f-49a0-a888-4ffee61c0335?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3158322/)
3. [](https://plugins.trac.wordpress.org/browser/simple-ldap-login/tags/1.6.0/Simple-LDAP-Login-Admin.php#L15)
### Credits
- Dale Mavers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6999, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6999
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 18:59 UTC
- **Last Updated**: August 08, 2024 at 19:46 UTC
- **Reserved Date**: December 20, 2023 at 14:35 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Remote Code Exxecution via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This makes it possible for authenticated attackers, with contributor level access or higher, to execute code on the server.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**sc0ttkclark - Pods – Custom Content Types and Fields**
Affected versions:
- * (Status: affected)
- 2.8 (Status: affected)
- 3 (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=)
### Credits
- Nex Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41034
- **State**: PUBLISHED
- **Published Date**: October 11, 2022 at 00:00 UTC
- **Last Updated**: January 02, 2025 at 21:27 UTC
- **Reserved Date**: September 19, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Visual Studio Code Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Visual Studio Code**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Visual Studio Code Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41034) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47780, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47780 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47780
- **State**: PUBLISHED
- **Published Date**: May 22, 2025 at 16:56 UTC
- **Last Updated**: May 22, 2025 at 17:25 UTC
- **Reserved Date**: May 09, 2025 at 19:49 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`) does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the `cli_permissions.conf` file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**asterisk - asterisk**
Affected versions:
- < 18.9-cert14 (Status: affected)
- >= 18.10, < 18.26.2 (Status: affected)
- >= 20.0, < 20.7-cert5 (Status: affected)
- >= 20.8, < 20.14.1 (Status: affected)
- >= 21.0, < 21.9.1 (Status: affected)
- >= 22.0, < 22.4.1 (Status: affected)
### References
1. [https://github.com/asterisk/asterisk/security/advisories/GHSA-c7p6-7mvq-8jq2](https://github.com/asterisk/asterisk/security/advisories/GHSA-c7p6-7mvq-8jq2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1332, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1332
- **State**: PUBLISHED
- **Published Date**: June 29, 2011 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 17:18 UTC
- **Reserved Date**: March 09, 2011 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Cybozu Garoon 2.0.0 through 2.1.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2008-6570.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://cybozu.co.jp/products/dl/notice/detail/0023.html)
2. [JVNDB-2011-000044](http://jvndb.jvn.jp/jvndb/JVNDB-2011-000044)
3. [JVN#59779256](http://jvn.jp/en/jp/JVN59779256/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26238, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26238 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26238
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 16:57 UTC
- **Last Updated**: May 03, 2025 at 00:06 UTC
- **Reserved Date**: February 15, 2024 at 00:57 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft PLUGScheduler Scheduled Task Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
### References
1. [Microsoft PLUGScheduler Scheduled Task Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26238) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47848
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 16:51 UTC
- **Last Updated**: August 02, 2024 at 21:16 UTC
- **Reserved Date**: November 13, 2023 at 01:08 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tainacan.Org Tainacan allows Reflected XSS.This issue affects Tainacan: from n/a through 0.20.4.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Tainacan.org - Tainacan**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-20-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Dimas Maulana (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4252, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4252 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4252
- **State**: PUBLISHED
- **Published Date**: December 06, 2010 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: November 16, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564)
2. [SSA:2010-340-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471)
3. [oval:org.mitre.oval:def:19039](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19039)
4. [ADV-2010-3120](http://www.vupen.com/english/advisories/2010/3120)
5. [ADV-2010-3122](http://www.vupen.com/english/advisories/2010/3122)
6. [](http://cvs.openssl.org/chngview?cn=20098)
7. [42469](http://secunia.com/advisories/42469)
8. [SSRT100475](http://marc.info/?l=bugtraq&m=130497251507577&w=2)
9. [45163](http://www.securityfocus.com/bid/45163)
10. [1024823](http://securitytracker.com/id?1024823)
11. [HPSBUX02638](http://marc.info/?l=bugtraq&m=129916880600544&w=2)
12. [57353](http://secunia.com/advisories/57353)
13. [](http://openssl.org/news/secadv_20101202.txt)
14. [HPSBOV02670](http://marc.info/?l=bugtraq&m=130497251507577&w=2)
15. [SSRT100339](http://marc.info/?l=bugtraq&m=129916880600544&w=2)
16. [](https://github.com/seb-m/jpake)
17. [](https://bugzilla.redhat.com/show_bug.cgi?id=659297)
18. [](http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38226
- **State**: PUBLISHED
- **Published Date**: September 10, 2024 at 16:53 UTC
- **Last Updated**: December 31, 2024 at 23:03 UTC
- **Reserved Date**: June 11, 2024 at 22:36 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Publisher Security Feature Bypass Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-693: Security Weakness
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Publisher 2016**
Affected versions:
- 16.0.0 (Status: affected)
### References
1. [Microsoft Publisher Security Feature Bypass Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9569, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9569
- **State**: PUBLISHED
- **Published Date**: February 12, 2018 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 23, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The cbstream.sys driver in Carbon Black 5.1.1.60603 allows local users with admin privileges to cause a denial of service (out-of-bounds read and system crash) via a large counter value in an 0x62430028 IOCTL call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://labs.nettitude.com/blog/carbon-black-security-advisories-cve-2016-9570-cve-2016-9568-and-cve-2016-9569/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13176, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13176 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13176
- **State**: PUBLISHED
- **Published Date**: January 20, 2025 at 13:29 UTC
- **Last Updated**: May 26, 2025 at 18:03 UTC
- **Reserved Date**: January 07, 2025 at 09:34 UTC
- **Assigned By**: openssl
### Vulnerability Description
Issue summary: A timing side-channel which could potentially allow recovering
the private key exists in the ECDSA signature computation.
Impact summary: A timing side-channel in ECDSA signature computations
could allow recovering the private key by an attacker. However, measuring
the timing would require either local access to the signing application or
a very fast network connection with low latency.
There is a timing signal of around 300 nanoseconds when the top word of
the inverted ECDSA nonce value is zero. This can happen with significant
probability only for some of the supported elliptic curves. In particular
the NIST P-521 curve is affected. To be able to measure this leak, the attacker
process must either be located in the same physical computer or must
have a very fast network connection with low latency. For that reason
the severity of this vulnerability is Low.
The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.
### Weakness Classification (CWE)
- CWE-385: Security Weakness
### Affected Products
**OpenSSL - OpenSSL**
Affected versions:
- 3.4.0 (Status: affected)
- 3.3.0 (Status: affected)
- 3.2.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
- 1.1.1 (Status: affected)
- 1.0.2 (Status: affected)
### References
1. [OpenSSL Advisory](https://openssl-library.org/news/secadv/20250120.txt)
2. [3.3.4 git commit](https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f)
3. [3.3.3 git commit](https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902)
4. [3.2.4 git commit](https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65)
5. [3.1.8 git commit](https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467)
6. [3.0.16 git commit](https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844)
7. [1.1.1zb git commit](https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86)
8. [1.0.2zl git commit](https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded)
### Credits
- George Pantelakis (Red Hat)
- Alicja Kario (Red Hat)
- Tomáš Mráz |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35585, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35585 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35585
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 10:50 UTC
- **Last Updated**: September 25, 2024 at 19:32 UTC
- **Reserved Date**: June 28, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Incentive Compensation product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Incentive Compensation. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Incentive Compensation accessible data as well as unauthorized access to critical data or complete access to all Oracle Incentive Compensation accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Oracle Corporation - Incentive Compensation**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3131, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3131 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3131
- **State**: PUBLISHED
- **Published Date**: July 09, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 05:39 UTC
- **Reserved Date**: April 09, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032810](http://www.securitytracker.com/id/1032810)
2. [SUSE-SU-2015:1211](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html)
3. [RHSA-2015:1214](http://rhn.redhat.com/errata/RHSA-2015-1214.html)
4. [SUSE-SU-2015:1214](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html)
5. [GLSA-201507-13](https://security.gentoo.org/glsa/201507-13)
6. [](https://helpx.adobe.com/security/products/flash-player/apsb15-16.html)
7. [75590](http://www.securityfocus.com/bid/75590) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2173, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2173 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2173
- **State**: PUBLISHED
- **Published Date**: August 31, 2023 at 05:33 UTC
- **Last Updated**: September 27, 2024 at 14:20 UTC
- **Reserved Date**: April 18, 2023 at 22:24 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The BadgeOS plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.7.1.6. This is due to improper validation and authorization checks within the badgeos_delete_step_ajax_handler, badgeos_delete_award_step_ajax_handler, badgeos_delete_deduct_step_ajax_handler, and badgeos_delete_rank_req_step_ajax_handler functions. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N`
### Affected Products
**learningtimes - BadgeOS**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ebb9e37c-9e8b-429b-b4ef-cd875351852c?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/steps-ui.php#L371)
3. [](https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/points/award-steps-ui.php#L384)
4. [](https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/points/deduct-steps-ui.php#L441)
5. [](https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/ranks/rank-steps-ui.php#L375)
### Credits
- Alex Thomas |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21556
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 20:53 UTC
- **Last Updated**: February 04, 2025 at 16:04 UTC
- **Reserved Date**: December 24, 2024 at 23:18 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Agile Integration Services). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM Framework. While the vulnerability is in Oracle Agile PLM Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM Framework. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - Oracle Agile PLM Framework**
Affected versions:
- 9.3.6 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2025.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6051, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6051 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6051
- **State**: PUBLISHED
- **Published Date**: September 30, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 12:03 UTC
- **Reserved Date**: September 01, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ocert.org/advisories/ocert-2014-007.html)
2. [GLSA-201612-36](https://security.gentoo.org/glsa/201612-36)
3. [openSUSE-SU-2015:2207](http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html)
4. [](https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273)
5. [61506](http://secunia.com/advisories/61506)
6. [](https://www.kde.org/info/security/advisory-20140923-1.txt)
7. [RHSA-2015:0113](http://rhn.redhat.com/errata/RHSA-2015-0113.html)
8. [[oss-security] 20140925 [oCERT-2014-007] libvncserver multiple issues](http://www.openwall.com/lists/oss-security/2014/09/25/11)
9. [[oss-security] 20140923 Multiple issues in libVNCserver](http://seclists.org/oss-sec/2014/q3/639)
10. [GLSA-201507-07](https://security.gentoo.org/glsa/201507-07)
11. [70093](http://www.securityfocus.com/bid/70093)
12. [DSA-3081](http://www.debian.org/security/2014/dsa-3081)
13. [FEDORA-2014-11537](http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html)
14. [FEDORA-2014-11685](http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html)
15. [](http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html)
16. [[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update](https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html)
17. [USN-4587-1](https://usn.ubuntu.com/4587-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44767
- **State**: PUBLISHED
- **Published Date**: October 24, 2023 at 00:00 UTC
- **Last Updated**: September 11, 2024 at 18:17 UTC
- **Reserved Date**: October 02, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A File upload vulnerability in RiteCMS 3.0 allows a local attacker to upload a SVG file with XSS content.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sromanhu/RiteCMS-File-Upload--XSS---Filemanager/blob/main/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39257, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39257 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39257
- **State**: PUBLISHED
- **Published Date**: December 02, 2023 at 04:22 UTC
- **Last Updated**: August 02, 2024 at 18:02 UTC
- **Reserved Date**: July 26, 2023 at 08:15 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Rugged Control Center, version prior to 4.7, contains an Improper Access Control vulnerability. A local malicious standard user could potentially exploit this vulnerability to modify the content in an unsecured folder when product installation repair is performed, leading to privilege escalation on the system.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Dell - Rugged Control Center (RCC)**
Affected versions:
- Versions prior to 4.7 (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000217705/dsa-2023-340) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11564
- **State**: PUBLISHED
- **Published Date**: August 24, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 18:12 UTC
- **Reserved Date**: July 22, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The D-Link EyeOn Baby Monitor (DCS-825L) 1.08.1 has multiple command injection vulnerabilities in the web service framework. An attacker can forge malicious HTTP requests to execute commands; authentication is required before executing the attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documents.trendmicro.com/assets/tech_brief_Device_Vulnerabilities_in_the_Connected_Home2.pdf)
2. [20180821 CVE-2017-11564: multiple command inject in D-Link EyeOn Baby Monitor (DCS-825L)](http://seclists.org/fulldisclosure/2018/Aug/19) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1399
- **State**: PUBLISHED
- **Published Date**: August 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:51 UTC
- **Reserved Date**: August 30, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain operations in Linux kernel before 2.2.19 on the x86 architecture copy the wrong number of bytes, which might allow attackers to modify memory, aka "User access asm bug on x86."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2001:047](http://www.redhat.com/support/errata/RHSA-2001-047.html)
2. [CSSA-2001-012.0](http://marc.info/?l=bugtraq&m=98637996127004&w=2)
3. [](http://www.linux.org.uk/VERSION/relnotes.2219.html)
4. [DSA-047](https://www.debian.org/security/2001/dsa-047)
5. [MDKSA-2001:037](http://marc.info/?l=bugtraq&m=98759029811377&w=2)
6. [20010409 PROGENY-SA-2001-01: execve()/ptrace() exploit in Linux kernels](http://marc.info/?l=bugtraq&m=98684172109474&w=2)
7. [IMNX-2001-70-010-01](http://marc.info/?l=bugtraq&m=98575345009963&w=2)
8. [CLA-2001:394](http://marc.info/?l=bugtraq&m=98775114228203&w=2)
9. [20010405 Trustix Security Advisory #2001-0003 - kernel](http://marc.info/?l=bugtraq&m=98653252326445&w=2)
10. [SuSE-SA:2001:018](http://marc.info/?l=bugtraq&m=99013830726309&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20527, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20527
- **State**: PUBLISHED
- **Published Date**: December 16, 2022 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 13:21 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In HalCoreCallback of halcore.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure from the NFC firmware with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-229994861
### Affected Products
**n/a - Android**
Affected versions:
- Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2022-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9807, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9807
- **State**: PUBLISHED
- **Published Date**: October 10, 2024 at 19:00 UTC
- **Last Updated**: October 10, 2024 at 19:30 UTC
- **Reserved Date**: October 10, 2024 at 08:29 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Craig Rodway Classroombookings 2.8.7 and classified as problematic. This issue affects some unknown processing of the file /sessions of the component Session Page. The manipulation of the argument Name leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.8.8 is able to address this issue. It is recommended to upgrade the affected component. The project maintainer was contacted early about the disclosure. He responded very quickly, friendly, and professional.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Craig Rodway - Classroombookings**
Affected versions:
- 2.8.7 (Status: affected)
### References
1. [VDB-279959 | Craig Rodway Classroombookings Session Page sessions cross site scripting](https://vuldb.com/?id.279959)
2. [VDB-279959 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.279959)
3. [Submit #419262 | Craigrodway Classroombookings 2.8.7 Cross Site Scripting](https://vuldb.com/?submit.419262)
4. [](https://github.com/JunMing27/CVE/blob/main/CVE%20-%20classroombookings%20Cross%20Site%20Scripting%20(XSS)%20at%20create%20and%20edit%20session%20page%20via%20Administrator%20Dashboard.md)
### Credits
- scream3gg (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1794, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1794 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1794
- **State**: PUBLISHED
- **Published Date**: June 11, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 09:50 UTC
- **Reserved Date**: January 29, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1772, CVE-2014-1780, CVE-2014-1797, CVE-2014-1802, CVE-2014-2756, CVE-2014-2763, CVE-2014-2764, CVE-2014-2769, and CVE-2014-2771.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1030370](http://www.securitytracker.com/id/1030370)
2. [67886](http://www.securityfocus.com/bid/67886)
3. [MS14-035](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19083
- **State**: PUBLISHED
- **Published Date**: November 07, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 11:30 UTC
- **Reserved Date**: November 07, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WeCenter 3.2.0 through 3.2.2 has XSS in the views/default/question/index.tpl.html htmlspecialchars_decode function via the /?/publish/ajax/publish_question/ question_content parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.iwantacve.cn/index.php/archives/76/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1946
- **State**: PUBLISHED
- **Published Date**: February 21, 2019 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 17:23 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties. IBM X-Force ID: 153388.
### Affected Products
**IBM - Security Identity Governance and Intelligence**
Affected versions:
- 5.2 (Status: affected)
- 5.2.1 (Status: affected)
- 5.2.2 (Status: affected)
- 5.2.2.1 (Status: affected)
- 5.2.3 (Status: affected)
- 5.2.3.1 (Status: affected)
- 5.2.3.2 (Status: affected)
- 5.2.4 (Status: affected)
- 5.2.4.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/docview.wss?uid=ibm10872142)
2. [ibm-sig-cve20181946-info-disc(153388)](https://exchange.xforce.ibmcloud.com/vulnerabilities/153388) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0878, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0878
- **State**: PUBLISHED
- **Published Date**: February 12, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 12:34 UTC
- **Reserved Date**: February 12, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Microsoft Internet Explorer on Windows Mobile 5.0 allows remote attackers to cause a denial of service (loss of browser and other device functionality) via a malformed WML page, related to an "overflow state." NOTE: it is possible that this issue is related to CVE-2007-0685.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070209 Denial Of Service in Internet Explorer for MS Windows Mobile 5.0](http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052293.html)
2. [20070209 Re: Denial Of Service in Internet Explorer for MS Windows Mobile 5.0](http://www.securityfocus.com/archive/1/459584/100/0/threaded)
3. [20070209 RE: Denial Of Service in Internet Explorer for MS Windows Mobile 5.0](http://www.securityfocus.com/archive/1/459591/100/0/threaded)
4. [22500](http://www.securityfocus.com/bid/22500)
5. [20070209 Denial Of Service in Internet Explorer for MS Windows Mobile 5.0](http://www.securityfocus.com/archive/1/459571/100/0/threaded)
6. [32629](http://osvdb.org/32629)
7. [ie-mobile-wml-dos(32394)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32394) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47340, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47340
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 14:35 UTC
- **Last Updated**: May 04, 2025 at 07:08 UTC
- **Reserved Date**: May 21, 2024 at 14:28 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
jfs: fix GPF in diFree
Avoid passing inode with
JFS_SBI(inode->i_sb)->ipimap == NULL to
diFree()[1]. GFP will appear:
struct inode *ipimap = JFS_SBI(ip->i_sb)->ipimap;
struct inomap *imap = JFS_IP(ipimap)->i_imap;
JFS_IP() will return invalid pointer when ipimap == NULL
Call Trace:
diFree+0x13d/0x2dc0 fs/jfs/jfs_imap.c:853 [1]
jfs_evict_inode+0x2c9/0x370 fs/jfs/inode.c:154
evict+0x2ed/0x750 fs/inode.c:578
iput_final fs/inode.c:1654 [inline]
iput.part.0+0x3fe/0x820 fs/inode.c:1680
iput+0x58/0x70 fs/inode.c:1670
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.4.276 (Status: unaffected)
- 4.9.276 (Status: unaffected)
- 4.14.240 (Status: unaffected)
- 4.19.198 (Status: unaffected)
- 5.4.133 (Status: unaffected)
- 5.10.51 (Status: unaffected)
- 5.12.18 (Status: unaffected)
- 5.13.3 (Status: unaffected)
- 5.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7bde24bde490f3139eee147efc6d60d6040fe975)
2. [](https://git.kernel.org/stable/c/745c9a59422c63f661f4374ed5181740db4130a1)
3. [](https://git.kernel.org/stable/c/49def1b0644892e3b113673c13d650c3060b43bc)
4. [](https://git.kernel.org/stable/c/aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3)
5. [](https://git.kernel.org/stable/c/a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2)
6. [](https://git.kernel.org/stable/c/8018936950360f1c503bb385e158cfc5e4945d18)
7. [](https://git.kernel.org/stable/c/3bb27e27240289b47d3466f647a55c567adbdc3a)
8. [](https://git.kernel.org/stable/c/42f102ea1943ecb10a0756bf75424de5d1d5beed)
9. [](https://git.kernel.org/stable/c/9d574f985fe33efd6911f4d752de6f485a1ea732) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4826, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4826
- **State**: REJECTED
- **Published Date**: December 30, 2019 at 16:19 UTC
- **Last Updated**: December 30, 2019 at 16:19 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28117, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28117
- **State**: PUBLISHED
- **Published Date**: April 28, 2022 at 14:13 UTC
- **Last Updated**: August 03, 2024 at 05:48 UTC
- **Reserved Date**: March 28, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Server-Side Request Forgery (SSRF) in feed_parser class of Navigate CMS v2.9.4 allows remote attackers to force the application to make arbitrary requests via injection of arbitrary URLs into the feed parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.navigatecms.com/en/blog/development/navigate_cms_update_2_9_5)
2. [](https://www.youtube.com/watch?v=4kHW95CMfD0)
3. [](http://packetstormsecurity.com/files/167063/Navigate-CMS-2.9.4-Server-Side-Request-Forgery.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5918
- **State**: PUBLISHED
- **Published Date**: November 15, 2006 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 20:12 UTC
- **Reserved Date**: November 15, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload vulnerability in RapidKill (aka PHP Rapid Kill) 5.7 Pro, and certain other versions, allows remote attackers to upload and execute arbitrary PHP scripts via the "Link to Download" field. NOTE: it is possible that the field value is restricted to files on specific public web sites.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1862](http://securityreason.com/securityalert/1862)
2. [20896](http://www.securityfocus.com/bid/20896)
3. [20061106 PHP Rapid Kill All Version File Injection](http://www.securityfocus.com/archive/1/450681/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2126
- **State**: PUBLISHED
- **Published Date**: February 12, 2020 at 14:35 UTC
- **Last Updated**: August 04, 2024 at 07:01 UTC
- **Reserved Date**: December 05, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins DigitalOcean Plugin 1.1 and earlier stores a token unencrypted in the global config.xml file on the Jenkins master where it can be viewed by users with access to the master file system.
### Affected Products
**Jenkins project - Jenkins DigitalOcean Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.1 (Status: unknown)
### References
1. [](https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1559)
2. [[oss-security] 20200212 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2020/02/12/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6004
- **State**: PUBLISHED
- **Published Date**: February 16, 2017 at 11:00 UTC
- **Last Updated**: August 05, 2024 at 15:18 UTC
- **Reserved Date**: February 15, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676&r2=1680&view=patch)
2. [GLSA-201706-11](https://security.gentoo.org/glsa/201706-11)
3. [1037850](http://www.securitytracker.com/id/1037850)
4. [96295](http://www.securityfocus.com/bid/96295)
5. [RHSA-2018:2486](https://access.redhat.com/errata/RHSA-2018:2486)
6. [](https://bugs.exim.org/show_bug.cgi?id=2035)
7. [[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E)
8. [[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3164
- **State**: PUBLISHED
- **Published Date**: April 12, 2016 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Drupal 6.x before 6.38, 7.x before 7.43, and 8.x before 8.0.4 might allow remote attackers to conduct open redirect attacks by leveraging (1) custom code or (2) a form shown on a 404 error page, related to path manipulation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160224 CVE requests for Drupal core (SA-CORE-2016-001)](http://www.openwall.com/lists/oss-security/2016/02/24/19)
2. [[oss-security] 20160315 Re: CVE requests for Drupal core (SA-CORE-2016-001)](http://www.openwall.com/lists/oss-security/2016/03/15/10)
3. [DSA-3498](http://www.debian.org/security/2016/dsa-3498)
4. [](https://www.drupal.org/SA-CORE-2016-001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2845, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2845
- **State**: PUBLISHED
- **Published Date**: May 24, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 13:57 UTC
- **Reserved Date**: May 24, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the CAB unpacker in avast! Anti-Virus Managed Client before 4.7.700 allows user-assisted remote attackers to execute arbitrary code via a crafted CAB archive, resulting from an "integer cast around".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070524 n.runs-SA-2007.008 - Avast! Antivirus CAB parsing](http://marc.info/?l=full-disclosure&m=118000321419384&w=2)
2. [avast-cab-bo(34477)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34477)
3. [20070524 n.runs-SA-2007.008 - Avast! Antivirus CAB parsing Arbitrary Code Execution Advisory](http://www.securityfocus.com/archive/1/469469/100/0/threaded)
4. [25380](http://secunia.com/advisories/25380)
5. [](http://www.avast.com/eng/adnm-management-client-revision-history.html)
6. [36523](http://osvdb.org/36523)
7. [1018108](http://www.securitytracker.com/id?1018108)
8. [24132](http://www.securityfocus.com/bid/24132)
9. [ADV-2007-1935](http://www.vupen.com/english/advisories/2007/1935) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30616
- **State**: PUBLISHED
- **Published Date**: November 04, 2024 at 00:00 UTC
- **Last Updated**: November 05, 2024 at 18:51 UTC
- **Reserved Date**: March 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Chamilo LMS 1.11.26 is vulnerable to Incorrect Access Control via main/auth/profile. Non-admin users can manipulate sensitive profiles information, posing a significant risk to data integrity.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/chamilo/chamilo-lms/commit/a1a1e4df70dc65ae4fc7857135f4d3ee185548e7)
2. [](https://github.com/bahadoumi/Vulnerability-Research/tree/main/CVE-2024-30616) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5107, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5107
- **State**: PUBLISHED
- **Published Date**: November 17, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 10:40 UTC
- **Reserved Date**: November 17, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The installation process for Citrix Presentation Server 4.5 and Desktop Server 1.0, when MSI logging is enabled, stores database credentials in MSI log files, which allows local users to obtain these credentials by reading the log files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.citrix.com/article/CTX116228)
2. [ADV-2008-0705](http://www.vupen.com/english/advisories/2008/0705/references)
3. [28047](http://www.securityfocus.com/bid/28047) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4039
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1554
- **State**: PUBLISHED
- **Published Date**: March 26, 2008 at 17:00 UTC
- **Last Updated**: August 08, 2024 at 02:35 UTC
- **Reserved Date**: March 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in scozbook/add.php in ScozNet ScozBook 1.1 BETA allows remote attackers to inject arbitrary web script or HTML via the (1) username, (2) useremail, (3) aim, (4) msn, (5) sitename and (6) siteaddy variables.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20030329 ScozBook BETA 1.1 vulnerabilities](http://www.securityfocus.com/archive/1/316747/30/25280/threaded)
2. [8476](http://secunia.com/advisories/8476)
3. [7235](http://www.securityfocus.com/bid/7235)
4. [3781](http://securityreason.com/securityalert/3781)
5. [scozbook-add-xss(11658)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11658)
6. [1006413](http://www.securitytracker.com/id?1006413) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1159
- **State**: PUBLISHED
- **Published Date**: March 09, 2020 at 16:29 UTC
- **Last Updated**: August 05, 2024 at 22:48 UTC
- **Reserved Date**: December 26, 2015 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
In ZOHO Password Manager Pro (PMP) 8.3.0 (Build 8303) and 8.4.0 (Build 8400,8401,8402), underprivileged users can obtain sensitive information (entry password history) via a vulnerable hidden service.
### Affected Products
**ZOHO - Password Manager Pro (PMP)**
Affected versions:
- 8.3.0 (Build 8303 (Status: affected)
- 8.4.0 (Build 8400 (Status: affected)
- 8401 (Status: affected)
- 8402). (Status: affected)
### References
1. [](https://excellium-services.com/cert-xlm-advisory/cve-2016-1159/)
2. [](https://www.manageengine.com/products/passwordmanagerpro/release-notes.html)
3. [](http://jvn.jp/vu/JVNVU90405898/index.html)
4. [](https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16376, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16376
- **State**: PUBLISHED
- **Published Date**: September 03, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 10:24 UTC
- **Reserved Date**: September 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in OpenJPEG 2.3.0. A heap-based buffer overflow was discovered in the function t2_encode_packet in lib/openmj2/t2.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [105262](http://www.securityfocus.com/bid/105262)
2. [](https://github.com/uclouvain/openjpeg/issues/1127) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27941, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27941
- **State**: PUBLISHED
- **Published Date**: May 06, 2021 at 20:31 UTC
- **Last Updated**: August 03, 2024 at 21:33 UTC
- **Reserved Date**: March 03, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unconstrained Web access to the device's private encryption key in the QR code pairing mode in the eWeLink mobile application (through 4.9.2 on Android and through 4.9.1 on iOS) allows a physically proximate attacker to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the Wi-Fi spectrum during a device pairing process.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://play.google.com/store/apps/details?id=com.coolkit&hl=en_US)
2. [](https://apps.apple.com/us/app/ewelink-smart-home/id1035163158)
3. [](https://github.com/salgio/eWeLink-QR-Code) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40485, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40485 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40485
- **State**: PUBLISHED
- **Published Date**: October 13, 2021 at 00:27 UTC
- **Last Updated**: February 28, 2025 at 20:54 UTC
- **Reserved Date**: September 02, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft SharePoint Enterprise Server 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office Online Server**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Excel 2016**
Affected versions:
- 16.0.0.0 (Status: affected)
**Microsoft - Microsoft Excel 2013 Service Pack 1**
Affected versions:
- 15.0.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40485) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.