System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0630, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0630 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0630 - **State**: PUBLISHED - **Published Date**: February 05, 2024 at 21:21 UTC - **Last Updated**: August 01, 2024 at 18:11 UTC - **Reserved Date**: January 16, 2024 at 21:34 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP RSS Aggregator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the RSS feed source in all versions up to, and including, 4.23.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **jeangalea - WP RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/93cb3b29-b1a0-4d40-a057-1b41f3b181f2?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3026269/wp-rss-aggregator) ### Credits - Colin Xu
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21483, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21483 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21483 - **State**: PUBLISHED - **Published Date**: April 13, 2021 at 18:39 UTC - **Last Updated**: August 03, 2024 at 18:16 UTC - **Reserved Date**: December 30, 2020 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description Under certain conditions SAP Solution Manager, version - 720, allows a high privileged attacker to get access to sensitive information which has a direct serious impact beyond the exploitable component thereby affecting the confidentiality in the application. ### Affected Products **SAP SE - SAP Solution Manager** Affected versions: - < 720 (Status: affected) ### References 1. [](https://launchpad.support.sap.com/#/notes/3017823) 2. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=573801649)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4712, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4712 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4712 - **State**: PUBLISHED - **Published Date**: October 19, 2013 at 10:00 UTC - **Last Updated**: September 16, 2024 at 20:26 UTC - **Reserved Date**: June 26, 2013 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description I-O DATA DEVICE HDL-A and HDL2-A devices with firmware 1.07 and earlier do not properly manage sessions, which allows remote attackers to obtain sensitive information or modify data via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://rm2.iobb.net) 2. [JVN#52509236](http://jvn.jp/en/jp/JVN52509236/index.html) 3. [](http://jvn.jp/en/jp/JVN52509236/225184/index.html) 4. [JVNDB-2013-000095](http://jvndb.jvn.jp/jvndb/JVNDB-2013-000095)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5221, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5221 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5221 - **State**: PUBLISHED - **Published Date**: July 10, 2019 at 17:43 UTC - **Last Updated**: August 04, 2024 at 19:47 UTC - **Reserved Date**: January 04, 2019 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is a path traversal vulnerability on Huawei Share. The software does not properly validate the path, an attacker could crafted a file path when transporting file through Huawei Share, successful exploit could allow the attacker to transport a file to arbitrary path on the phone. Affected products: Mate 20 X versions earlier than Ever-L29B 9.1.0.300(C432E3R1P12), versions earlier than Ever-L29B 9.1.0.300(C636E3R2P1), and versions earlier than Ever-L29B 9.1.0.300(C185E3R3P1). ### Affected Products **Huawei - Mate 20 X** Affected versions: - Versions earlier than Ever-L29B 9.1.0.300(C432E3R1P12) (Status: affected) - Versions earlier than Ever-L29B 9.1.0.300(C636E3R2P1) (Status: affected) - Versions earlier than Ever-L29B 9.1.0.300(C185E3R3P1) (Status: affected) ### References 1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190703-01-share-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5750, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5750 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5750 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 15:29 UTC - **Last Updated**: June 06, 2025 at 15:54 UTC - **Reserved Date**: June 05, 2025 at 20:45 UTC - **Assigned By**: zdi ### Vulnerability Description WOLFBOX Level 2 EV Charger tuya_svc_devos_activate_result_parse Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of WOLFBOX Level 2 EV Charger. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the secKey, localKey, stdTimeZone and devId parameters. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26294. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **WOLFBOX - Level 2 EV Charger** Affected versions: - 3.1.17 (main), 1.2.6 (MCU) (Status: affected) ### References 1. [ZDI-25-329](https://www.zerodayinitiative.com/advisories/ZDI-25-329/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46947, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46947 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46947 - **State**: PUBLISHED - **Published Date**: February 27, 2024 at 18:40 UTC - **Last Updated**: May 04, 2025 at 07:00 UTC - **Reserved Date**: February 25, 2024 at 13:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues efx->xdp_tx_queue_count is initially initialized to num_possible_cpus() and is later used to allocate and traverse efx->xdp_tx_queues lookup array. However, we may end up not initializing all the array slots with real queues during probing. This results, for example, in a NULL pointer dereference, when running "# ethtool -S <iface>", similar to below [2570283.664955][T4126959] BUG: kernel NULL pointer dereference, address: 00000000000000f8 [2570283.681283][T4126959] #PF: supervisor read access in kernel mode [2570283.695678][T4126959] #PF: error_code(0x0000) - not-present page [2570283.710013][T4126959] PGD 0 P4D 0 [2570283.721649][T4126959] Oops: 0000 [#1] SMP PTI [2570283.734108][T4126959] CPU: 23 PID: 4126959 Comm: ethtool Tainted: G O 5.10.20-cloudflare-2021.3.1 #1 [2570283.752641][T4126959] Hardware name: <redacted> [2570283.781408][T4126959] RIP: 0010:efx_ethtool_get_stats+0x2ca/0x330 [sfc] [2570283.796073][T4126959] Code: 00 85 c0 74 39 48 8b 95 a8 0f 00 00 48 85 d2 74 2d 31 c0 eb 07 48 8b 95 a8 0f 00 00 48 63 c8 49 83 c4 08 83 c0 01 48 8b 14 ca <48> 8b 92 f8 00 00 00 49 89 54 24 f8 39 85 a0 0f 00 00 77 d7 48 8b [2570283.831259][T4126959] RSP: 0018:ffffb79a77657ce8 EFLAGS: 00010202 [2570283.845121][T4126959] RAX: 0000000000000019 RBX: ffffb799cd0c9280 RCX: 0000000000000018 [2570283.860872][T4126959] RDX: 0000000000000000 RSI: ffff96dd970ce000 RDI: 0000000000000005 [2570283.876525][T4126959] RBP: ffff96dd86f0a000 R08: ffff96dd970ce480 R09: 000000000000005f [2570283.892014][T4126959] R10: ffffb799cd0c9fff R11: ffffb799cd0c9000 R12: ffffb799cd0c94f8 [2570283.907406][T4126959] R13: ffffffffc11b1090 R14: ffff96dd970ce000 R15: ffffffffc11cd66c [2570283.922705][T4126959] FS: 00007fa7723f8740(0000) GS:ffff96f51fac0000(0000) knlGS:0000000000000000 [2570283.938848][T4126959] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [2570283.952524][T4126959] CR2: 00000000000000f8 CR3: 0000001a73e6e006 CR4: 00000000007706e0 [2570283.967529][T4126959] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [2570283.982400][T4126959] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [2570283.997308][T4126959] PKRU: 55555554 [2570284.007649][T4126959] Call Trace: [2570284.017598][T4126959] dev_ethtool+0x1832/0x2830 Fix this by adjusting efx->xdp_tx_queue_count after probing to reflect the true value of initialized slots in efx->xdp_tx_queues. ### Affected Products **Linux - Linux** Affected versions: - e26ca4b535820b1445dcef3c0f82b3fb5b45108b (Status: affected) - e26ca4b535820b1445dcef3c0f82b3fb5b45108b (Status: affected) **Linux - Linux** Affected versions: - 5.12 (Status: affected) - 0 (Status: unaffected) - 5.12.3 (Status: unaffected) - 5.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/ebeac958b690123a0b40aa61f688f2f170035fad) 2. [](https://git.kernel.org/stable/c/99ba0ea616aabdc8e26259fd722503e012199a76)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1672, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1672 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1672 - **State**: PUBLISHED - **Published Date**: April 11, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 19:01 UTC - **Reserved Date**: March 16, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in getcity.php in Hotel Booking Portal 0.1 allows remote attackers to execute arbitrary SQL commands via the country parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [hotelbookingportal-getcity-sql-injection(74612)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74612) 2. [18702](http://www.exploit-db.com/exploits/18702/) 3. [52879](http://www.securityfocus.com/bid/52879)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0341, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0341 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0341 - **State**: PUBLISHED - **Published Date**: July 16, 2018 at 17:00 UTC - **Last Updated**: November 29, 2024 at 14:55 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web-based UI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware before 11.2(1) could allow an authenticated, remote attacker to perform a command injection and execute commands with the privileges of the web server. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including arbitrary shell commands in a specific user input field. Cisco Bug IDs: CSCvi51426. ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **n/a - Cisco IP Phone 6800, 7800, and 8800 unknown** Affected versions: - Cisco IP Phone 6800, 7800, and 8800 unknown (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject) 2. [104731](http://www.securityfocus.com/bid/104731) 3. [1041285](http://www.securitytracker.com/id/1041285)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14766, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14766 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14766 - **State**: PUBLISHED - **Published Date**: October 21, 2020 at 14:04 UTC - **Last Updated**: September 26, 2024 at 20:26 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Web Administration). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N` ### Affected Products **Oracle Corporation - Business Intelligence Enterprise Edition** Affected versions: - 5.5.0.0.0 (Status: affected) - 11.1.1.9.0 (Status: affected) - 12.2.1.3.0 (Status: affected) - 12.2.1.4.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3242, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3242 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3242 - **State**: PUBLISHED - **Published Date**: June 15, 2007 at 01:00 UTC - **Last Updated**: August 07, 2024 at 14:05 UTC - **Reserved Date**: June 14, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Menu Manager Mod for (1) web-app.net WebAPP (aka WebAPP NE) 0.9.9.3.3 through 0.9.9.8, and (2) web-app.org WebAPP before 0.9.9.6, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the titles of items in a personal menu. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.web-app.net/cgi-bin/index.cgi?action=downloadinfo&cat=security&id=3) 2. [24453](http://www.securityfocus.com/bid/24453) 3. [20070627 Web-APP.org feedback on CVE-2007-3242](http://www.attrition.org/pipermail/vim/2007-June/001686.html) 4. [20070612 Menu Manager Mod for WebAPP - No Input Filtering](http://www.securityfocus.com/archive/1/471213/100/0/threaded) 5. [20070618 Re: Menu Manager Mod for WebAPP - No Input Filtering](http://www.securityfocus.com/archive/1/471638/100/100/threaded) 6. [webapp-menu-command-execution(34845)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34845)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49111, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49111 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49111 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 01:54 UTC - **Last Updated**: May 04, 2025 at 08:30 UTC - **Reserved Date**: February 26, 2025 at 01:49 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use after free in hci_send_acl This fixes the following trace caused by receiving HCI_EV_DISCONN_PHY_LINK_COMPLETE which does call hci_conn_del without first checking if conn->type is in fact AMP_LINK and in case it is do properly cleanup upper layers with hci_disconn_cfm: ================================================================== BUG: KASAN: use-after-free in hci_send_acl+0xaba/0xc50 Read of size 8 at addr ffff88800e404818 by task bluetoothd/142 CPU: 0 PID: 142 Comm: bluetoothd Not tainted 5.17.0-rc5-00006-gda4022eeac1a #7 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x45/0x59 print_address_description.constprop.0+0x1f/0x150 kasan_report.cold+0x7f/0x11b hci_send_acl+0xaba/0xc50 l2cap_do_send+0x23f/0x3d0 l2cap_chan_send+0xc06/0x2cc0 l2cap_sock_sendmsg+0x201/0x2b0 sock_sendmsg+0xdc/0x110 sock_write_iter+0x20f/0x370 do_iter_readv_writev+0x343/0x690 do_iter_write+0x132/0x640 vfs_writev+0x198/0x570 do_writev+0x202/0x280 do_syscall_64+0x38/0x90 entry_SYSCALL_64_after_hwframe+0x44/0xae RSP: 002b:00007ffce8a099b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 14 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 RDX: 0000000000000001 RSI: 00007ffce8a099e0 RDI: 0000000000000015 RAX: ffffffffffffffda RBX: 00007ffce8a099e0 RCX: 00007f788fc3cf77 R10: 00007ffce8af7080 R11: 0000000000000246 R12: 000055e4ccf75580 RBP: 0000000000000015 R08: 0000000000000002 R09: 0000000000000001 </TASK> R13: 000055e4ccf754a0 R14: 000055e4ccf75cd0 R15: 000055e4ccf4a6b0 Allocated by task 45: kasan_save_stack+0x1e/0x40 __kasan_kmalloc+0x81/0xa0 hci_chan_create+0x9a/0x2f0 l2cap_conn_add.part.0+0x1a/0xdc0 l2cap_connect_cfm+0x236/0x1000 le_conn_complete_evt+0x15a7/0x1db0 hci_le_conn_complete_evt+0x226/0x2c0 hci_le_meta_evt+0x247/0x450 hci_event_packet+0x61b/0xe90 hci_rx_work+0x4d5/0xc50 process_one_work+0x8fb/0x15a0 worker_thread+0x576/0x1240 kthread+0x29d/0x340 ret_from_fork+0x1f/0x30 Freed by task 45: kasan_save_stack+0x1e/0x40 kasan_set_track+0x21/0x30 kasan_set_free_info+0x20/0x30 __kasan_slab_free+0xfb/0x130 kfree+0xac/0x350 hci_conn_cleanup+0x101/0x6a0 hci_conn_del+0x27e/0x6c0 hci_disconn_phylink_complete_evt+0xe0/0x120 hci_event_packet+0x812/0xe90 hci_rx_work+0x4d5/0xc50 process_one_work+0x8fb/0x15a0 worker_thread+0x576/0x1240 kthread+0x29d/0x340 ret_from_fork+0x1f/0x30 The buggy address belongs to the object at ffff88800c0f0500 The buggy address is located 24 bytes inside of which belongs to the cache kmalloc-128 of size 128 The buggy address belongs to the page: 128-byte region [ffff88800c0f0500, ffff88800c0f0580) flags: 0x100000000000200(slab|node=0|zone=1) page:00000000fe45cd86 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc0f0 raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 raw: 0100000000000200 ffffea00003a2c80 dead000000000004 ffff8880078418c0 page dumped because: kasan: bad access detected ffff88800c0f0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc Memory state around the buggy address: >ffff88800c0f0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88800c0f0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff88800c0f0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ---truncated--- ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 4.9.311 (Status: unaffected) - 4.14.276 (Status: unaffected) - 4.19.238 (Status: unaffected) - 5.4.189 (Status: unaffected) - 5.10.111 (Status: unaffected) - 5.15.34 (Status: unaffected) - 5.16.20 (Status: unaffected) - 5.17.3 (Status: unaffected) - 5.18 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/c41de54b0a963e59e4dd04c029a4a6d73f45ef9c) 2. [](https://git.kernel.org/stable/c/643a6c26bd32e339d00ad97b8822b6db009e803c) 3. [](https://git.kernel.org/stable/c/684e505406abaeabe0058e9776f9210bf2747953) 4. [](https://git.kernel.org/stable/c/3803d896ddd97c7c16689a5381c0960040727647) 5. [](https://git.kernel.org/stable/c/2cc803804ec9a296b3156855d6c8c4ca1c6b84be) 6. [](https://git.kernel.org/stable/c/d404765dffdbd8dcd14758695d0c96c52fb2e624) 7. [](https://git.kernel.org/stable/c/4da302b90b96c309987eb9b37c8547f939f042d2) 8. [](https://git.kernel.org/stable/c/b3c2ea1fd444b3bb7b82bfd2c3a45418f85c2502) 9. [](https://git.kernel.org/stable/c/f63d24baff787e13b723d86fe036f84bdbc35045)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2095, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2095 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2095 - **State**: PUBLISHED - **Published Date**: March 07, 2025 at 22:00 UTC - **Last Updated**: March 07, 2025 at 22:28 UTC - **Reserved Date**: March 07, 2025 at 15:44 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This affects the function setDmzCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-78: OS Command Injection - CWE-77: Security Weakness ### Affected Products **TOTOLINK - EX1800T** Affected versions: - 9.1.0cu.2112_B20220316 (Status: affected) ### References 1. [VDB-298953 | TOTOLINK EX1800T cstecgi.cgi setDmzCfg os command injection](https://vuldb.com/?id.298953) 2. [VDB-298953 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.298953) 3. [Submit #515321 | Totolink EX1800T V9.1.0cu.2112_B20220316 OS Command Injection](https://vuldb.com/?submit.515321) 4. [](https://github.com/kn0sky/cve/blob/main/TOTOLINK%20EX1800T/OS%20Command%20Injection%2003%20setDmzCfg-_ip.md) 5. [](https://www.totolink.net/) ### Credits - selph (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7484, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7484 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7484 - **State**: PUBLISHED - **Published Date**: February 26, 2018 at 02:00 UTC - **Last Updated**: September 16, 2024 at 18:03 UTC - **Reserved Date**: February 25, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in PureVPN through 5.19.4.0 on Windows. The client installation grants the Everyone group Full Control permission to the installation directory. In addition, the PureVPNService.exe service, which runs under NT Authority\SYSTEM privileges, tries to load several dynamic-link libraries using relative paths instead of the absolute path. When not using a fully qualified path, the application will first try to load the library from the directory from which the application is started. As the residing directory of PureVPNService.exe is writable to all users, this makes the application susceptible to privilege escalation through DLL hijacking. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.defensecode.com/advisories/DC-2018-02-001-PureVPN-Windows-Privilege-Escalation.pdf) 2. [](https://www.securityfocus.com/archive/1/541803)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26346, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26346 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26346 - **State**: PUBLISHED - **Published Date**: January 10, 2023 at 19:50 UTC - **Last Updated**: April 09, 2025 at 15:14 UTC - **Reserved Date**: January 29, 2021 at 21:24 UTC - **Assigned By**: AMD ### Vulnerability Description Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service. ### Affected Products ** AMD - Ryzen 5000 Series** Affected versions: - various (Status: affected) ### References 1. [](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34421 - **State**: PUBLISHED - **Published Date**: March 16, 2023 at 11:57 UTC - **Last Updated**: February 26, 2025 at 15:27 UTC - **Reserved Date**: June 23, 2022 at 18:55 UTC - **Assigned By**: dell ### Vulnerability Description Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Dell - PowerEdge Platform** Affected versions: - 14G,15G (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32395, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32395 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32395 - **State**: PUBLISHED - **Published Date**: April 10, 2025 at 13:25 UTC - **Last Updated**: April 10, 2025 at 14:14 UTC - **Reserved Date**: April 06, 2025 at 19:46 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Vite is a frontend tooling framework for javascript. Prior to 6.2.6, 6.1.5, 6.0.15, 5.4.18, and 4.5.13, the contents of arbitrary files can be returned to the browser if the dev server is running on Node or Bun. HTTP 1.1 spec (RFC 9112) does not allow # in request-target. Although an attacker can send such a request. For those requests with an invalid request-line (it includes request-target), the spec recommends to reject them with 400 or 301. The same can be said for HTTP 2. On Node and Bun, those requests are not rejected internally and is passed to the user land. For those requests, the value of http.IncomingMessage.url contains #. Vite assumed req.url won't contain # when checking server.fs.deny, allowing those kinds of requests to bypass the check. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) and running the Vite dev server on runtimes that are not Deno (e.g. Node, Bun) are affected. This vulnerability is fixed in 6.2.6, 6.1.5, 6.0.15, 5.4.18, and 4.5.13. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **vitejs - vite** Affected versions: - >= 6.2.0, < 6.2.6 (Status: affected) - >= 6.1.0, < 6.1.5 (Status: affected) - >= 6.0.0, < 6.0.15 (Status: affected) - >= 5.0.0, < 5.4.18 (Status: affected) - < 4.5.13 (Status: affected) ### References 1. [https://github.com/vitejs/vite/security/advisories/GHSA-356w-63v5-8wf4](https://github.com/vitejs/vite/security/advisories/GHSA-356w-63v5-8wf4) 2. [https://github.com/vitejs/vite/commit/175a83909f02d3b554452a7bd02b9f340cdfef70](https://github.com/vitejs/vite/commit/175a83909f02d3b554452a7bd02b9f340cdfef70)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30303, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30303 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30303 - **State**: PUBLISHED - **Published Date**: May 02, 2024 at 21:04 UTC - **Last Updated**: August 02, 2024 at 01:32 UTC - **Reserved Date**: March 26, 2024 at 16:04 UTC - **Assigned By**: adobe ### Vulnerability Description Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Adobe - Acrobat Reader** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb24-07.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45668, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45668 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45668 - **State**: PUBLISHED - **Published Date**: December 26, 2021 at 00:25 UTC - **Last Updated**: August 04, 2024 at 04:47 UTC - **Reserved Date**: December 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by stored XSS. This affects EAX20 before 1.0.0.48, EAX80 before 1.0.1.64, EX3700 before 1.0.0.90, EX3800 before 1.0.0.90, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7500 before 1.0.0.72, R7960P before 1.4.1.66, R7900P before 1.4.1.66, R8000P before 1.4.1.66, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX200 before 1.0.3.106, RAX45 before 1.0.2.72, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, and RAX80 before 1.0.3.106. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:H/AV:A/A:L/C:L/I:H/PR:H/S:C/UI:R` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000064122/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Extenders-PSV-2020-0257)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5412, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5412 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5412 - **State**: PUBLISHED - **Published Date**: December 10, 2008 at 00:00 UTC - **Last Updated**: August 07, 2024 at 10:56 UTC - **Reserved Date**: December 09, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in IBM WebSphere Application Server (WAS) 7 before 7.0.0.1 on Windows has unknown impact and attack vectors related to JSPs. NOTE: this is probably a duplicate of CVE-2009-0438. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33022](http://secunia.com/advisories/33022) 2. [PK75248](http://www-1.ibm.com/support/docview.wss?uid=swg1PK75248) 3. [ADV-2008-3370](http://www.vupen.com/english/advisories/2008/3370) 4. [32679](http://www.securityfocus.com/bid/32679) 5. [](http://www-01.ibm.com/support/docview.wss?uid=swg27014463) 6. [websphere-jsp-unspecified(47134)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47134)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38358, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38358 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38358 - **State**: PUBLISHED - **Published Date**: September 10, 2021 at 13:34 UTC - **Last Updated**: May 02, 2025 at 19:43 UTC - **Reserved Date**: August 09, 2021 at 00:00 UTC - **Assigned By**: Wordfence ### Vulnerability Description The MoolaMojo WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the classes parameter found in the ~/views/button-generator.html.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.7.4.1. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **MoolaMojo - MoolaMojo** Affected versions: - 0.7.4.1 (Status: affected) ### References 1. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38358) 2. [](https://plugins.trac.wordpress.org/browser/moolamojo/trunk/views/button-generator.html.php#L16) ### Credits - p7e4
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1041, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1041 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1041 - **State**: PUBLISHED - **Published Date**: May 20, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:12 UTC - **Reserved Date**: May 13, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Internet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA04-196A](http://www.us-cert.gov/cas/techalerts/TA04-196A.html) 2. [oval:org.mitre.oval:def:1186](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1186) 3. [9320](http://www.securityfocus.com/bid/9320) 4. [MS04-023](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-023) 5. [oval:org.mitre.oval:def:1943](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1943) 6. [VU#187196](http://www.kb.cert.org/vuls/id/187196) 7. [oval:org.mitre.oval:def:956](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A956) 8. [oval:org.mitre.oval:def:3514](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3514) 9. [ie-showhelp-directory-traversal(14105)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14105) 10. [20031230 IE 5.x-6.0 allows executing arbitrary programs using showHelp()](http://www.securityfocus.com/archive/1/348521)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0572, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0572 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0572 - **State**: PUBLISHED - **Published Date**: February 13, 2009 at 17:00 UTC - **Last Updated**: August 07, 2024 at 04:40 UTC - **Reserved Date**: February 13, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in include/flatnux.php in FlatnuX CMS (aka Flatnuke3) 2009-01-27 and 2009-02-04, when register_globals is enabled and magic_quotes_gpc disabled, allows remote attackers to execute arbitrary PHP code via a URL in the _FNROOTPATH parameter to (1) index.php and (2) filemanager.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33599](http://www.securityfocus.com/bid/33599) 2. [51728](http://osvdb.org/51728) 3. [20090202 flatnux Flatnux-2009-01-27 Remote File Include](http://www.securityfocus.com/archive/1/500663/100/0/threaded) 4. [33721](http://secunia.com/advisories/33721) 5. [51729](http://osvdb.org/51729) 6. [flatnuxcms-fnrootpath-file-include(48491)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48491) 7. [7969](https://www.exploit-db.com/exploits/7969)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-21428, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-21428 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-21428 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 00:00 UTC - **Last Updated**: May 02, 2025 at 15:29 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer Overflow vulnerability in function LoadRGB in PluginDDS.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/freeimage/bugs/299/) 2. [FEDORA-2023-a8b26b910d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RUEK2JOVJBQZVNQIIZZO3JFMTVB4R5KS/) 3. [FEDORA-2023-2840932fa8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGOMCRAANNCQYJYPPMGRQWKRZGIP6NME/) 4. [[debian-lts-announce] 20231125 [SECURITY] [DLA 3662-1] freeimage security update](https://lists.debian.org/debian-lts-announce/2023/11/msg00020.html) 5. [DSA-5579](https://www.debian.org/security/2023/dsa-5579)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0296, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0296 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0296 - **State**: PUBLISHED - **Published Date**: October 19, 2021 at 18:16 UTC - **Last Updated**: September 17, 2024 at 02:47 UTC - **Reserved Date**: October 27, 2020 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description The Juniper Networks CTPView server is not enforcing HTTP Strict Transport Security (HSTS). HSTS is an optional response header which allows servers to indicate that content from the requested domain will only be served over HTTPS. The lack of HSTS may leave the system vulnerable to downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections. This issue affects Juniper Networks CTPView: 7.3 versions prior to 7.3R7; 9.1 versions prior to 9.1R3. ### CVSS Metrics - **CVSS Base Score**: 7.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-319: Security Weakness ### Affected Products **Juniper Networks - CTPView** Affected versions: - 7.3 (Status: affected) - 9.1 (Status: affected) ### References 1. [](https://kb.juniper.net/JSA11210)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16663, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16663 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16663 - **State**: PUBLISHED - **Published Date**: September 07, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 10:32 UTC - **Reserved Date**: September 07, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Contiki-NG through 4.1. There is a stack-based buffer overflow in parse_relations in os/storage/antelope/aql-parser.c while parsing AQL (storage of relations). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/contiki-ng/contiki-ng/issues/599)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1002016, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1002016 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1002016 - **State**: PUBLISHED - **Published Date**: September 14, 2017 at 13:00 UTC - **Last Updated**: September 16, 2024 at 23:01 UTC - **Reserved Date**: September 14, 2017 at 00:00 UTC - **Assigned By**: larry_cashdollar ### Vulnerability Description Vulnerability in wordpress plugin flickr-picture-backup v0.7, The code in flickr-picture-download.php doesn't check to see if the user is authenticated or that they have permission to upload files. ### Affected Products **daozhao - flickr-picture-backup** Affected versions: - unspecified (Status: affected) ### References 1. [](http://www.vapidlabs.com/advisory.php?v=190) 2. [](https://wordpress.org/plugins/flickr-picture-backup/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6389, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6389 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6389 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: July 26, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9029, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9029 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9029 - **State**: PUBLISHED - **Published Date**: June 13, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 08:36 UTC - **Reserved Date**: April 18, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In all Android releases from CAF using the Linux kernel, a vulnerability exists in the access control settings of modem memory. ### Affected Products **Qualcomm, Inc. - All Qualcomm products** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-06-01) 2. [98874](http://www.securityfocus.com/bid/98874) 3. [1038623](http://www.securitytracker.com/id/1038623)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0960, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0960 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0960 - **State**: PUBLISHED - **Published Date**: November 24, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 18:45 UTC - **Reserved Date**: February 01, 2012 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description Unity integration extension (unity-firefox-extension) before 2.4.1 for Firefox does not properly handle callbacks, which allows remote attackers to cause a denial of service (Firefox crash) and possibly execute arbitrary code via a crafted request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [56650](http://www.securityfocus.com/bid/56650) 2. [unityfirefoxextension-callback-dos(80319)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80319) 3. [](https://bugs.launchpad.net/unity-firefox-extension/%2Bbug/1076350) 4. [USN-1639-1](http://www.ubuntu.com/usn/USN-1639-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47655 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 01:54 UTC - **Last Updated**: May 04, 2025 at 07:15 UTC - **Reserved Date**: February 26, 2025 at 01:48 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: media: venus: vdec: fixed possible memory leak issue The venus_helper_alloc_dpb_bufs() implementation allows an early return on an error path when checking the id from ida_alloc_min() which would not release the earlier buffer allocation. Move the direct kfree() from the error checking of dma_alloc_attrs() to the common fail path to ensure that allocations are released on all error paths in this function. Addresses-Coverity: 1494120 ("Resource leak") ### Affected Products **Linux - Linux** Affected versions: - 745e6d8bbe6a6e2e40b1609cea114c129f17031a (Status: affected) - 40d87aafee29fb01ce1e1868502fb2059a6a7f34 (Status: affected) - 40d87aafee29fb01ce1e1868502fb2059a6a7f34 (Status: affected) - 40d87aafee29fb01ce1e1868502fb2059a6a7f34 (Status: affected) **Linux - Linux** Affected versions: - 5.16 (Status: affected) - 0 (Status: unaffected) - 5.16.19 (Status: unaffected) - 5.17.2 (Status: unaffected) - 5.18 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/5cedfe8aaf1875a5305897107b7f298db4260019) 2. [](https://git.kernel.org/stable/c/55bccafc246b2e64763a155ec454470c07a54a6e) 3. [](https://git.kernel.org/stable/c/5f89d05ba93df9c2cdfe493843f93288e55e99eb) 4. [](https://git.kernel.org/stable/c/8403fdd775858a7bf04868d43daea0acbe49ddfc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4842, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4842 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4842 - **State**: PUBLISHED - **Published Date**: May 17, 2025 at 23:00 UTC - **Last Updated**: May 19, 2025 at 15:23 UTC - **Reserved Date**: May 16, 2025 at 14:49 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared as critical. This vulnerability affects the function isUCPCameraNameChanged of the file /sbin/ucp. The manipulation of the argument CameraName leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow - CWE-119: Security Weakness ### Affected Products **D-Link - DCS-932L** Affected versions: - 2.18.01 (Status: affected) ### References 1. [VDB-309310 | D-Link DCS-932L ucp isUCPCameraNameChanged stack-based overflow](https://vuldb.com/?id.309310) 2. [VDB-309310 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.309310) 3. [Submit #574925 | D-Link DCS-932L 2.18.01 Stack-based Buffer Overflow](https://vuldb.com/?submit.574925) 4. [](https://github.com/BeaCox/IoT_vuln/tree/main/D-Link/DCS-932L/ucp_bof) 5. [](https://www.dlink.com/) ### Credits - BeaCox (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5800, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5800 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5800 - **State**: PUBLISHED - **Published Date**: October 16, 2013 at 17:31 UTC - **Last Updated**: August 06, 2024 at 17:22 UTC - **Reserved Date**: September 18, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JGSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:19093](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19093) 2. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml) 3. [RHSA-2013:1447](http://rhn.redhat.com/errata/RHSA-2013-1447.html) 4. [RHSA-2013:1440](http://rhn.redhat.com/errata/RHSA-2013-1440.html) 5. [USN-2089-1](http://www.ubuntu.com/usn/USN-2089-1) 6. [SUSE-SU-2013:1677](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html) 7. [](http://www-01.ibm.com/support/docview.wss?uid=swg21655201) 8. [openSUSE-SU-2013:1663](http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html) 9. [SUSE-SU-2013:1666](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html) 10. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html) 11. [RHSA-2013:1507](http://rhn.redhat.com/errata/RHSA-2013-1507.html) 12. [56338](http://secunia.com/advisories/56338) 13. [RHSA-2013:1451](http://rhn.redhat.com/errata/RHSA-2013-1451.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1922, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1922 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1922 - **State**: PUBLISHED - **Published Date**: February 27, 2024 at 15:31 UTC - **Last Updated**: August 01, 2024 at 18:56 UTC - **Reserved Date**: February 27, 2024 at 07:32 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in SourceCodester Online Job Portal 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /Employer/ManageJob.php of the component Manage Job Page. The manipulation of the argument Qualification/Description leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-254857 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SourceCodester - Online Job Portal** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-254857 | SourceCodester Online Job Portal Manage Job Page ManageJob.php cross site scripting](https://vuldb.com/?id.254857) 2. [VDB-254857 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.254857) 3. [](https://prnt.sc/zw3SnPnfpKGu) 4. [](https://prnt.sc/WD3nof5FsEBv) ### Credits - ahmed8199 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6511, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6511 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6511 - **State**: PUBLISHED - **Published Date**: March 07, 2017 at 19:00 UTC - **Last Updated**: May 05, 2025 at 19:04 UTC - **Reserved Date**: March 07, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description andrzuk/FineCMS before 2017-03-06 is vulnerable to a reflected XSS in index.php because of missing validation of the action parameter in application/classes/application.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/andrzuk/FineCMS/commit/2c80de96d403d4a2e81ac4c48f358bdffbe85ea0) 2. [](https://github.com/andrzuk/FineCMS/issues/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3471, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3471 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3471 - **State**: PUBLISHED - **Published Date**: July 21, 2016 at 10:00 UTC - **Last Updated**: October 11, 2024 at 20:56 UTC - **Reserved Date**: March 17, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2016:1481](http://rhn.redhat.com/errata/RHSA-2016-1481.html) 2. [RHSA-2016:1132](https://access.redhat.com/errata/RHSA-2016:1132) 3. [RHSA-2016:0534](http://rhn.redhat.com/errata/RHSA-2016-0534.html) 4. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html) 5. [RHSA-2016:1480](http://rhn.redhat.com/errata/RHSA-2016-1480.html) 6. [1036362](http://www.securitytracker.com/id/1036362) 7. [91913](http://www.securityfocus.com/bid/91913) 8. [91787](http://www.securityfocus.com/bid/91787) 9. [RHSA-2016:0705](http://rhn.redhat.com/errata/RHSA-2016-0705.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21529, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21529 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21529 - **State**: PUBLISHED - **Published Date**: April 02, 2021 at 21:20 UTC - **Last Updated**: September 17, 2024 at 00:00 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell System Update (DSU) 1.9 and earlier versions contain a denial of service vulnerability. A local authenticated malicious user with low privileges may potentially exploit this vulnerability to cause the system to run out of memory by running multiple instances of the vulnerable application. ### CVSS Metrics - **CVSS Base Score**: 3.8/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **Dell - DellEMC System Update - DSU** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000184608/dsa-2021-059-dell-emc-system-update-dsu-security-update-for-denial-of-service-vulnerability)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54042, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54042 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54042 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 20:42 UTC - **Last Updated**: January 07, 2025 at 18:35 UTC - **Reserved Date**: November 27, 2024 at 16:21 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an unauthenticated attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Connect** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/connect/apsb24-99.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8809, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8809 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8809 - **State**: PUBLISHED - **Published Date**: December 24, 2014 at 18:00 UTC - **Last Updated**: August 06, 2024 at 13:26 UTC - **Reserved Date**: November 13, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the WP Symposium plugin before 14.11 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter in an addComment action to ajax/profile_functions.php, (2) compose_text parameter in a sendMail action to ajax/mail_functions.php, (3) comment parameter in an add_comment action to ajax/lounge_functions.php, or (4) name parameter in a create_album action to ajax/gallery_functions.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://security.szurek.pl/wp-symposium-1410-multiple-xss-and-sql-injection.html) 2. [](http://www.wpsymposium.com/release-information-for-v14-11/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16762, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16762 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16762 - **State**: PUBLISHED - **Published Date**: November 15, 2019 at 23:10 UTC - **Last Updated**: August 05, 2024 at 01:24 UTC - **Reserved Date**: September 24, 2019 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. Affected users can upgrade to any version >= 0.21.4. ### CVSS Metrics - **CVSS Base Score**: 5.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **simpleledger - slpjs** Affected versions: - < 0.21.4 (Status: affected) ### References 1. [](https://github.com/simpleledger/slpjs/security/advisories/GHSA-425c-ccf3-3jrr) 2. [](https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13109, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13109 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13109 - **State**: PUBLISHED - **Published Date**: May 16, 2020 at 01:56 UTC - **Last Updated**: August 04, 2024 at 12:11 UTC - **Reserved Date**: May 16, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Morita Shogi 64 through 2020-05-02 for Nintendo 64 devices allows remote attackers to execute arbitrary code via crafted packet data to the built-in modem because 0x800b3e94 (aka the IF subcommand to top-level command 7) has a stack-based buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cturt.github.io/shogihax.html) 2. [](https://github.com/CTurt/shogihax)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30202, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30202 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30202 - **State**: PUBLISHED - **Published Date**: April 30, 2025 at 00:24 UTC - **Last Updated**: April 30, 2025 at 13:16 UTC - **Reserved Date**: March 18, 2025 at 18:15 UTC - **Assigned By**: GitHub_M ### Vulnerability Description vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.5.2 and prior to 0.8.5 are vulnerable to denial of service and data exposure via ZeroMQ on multi-node vLLM deployment. In a multi-node vLLM deployment, vLLM uses ZeroMQ for some multi-node communication purposes. The primary vLLM host opens an XPUB ZeroMQ socket and binds it to ALL interfaces. While the socket is always opened for a multi-node deployment, it is only used when doing tensor parallelism across multiple hosts. Any client with network access to this host can connect to this XPUB socket unless its port is blocked by a firewall. Once connected, these arbitrary clients will receive all of the same data broadcasted to all of the secondary vLLM hosts. This data is internal vLLM state information that is not useful to an attacker. By potentially connecting to this socket many times and not reading data published to them, an attacker can also cause a denial of service by slowing down or potentially blocking the publisher. This issue has been patched in version 0.8.5. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-770: Security Weakness ### Affected Products **vllm-project - vllm** Affected versions: - >= 0.5.2, < 0.8.5 (Status: affected) ### References 1. [https://github.com/vllm-project/vllm/security/advisories/GHSA-9f8f-2vmf-885j](https://github.com/vllm-project/vllm/security/advisories/GHSA-9f8f-2vmf-885j) 2. [https://github.com/vllm-project/vllm/pull/6183](https://github.com/vllm-project/vllm/pull/6183) 3. [https://github.com/vllm-project/vllm/commit/a0304dc504c85f421d38ef47c64f83046a13641c](https://github.com/vllm-project/vllm/commit/a0304dc504c85f421d38ef47c64f83046a13641c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4020, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4020 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4020 - **State**: PUBLISHED - **Published Date**: November 08, 2012 at 11:00 UTC - **Last Updated**: August 06, 2024 at 20:21 UTC - **Reserved Date**: July 12, 2012 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description MosP kintai kanri before 4.1.0 does not enforce privilege requirements, which allows remote authenticated users to read other users' information via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [JVNDB-2012-000096](http://jvndb.jvn.jp/jvndb/JVNDB-2012-000096) 2. [56368](http://www.securityfocus.com/bid/56368) 3. [JVN#23465354](http://jvn.jp/en/jp/JVN23465354/index.html) 4. [51110](http://secunia.com/advisories/51110)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5513, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5513 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5513 - **State**: PUBLISHED - **Published Date**: June 01, 2018 at 14:00 UTC - **Last Updated**: September 16, 2024 at 19:36 UTC - **Reserved Date**: January 12, 2018 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description On F5 BIG-IP 13.1.0-13.1.0.3, 13.0.0, 12.1.0-12.1.3.3, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1, a malformed TLS handshake causes TMM to crash leading to a disruption of service. This issue is only exposed on the data plane when Proxy SSL configuration is enabled. The control plane is not impacted by this issue. ### Affected Products **F5 Networks, Inc. - BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe)** Affected versions: - 13.1.0-13.1.0.3 (Status: affected) - 13.0.0 (Status: affected) - 12.1.0-12.1.3.3 (Status: affected) - 11.6.1-11.6.3.1 (Status: affected) - 11.5.1-11.5.5 (Status: affected) - 11.2.1 (Status: affected) ### References 1. [](https://support.f5.com/csp/article/K46940010) 2. [1041017](http://www.securitytracker.com/id/1041017)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1140, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1140 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1140 - **State**: PUBLISHED - **Published Date**: March 06, 2013 at 11:00 UTC - **Last Updated**: September 17, 2024 at 02:21 UTC - **Reserved Date**: January 11, 2013 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The XML parser in Cisco Security Monitoring, Analysis, and Response System (MARS) allows remote attackers to read arbitrary files via an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, aka Bug ID CSCue55093. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20130304 Cisco MARS Information Disclosure Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1140)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5062, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5062 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5062 - **State**: PUBLISHED - **Published Date**: June 30, 2024 at 15:14 UTC - **Last Updated**: August 01, 2024 at 21:03 UTC - **Reserved Date**: May 17, 2024 at 12:00 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml version 0.57.1. The vulnerability exists due to improper neutralization of input during web page generation, specifically within the survey redirect parameter. This flaw allows an attacker to redirect users to a specified URL after completing a survey, without proper validation of the 'redirect' parameter. Consequently, an attacker can execute arbitrary JavaScript code in the context of the user's browser session. This vulnerability could be exploited to steal cookies, potentially leading to account takeover. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **zenml-io - zenml-io/zenml** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/ceddd3c1-a9da-4d6c-85c4-41d4d1e1102f) 2. [](https://github.com/zenml-io/zenml/commit/21edd863c0ba53c1110b6f018a07c2d6853cf6d4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0861, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0861 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0861 - **State**: PUBLISHED - **Published Date**: August 23, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:03 UTC - **Reserved Date**: August 15, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Microsoft Office Web Components (OWC) 2000 and 2002 allows remote attackers to bypass the "Allow paste operations via script" setting, even when it is disabled, via the (1) Copy method of the Cell object or (2) the Paste method of the Range object. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [owc-spreadsheet-clipboard-access(8779)](http://www.iss.net/security_center/static/8779.php) 2. [20020408 Controlling the clipboard with OWC in IE (GM#007-IE)](http://marc.info/?l=bugtraq&m=101829726516346&w=2) 3. [4457](http://www.securityfocus.com/bid/4457) 4. [MS02-044](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-044)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11134, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11134 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11134 - **State**: PUBLISHED - **Published Date**: June 09, 2021 at 05:00 UTC - **Last Updated**: August 04, 2024 at 11:21 UTC - **Reserved Date**: March 31, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Possible stack out of bound write might happen due to time bitmap length and bit duration fields of the attributes like NAN ranging setup attribute inside a NAN management frame are not Properly validated in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking** Affected versions: - AQT1000, AR8031, AR8035, CSR8811, CSRA6620, CSRA6640, IPQ5010, IPQ5018, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, PM3003A, PM4125, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350C, PM855, PM855A, PM855B, PM855L, PM855P, PMC1000H, PMC7180, PMD9655, PMI632, PMK8002, PMK8003, PMK8350, PMM8155AU, PMM855AU, PMP8074, PMR525, PMR735A, PMR735B, PMX50, PMX55, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1500, QBT2000, QCA4024, QCA6175A, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6428, QCA6430, QCA6431, QCA6436, QCA6438, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6694, QCA6696, QCA8072, QCA8075 ...[truncated*] (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28503, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28503 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28503 - **State**: PUBLISHED - **Published Date**: March 29, 2023 at 20:09 UTC - **Last Updated**: February 18, 2025 at 16:05 UTC - **Reserved Date**: March 16, 2023 at 20:44 UTC - **Assigned By**: rapid7 ### Vulnerability Description Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from an authentication bypass vulnerability, where a special username with a deterministic password can be leveraged to bypass authentication checks and execute OS commands as the root user. ### Weakness Classification (CWE) - CWE-798: Cross-site Scripting (XSS) ### Affected Products **Rocket Software - UniData** Affected versions: - 0 (Status: affected) **Rocket Software - UniVerse** Affected versions: - 0 (Status: affected) - 0 (Status: affected) ### References 1. [](https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/) 2. [](http://packetstormsecurity.com/files/171854/Rocket-Software-Unidata-udadmin_server-Authentication-Bypass.html) ### Credits - Ron Bowes
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6410, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6410 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6410 - **State**: PUBLISHED - **Published Date**: December 17, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 16:02 UTC - **Reserved Date**: December 17, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Gadu-Gadu does not properly perform protocol handling, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and add arbitrary user accounts or cause a denial of service as administrators via an unspecified "crafted link," possibly related to the gg protocol. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20071205 [ELEYTT] Public Advisory 05-12-2007](http://www.securityfocus.com/archive/1/484607/100/0/threaded) 2. [3458](http://securityreason.com/securityalert/3458)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53787, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53787 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53787 - **State**: PUBLISHED - **Published Date**: November 30, 2024 at 21:10 UTC - **Last Updated**: December 01, 2024 at 23:07 UTC - **Reserved Date**: November 22, 2024 at 13:53 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vinoth06 Random Banner allows Stored XSS.This issue affects Random Banner: from n/a through 4.2.9. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **vinoth06 - Random Banner** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/random-banner/vulnerability/wordpress-random-banner-plugin-4-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - LVT-tholv2k (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3570, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3570 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3570 - **State**: PUBLISHED - **Published Date**: July 13, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 18:30 UTC - **Reserved Date**: July 12, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the webform module in Drupal 4.6 before July 8, 2006 and 4.7 before July 8, 2006 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [21021](http://secunia.com/advisories/21021) 2. [18947](http://www.securityfocus.com/bid/18947) 3. [webform-unspecified-xss(27685)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27685) 4. [ADV-2006-2764](http://www.vupen.com/english/advisories/2006/2764) 5. [](http://drupal.org/node/72846)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23514, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23514 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23514 - **State**: PUBLISHED - **Published Date**: January 13, 2022 at 14:10 UTC - **Last Updated**: September 16, 2024 at 19:10 UTC - **Reserved Date**: January 08, 2021 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description This affects the package Crow before 0.3+4. It is possible to traverse directories to fetch arbitrary files from the server. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C` ### Affected Products **n/a - Crow** Affected versions: - unspecified (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-UNMANAGED-CROW-2336163) 2. [](https://github.com/CrowCpp/Crow/pull/317) 3. [](https://github.com/CrowCpp/Crow/releases/tag/v0.3%2B4) ### Credits - Snyk Security Team
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6685, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6685 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6685 - **State**: PUBLISHED - **Published Date**: November 13, 2013 at 15:00 UTC - **Last Updated**: September 16, 2024 at 20:07 UTC - **Reserved Date**: November 07, 2013 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The firmware on Cisco Unified IP phones 8961, 9951, and 9971 uses weak permissions for memory block devices, which allows local users to gain privileges by mounting a device with a setuid file in its filesystem, aka Bug ID CSCui04382. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20131112 Cisco Unified IP Phone 8900/9900 Series Insecure File Permissions Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6685)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6288, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6288 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6288 - **State**: PUBLISHED - **Published Date**: December 04, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 20:19 UTC - **Reserved Date**: December 04, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in Niek Albers CoolPlayer 216 and earlier allow remote attackers to execute arbitrary code via (1) a playlist file with long song names, because of an overflow in the CPL_AddPrefixedFile function in CPI_Playlist.c; (2) a skin file with long button names, because of an overflow in the main_skin_check_ini_value function in skin.c; and (3) a skin file with long bitmap filenames, because of an overflow in the main_skin_open function in skin.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [coolplayer-mainskinopen-bo(30863)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30863) 2. [23360](http://secunia.com/advisories/23360) 3. [](http://coolplayer.cvs.sourceforge.net/coolplayer/Main/stdafx.h?view=log) 4. [20061213 Coolplayer buffer overflow vulnerabilities](http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051269.html) 5. [ADV-2006-4806](http://www.vupen.com/english/advisories/2006/4806) 6. [](http://sourceforge.net/project/shownotes.php?group_id=31900&release_id=467783) 7. [20071227 Re: TotalPlayer 3.0 .m3u crash](http://www.securityfocus.com/archive/1/485547/100/100/threaded) 8. [4839](https://www.exploit-db.com/exploits/4839) 9. [20071227 Re: Re: TotalPlayer 3.0 .m3u crash](http://www.securityfocus.com/archive/1/485564/100/100/threaded) 10. [coolplayer-mainskincheck-bo(30861)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30861) 11. [20071227 Re: Re: Re: TotalPlayer 3.0 .m3u crash](http://www.securityfocus.com/archive/1/485578/100/100/threaded) 12. [21396](http://www.securityfocus.com/bid/21396) 13. [coolplayer-unspecified-bo(30658)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30658)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31273 - **State**: PUBLISHED - **Published Date**: June 14, 2022 at 12:15 UTC - **Last Updated**: August 03, 2024 at 07:11 UTC - **Reserved Date**: May 23, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in TopIDP3000 Topsec Operating System tos_3.3.005.665b.15_smpidp allows attackers to perform a brute-force attack via a crafted session_id cookie. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/jhhua/issus/blob/main/1.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52895, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52895 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52895 - **State**: PUBLISHED - **Published Date**: February 14, 2025 at 14:36 UTC - **Last Updated**: February 14, 2025 at 15:01 UTC - **Reserved Date**: November 17, 2024 at 14:25 UTC - **Assigned By**: ibm ### Vulnerability Description IBM i 7.4 and 7.5 is vulnerable to a database access denial of service caused by a bypass of a database capabilities restriction check. A privileged bad actor can remove or otherwise impact database infrastructure files resulting in incorrect behavior of software products that rely upon the database. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-754: Security Weakness ### Affected Products **IBM - i** Affected versions: - 7.4, 7.5 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7183052)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000613 - **State**: PUBLISHED - **Published Date**: July 09, 2018 at 20:00 UTC - **Last Updated**: November 14, 2024 at 20:37 UTC - **Reserved Date**: June 29, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs 1.58 up to but not including 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT private key can result in the execution of unexpected code. This attack appear to be exploitable via A handcrafted private key can include references to unexpected classes which will be picked up from the class path for the executing application. This vulnerability appears to have been fixed in 1.60 and later. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2020:0607](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html) 2. [](https://www.oracle.com/security-alerts/cpuapr2020.html) 3. [](https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html) 4. [](https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html) 5. [](https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html) 6. [[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12](https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E) 7. [](https://www.oracle.com/security-alerts/cpuoct2020.html) 8. [](https://security.netapp.com/advisory/ntap-20190204-0003/) 9. [](https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574) 10. [](https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc) 11. [](https://www.oracle.com/security-alerts/cpuApr2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35551, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35551 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35551 - **State**: PUBLISHED - **Published Date**: May 22, 2024 at 13:38 UTC - **Last Updated**: March 25, 2025 at 15:32 UTC - **Reserved Date**: May 17, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/infoWeb_deal.php?mudi=add. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/bearman113/1.md/blob/main/16/csrf.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48061 - **State**: PUBLISHED - **Published Date**: November 04, 2024 at 00:00 UTC - **Last Updated**: November 06, 2024 at 19:18 UTC - **Reserved Date**: October 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description langflow <=1.0.18 is vulnerable to Remote Code Execution (RCE) as any component provided the code functionality and the components run on the local machine rather than in a sandbox. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rumbling-slice-eb0.notion.site/There-is-a-Remote-Code-Execution-RCE-vulnerability-in-the-repository-https-github-com-langflow-a-105e3cda9e8c800fac92f1b571bd40d8) 2. [](https://gist.github.com/AfterSnows/1e58257867002462923fd62dde2b5d61)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1773, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1773 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1773 - **State**: PUBLISHED - **Published Date**: June 21, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:34 UTC - **Reserved Date**: June 21, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in ICQ 2.6x for MacOS X 10.0 through 10.1.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20020205 OSX ICQ DoS](http://online.securityfocus.com/archive/1/254133) 2. [20020205 Re: OSX ICQ DoS](http://online.securityfocus.com/archive/1/254141) 3. [icq-macos-dos(8085)](https://exchange.xforce.ibmcloud.com/vulnerabilities/8085) 4. [4031](http://www.securityfocus.com/bid/4031)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0240, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0240 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0240 - **State**: PUBLISHED - **Published Date**: January 11, 2008 at 22:00 UTC - **Last Updated**: August 07, 2024 at 07:39 UTC - **Reserved Date**: January 11, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description /idm/help/index.jsp in Sun Java System Identity Manager 6.0 SP1 through SP3, 7.0, and 7.1 allows remote attackers to inject frames from arbitrary web sites and conduct phishing attacks via the helpUrl parameter, aka "frame injection." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080110 PR07-06, PR07-07, PR07-08, PR07-09, PR07-10, PR07-12: Several XSS, Cross-domain Redirection and Frame Injection on Sun Java System Identity Manager](http://www.securityfocus.com/archive/1/486076/100/0/threaded) 2. [103180](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103180-1) 3. [ADV-2008-0089](http://www.vupen.com/english/advisories/2008/0089) 4. [28356](http://secunia.com/advisories/28356) 5. [3535](http://securityreason.com/securityalert/3535) 6. [sun-identity-index-frame-injection(39586)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39586) 7. [200558](http://sunsolve.sun.com/search/document.do?assetkey=1-66-200558-1) 8. [](http://www.procheckup.com/Vulnerability_PR07-10.php) 9. [27214](http://www.securityfocus.com/bid/27214)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4486, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4486 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4486 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13031, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13031 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13031 - **State**: PUBLISHED - **Published Date**: July 05, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 08:52 UTC - **Reserved Date**: June 30, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description DamiCMS v6.0.0 aand 6.1.0 allows CSRF via admin.php?s=/Admin/doadd to add an administrator account. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.cnblogs.com/v1vvwv/p/9248562.html) 2. [44960](https://www.exploit-db.com/exploits/44960/) 3. [](https://github.com/AutismJH/damicms/issues/6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2599, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2599 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2599 - **State**: PUBLISHED - **Published Date**: January 15, 2020 at 16:34 UTC - **Last Updated**: September 30, 2024 at 16:28 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Hospitality Cruise Materials Management product of Oracle Hospitality Applications (component: MMS All). The supported version that is affected is 7.30.567. Difficult to exploit vulnerability allows physical access to compromise Oracle Hospitality Cruise Materials Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Materials Management accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). ### Affected Products **Oracle Corporation - Hospitality Cruise Materials Management** Affected versions: - 7.30.567 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26247 - **State**: PUBLISHED - **Published Date**: December 30, 2020 at 00:00 UTC - **Last Updated**: August 04, 2024 at 15:56 UTC - **Reserved Date**: October 01, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4. ### CVSS Metrics - **CVSS Base Score**: 2.6/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-611: Security Weakness ### Affected Products **sparklemotion - nokogiri** Affected versions: - < 1.11.0.rc4 (Status: affected) ### References 1. [](https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m) 2. [](https://rubygems.org/gems/nokogiri) 3. [](https://hackerone.com/reports/747489) 4. [](https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4) 5. [](https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b) 6. [[debian-lts-announce] 20210606 [SECURITY] [DLA 2678-1] ruby-nokogiri security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html) 7. [GLSA-202208-29](https://security.gentoo.org/glsa/202208-29) 8. [[debian-lts-announce] 20221012 [SECURITY] [DLA 3149-1] ruby-nokogiri security update](https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1888, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1888 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1888 - **State**: PUBLISHED - **Published Date**: February 29, 2024 at 08:08 UTC - **Last Updated**: August 01, 2024 at 18:56 UTC - **Reserved Date**: February 26, 2024 at 09:37 UTC - **Assigned By**: Mattermost ### Vulnerability Description Mattermost fails to check the "invite_guest" permission when inviting guests of other teams to a team, allowing a member with permissions to add other members but not to add guests to add a guest to a team as long as the guest was already a guest in another team of the server ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Mattermost - Mattermost** Affected versions: - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 9.5.0 (Status: unaffected) - 9.4.2 (Status: unaffected) - 9.3.1 (Status: unaffected) - 9.2.5 (Status: unaffected) - 8.1.9 (Status: unaffected) ### References 1. [](https://mattermost.com/security-updates) ### Credits - Eva Sarafianou
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000181, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000181 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000181 - **State**: REJECTED - **Published Date**: August 20, 2017 at 22:00 UTC - **Last Updated**: September 16, 2024 at 20:59 UTC - **Reserved Date**: August 20, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9183, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9183 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9183 - **State**: PUBLISHED - **Published Date**: April 18, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 00:31 UTC - **Reserved Date**: August 16, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile SD 410/12, SD 617, SD 650/52, SD 800, SD 808, and SD 810, in TQS QSEE application, while parsing "Set Certificates" command an integer overflow may result in buffer overflow. ### Affected Products **Qualcomm, Inc. - Snapdragon Mobile** Affected versions: - SD 410/12, SD 617, SD 650/52, SD 800, SD 808, SD 810 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-04-01) 2. [103671](http://www.securityfocus.com/bid/103671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6223, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6223 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6223 - **State**: PUBLISHED - **Published Date**: January 23, 2017 at 21:00 UTC - **Last Updated**: August 06, 2024 at 01:22 UTC - **Reserved Date**: July 14, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The TIFFReadRawStrip1 and TIFFReadRawTile1 functions in tif_read.c in libtiff before 4.0.7 allows remote attackers to cause a denial of service (crash) or possibly obtain sensitive information via a negative index in a file-content buffer. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201701-16](https://security.gentoo.org/glsa/201701-16) 2. [](http://libtiff.maptools.org/v4.0.7.html) 3. [[oss-security] 20160714 Re: CVE request: Information leak in LibTIFF](http://www.openwall.com/lists/oss-security/2016/07/14/4) 4. [DSA-3762](http://www.debian.org/security/2017/dsa-3762) 5. [[oss-security] 20160713 CVE request: Information leak in LibTIFF](http://www.openwall.com/lists/oss-security/2016/07/13/3) 6. [91741](http://www.securityfocus.com/bid/91741)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2301, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2301 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2301 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 21:54 UTC - **Last Updated**: September 26, 2024 at 14:10 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). ### CVSS Metrics - **CVSS Base Score**: 2.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.23 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2021.html) 2. [](https://security.netapp.com/advisory/ntap-20210513-0002/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3343, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3343 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3343 - **State**: PUBLISHED - **Published Date**: January 27, 2017 at 22:01 UTC - **Last Updated**: October 08, 2024 at 20:25 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). ### Affected Products **Oracle - Marketing** Affected versions: - 12.1.1 (Status: affected) - 12.1.2 (Status: affected) - 12.1.3 (Status: affected) - 12.2.3 (Status: affected) - 12.2.4 (Status: affected) - 12.2.5 (Status: affected) - 12.2.6 (Status: affected) ### References 1. [95500](http://www.securityfocus.com/bid/95500) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7261, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7261 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7261 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 11:50 UTC - **Last Updated**: September 16, 2024 at 20:16 UTC - **Reserved Date**: January 21, 2020 at 00:00 UTC - **Assigned By**: trellix ### Vulnerability Description Buffer Overflow via Environment Variables vulnerability in AMSI component in McAfee Endpoint Security (ENS) Prior to 10.7.0 February 2020 Update allows local users to disable Endpoint Security via a carefully crafted user input. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **McAfee LLC - McAfee Endpoint Security (ENS)** Affected versions: - 10.x (Status: affected) ### References 1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10309)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47394, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47394 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47394 - **State**: PUBLISHED - **Published Date**: October 05, 2024 at 14:40 UTC - **Last Updated**: October 07, 2024 at 13:18 UTC - **Reserved Date**: September 24, 2024 at 13:02 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in eyecix JobSearch allows Reflected XSS.This issue affects JobSearch: from n/a through 2.5.9. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **eyecix - JobSearch** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-jobsearch/wordpress-wp-jobsearch-plugin-2-5-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Bonds (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14623, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14623 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14623 - **State**: PUBLISHED - **Published Date**: September 20, 2017 at 23:00 UTC - **Last Updated**: September 17, 2024 at 00:00 UTC - **Reserved Date**: September 20, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be able to login with an empty password. This issue affects an application using this package if these conditions are met: (1) it relies only on the return error of the Bind function call to determine whether a user is authorized (i.e., a nil return value is interpreted as successful authorization) and (2) it is used with an LDAP server allowing unauthenticated bind. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/go-ldap/ldap/pull/126) 2. [](https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5209, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5209 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5209 - **State**: PUBLISHED - **Published Date**: November 27, 2023 at 16:21 UTC - **Last Updated**: August 02, 2024 at 07:52 UTC - **Reserved Date**: September 26, 2023 at 19:04 UTC - **Assigned By**: WPScan ### Vulnerability Description The WordPress Online Booking and Scheduling Plugin WordPress plugin before 22.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - WordPress Online Booking and Scheduling Plugin** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/dea6077a-81ee-451f-b049-3749a2252c88) ### Credits - Sławomir Zakrzewski - Maksymilian Kubiak (AFINE) - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20198 - **State**: PUBLISHED - **Published Date**: June 15, 2022 at 13:23 UTC - **Last Updated**: August 03, 2024 at 02:02 UTC - **Reserved Date**: October 14, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In llcp_dlc_proc_connect_pdu of llcp_dlc.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure from the NFC stack with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-221851879 ### Affected Products **n/a - Android** Affected versions: - Android-12L (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2022-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0369, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0369 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0369 - **State**: PUBLISHED - **Published Date**: May 07, 2024 at 22:54 UTC - **Last Updated**: August 02, 2024 at 23:25 UTC - **Reserved Date**: January 25, 2022 at 22:22 UTC - **Assigned By**: zdi ### Vulnerability Description Triangle MicroWorks SCADA Data Gateway Restore Workspace Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Restore Workspace feature. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-17227. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Triangle MicroWorks - SCADA Data Gateway** Affected versions: - 5.01.01 (Status: affected) ### References 1. [ZDI-23-450](https://www.zerodayinitiative.com/advisories/ZDI-23-450/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25660, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25660 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25660 - **State**: PUBLISHED - **Published Date**: October 12, 2022 at 00:00 UTC - **Last Updated**: May 15, 2025 at 15:09 UTC - **Reserved Date**: February 22, 2022 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption due to double free issue in kernel in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile** Affected versions: - AQT1000, AR8035, QAM8295P, QCA6174A, QCA6310, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA8081, QCA8337, QCA9377, QCM6490, QCS603, QCS605, QCS6490, QSM8350, SA6145P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8295P, SA8540P, SA9000P, SD 675, SD 8 Gen1 5G, SD 8CX, SD 8cx Gen2, SD 8cx Gen3, SD670, SD675, SD678, SD765, SD765G, SD768G, SD778G, SD780G, SD845, SD850, SD855, SD865 5G, SD870, SD888, SD888 5G, SDX24, SDX50M, SDX55, SDX55M, SDX57M, SDX65, SDXR2 5G, SM7250P, SM7315, SM7325P, WCD9326, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3950, WCN3980, WCN3990, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8835 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/october-2022-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37107, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37107 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37107 - **State**: PUBLISHED - **Published Date**: February 09, 2022 at 22:03 UTC - **Last Updated**: August 04, 2024 at 01:09 UTC - **Reserved Date**: July 20, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is an improper memory access permission configuration on ACPU.Successful exploitation of this vulnerability may cause out-of-bounds access. ### Affected Products **Huawei - EMUI** Affected versions: - 12.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2022/2/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27995, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27995 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27995 - **State**: PUBLISHED - **Published Date**: March 21, 2024 at 15:00 UTC - **Last Updated**: August 02, 2024 at 00:41 UTC - **Reserved Date**: February 29, 2024 at 06:03 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Repute Infosystems ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup allows Stored XSS.This issue affects ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup: from n/a through 4.0.23. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Repute Infosystems - ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/armember-membership/wordpress-armember-plugin-4-0-23-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Van Lyubov (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8194, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8194 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8194 - **State**: PUBLISHED - **Published Date**: July 10, 2020 at 15:38 UTC - **Last Updated**: August 04, 2024 at 09:56 UTC - **Reserved Date**: January 28, 2020 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows the modification of a file download. ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **n/a - Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP** Affected versions: - Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7 (Status: affected) ### References 1. [](https://support.citrix.com/article/CTX276688)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3316, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3316 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3316 - **State**: PUBLISHED - **Published Date**: July 10, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 10:43 UTC - **Reserved Date**: May 07, 2014 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1030554](http://www.securitytracker.com/id/1030554) 2. [20140709 Cisco Unified Communications Manager DNA Arbitrary File Upload Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3316) 3. [68479](http://www.securityfocus.com/bid/68479) 4. [59730](http://secunia.com/advisories/59730) 5. [cucm-cve20143316-file-upload(94429)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94429) 6. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=34899)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-7234, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-7234 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-7234 - **State**: PUBLISHED - **Published Date**: January 16, 2024 at 18:11 UTC - **Last Updated**: June 02, 2025 at 15:08 UTC - **Reserved Date**: January 15, 2024 at 22:26 UTC - **Assigned By**: icscert ### Vulnerability Description OPCUAServerToolkit will write a log message once an OPC UA client has successfully connected containing the client's self-defined description field. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-117: Security Weakness ### Affected Products **Integration Objects - OPC UA Server Toolkit** Affected versions: - all versions (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-016-02) 2. [](https://integrationobjects.com//ask-a-question/) ### Credits - Sam Hanson of Dragos reported this vulnerability to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24611, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24611 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24611 - **State**: PUBLISHED - **Published Date**: January 24, 2025 at 17:24 UTC - **Last Updated**: January 24, 2025 at 18:59 UTC - **Reserved Date**: January 23, 2025 at 14:51 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Smackcoders WP Ultimate Exporter allows Absolute Path Traversal. This issue affects WP Ultimate Exporter: from n/a through 2.9. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Smackcoders - WP Ultimate Exporter** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wp-ultimate-exporter/vulnerability/wordpress-export-all-posts-products-orders-refunds-users-plugin-2-9-arbitrary-file-read-vulnerability?_s_id=cve) ### Credits - l8BL (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6276, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6276 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6276 - **State**: PUBLISHED - **Published Date**: September 05, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 07:15 UTC - **Reserved Date**: August 17, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco TelePresence IX5000 8.0.3 stores a private key associated with an X.509 certificate under the web root with insufficient access control, which allows remote attackers to obtain cleartext versions of HTTPS traffic or spoof devices via a direct request to the certificate directory, aka Bug ID CSCuu63501. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033477](http://www.securitytracker.com/id/1033477) 2. [20150903 Cisco TelePresence IX5000 Systems Certificate Information Disclosure Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=40727)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38699, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38699 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38699 - **State**: PUBLISHED - **Published Date**: August 13, 2024 at 10:13 UTC - **Last Updated**: August 13, 2024 at 13:17 UTC - **Reserved Date**: June 19, 2024 at 11:16 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in WP Swings Wallet System for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Wallet System for WooCommerce: from n/a through 2.5.13. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **WP Swings - Wallet System for WooCommerce** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wallet-system-for-woocommerce/wordpress-wallet-system-for-woocommerce-plugin-2-5-13-sensitive-data-exposure-via-exported-file-vulnerability?_s_id=cve) ### Credits - Joshua Chan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2354, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2354 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2354 - **State**: PUBLISHED - **Published Date**: August 15, 2022 at 08:36 UTC - **Last Updated**: August 03, 2024 at 00:32 UTC - **Reserved Date**: July 08, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The WP-DBManager WordPress plugin before 2.80.8 does not prevent administrators from running arbitrary commands on the server in multisite installations, where only super-administrators should. ### Weakness Classification (CWE) - CWE-863 Incorrect Authorization: Incorrect Authorization ### Affected Products **Unknown - WP-DBManager** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/1c8c5861-ce87-4813-9e26-470d63c1903a) ### Credits - Raad Haddad of Cloudyrion GmbH - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20133 - **State**: PUBLISHED - **Published Date**: July 07, 2023 at 19:47 UTC - **Last Updated**: October 23, 2024 at 20:26 UTC - **Reserved Date**: October 27, 2022 at 18:47 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because of insufficient validation of user-supplied input in Webex Events (classic) programs, email templates, and survey questions. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **Cisco - Cisco Webex Meetings** Affected versions: - 39.10 (Status: affected) - 39.11 (Status: affected) - 39.6 (Status: affected) - 39.7 (Status: affected) - 39.7.4 (Status: affected) - 39.7.7 (Status: affected) - 39.8 (Status: affected) - 39.8.2 (Status: affected) - 39.8.3 (Status: affected) - 39.8.4 (Status: affected) - 39.9 (Status: affected) - 39.9.1 (Status: affected) - 40.1 (Status: affected) - 40.2 (Status: affected) - 40.4 (Status: affected) - 40.4.10 (Status: affected) - 40.6 (Status: affected) - 40.6.2 (Status: affected) - 42.10 (Status: affected) - 42.11 (Status: affected) - 42.6 (Status: affected) - 42.9 (Status: affected) - 42.12 (Status: affected) - 42.8 (Status: affected) - 42.7 (Status: affected) - 43.2 (Status: affected) - 43.1 (Status: affected) - 43.3 (Status: affected) - 43.4 (Status: affected) - 43.4.2 (Status: affected) - 43.5.0 (Status: affected) - 43.4.1 (Status: affected) ### References 1. [cisco-sa-sxsscsrf-2L24bBx6](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxsscsrf-2L24bBx6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26687, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26687 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26687 - **State**: PUBLISHED - **Published Date**: April 03, 2024 at 14:54 UTC - **Last Updated**: May 04, 2025 at 08:54 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: xen/events: close evtchn after mapping cleanup shutdown_pirq and startup_pirq are not taking the irq_mapping_update_lock because they can't due to lock inversion. Both are called with the irq_desc->lock being taking. The lock order, however, is first irq_mapping_update_lock and then irq_desc->lock. This opens multiple races: - shutdown_pirq can be interrupted by a function that allocates an event channel: CPU0 CPU1 shutdown_pirq { xen_evtchn_close(e) __startup_pirq { EVTCHNOP_bind_pirq -> returns just freed evtchn e set_evtchn_to_irq(e, irq) } xen_irq_info_cleanup() { set_evtchn_to_irq(e, -1) } } Assume here event channel e refers here to the same event channel number. After this race the evtchn_to_irq mapping for e is invalid (-1). - __startup_pirq races with __unbind_from_irq in a similar way. Because __startup_pirq doesn't take irq_mapping_update_lock it can grab the evtchn that __unbind_from_irq is currently freeing and cleaning up. In this case even though the event channel is allocated, its mapping can be unset in evtchn_to_irq. The fix is to first cleanup the mappings and then close the event channel. In this way, when an event channel gets allocated it's potential previous evtchn_to_irq mappings are guaranteed to be unset already. This is also the reverse order of the allocation where first the event channel is allocated and then the mappings are setup. On a 5.10 kernel prior to commit 3fcdaf3d7634 ("xen/events: modify internal [un]bind interfaces"), we hit a BUG like the following during probing of NVMe devices. The issue is that during nvme_setup_io_queues, pci_free_irq is called for every device which results in a call to shutdown_pirq. With many nvme devices it's therefore likely to hit this race during boot because there will be multiple calls to shutdown_pirq and startup_pirq are running potentially in parallel. ------------[ cut here ]------------ blkfront: xvda: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled kernel BUG at drivers/xen/events/events_base.c:499! invalid opcode: 0000 [#1] SMP PTI CPU: 44 PID: 375 Comm: kworker/u257:23 Not tainted 5.10.201-191.748.amzn2.x86_64 #1 Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006 Workqueue: nvme-reset-wq nvme_reset_work RIP: 0010:bind_evtchn_to_cpu+0xdf/0xf0 Code: 5d 41 5e c3 cc cc cc cc 44 89 f7 e8 2b 55 ad ff 49 89 c5 48 85 c0 0f 84 64 ff ff ff 4c 8b 68 30 41 83 fe ff 0f 85 60 ff ff ff <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44 00 00 RSP: 0000:ffffc9000d533b08 EFLAGS: 00010046 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006 RDX: 0000000000000028 RSI: 00000000ffffffff RDI: 00000000ffffffff RBP: ffff888107419680 R08: 0000000000000000 R09: ffffffff82d72b00 R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001ed R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000002 FS: 0000000000000000(0000) GS:ffff88bc8b500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000002610001 CR4: 00000000001706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ? show_trace_log_lvl+0x1c1/0x2d9 ? show_trace_log_lvl+0x1c1/0x2d9 ? set_affinity_irq+0xdc/0x1c0 ? __die_body.cold+0x8/0xd ? die+0x2b/0x50 ? do_trap+0x90/0x110 ? bind_evtchn_to_cpu+0xdf/0xf0 ? do_error_trap+0x65/0x80 ? bind_evtchn_to_cpu+0xdf/0xf0 ? exc_invalid_op+0x4e/0x70 ? bind_evtchn_to_cpu+0xdf/0xf0 ? asm_exc_invalid_op+0x12/0x20 ? bind_evtchn_to_cpu+0xdf/0x ---truncated--- ### Affected Products **Linux - Linux** Affected versions: - d46a78b05c0e37f76ddf4a7a67bf0b6c68bada55 (Status: affected) - d46a78b05c0e37f76ddf4a7a67bf0b6c68bada55 (Status: affected) - d46a78b05c0e37f76ddf4a7a67bf0b6c68bada55 (Status: affected) - d46a78b05c0e37f76ddf4a7a67bf0b6c68bada55 (Status: affected) - d46a78b05c0e37f76ddf4a7a67bf0b6c68bada55 (Status: affected) - d46a78b05c0e37f76ddf4a7a67bf0b6c68bada55 (Status: affected) - d46a78b05c0e37f76ddf4a7a67bf0b6c68bada55 (Status: affected) **Linux - Linux** Affected versions: - 2.6.37 (Status: affected) - 0 (Status: unaffected) - 5.4.274 (Status: unaffected) - 5.10.215 (Status: unaffected) - 5.15.154 (Status: unaffected) - 6.1.81 (Status: unaffected) - 6.6.19 (Status: unaffected) - 6.7.6 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/9470f5b2503cae994098dea9682aee15b313fa44) 2. [](https://git.kernel.org/stable/c/0fc88aeb2e32b76db3fe6a624b8333dbe621b8fd) 3. [](https://git.kernel.org/stable/c/ea592baf9e41779fe9a0424c03dd2f324feca3b3) 4. [](https://git.kernel.org/stable/c/585a344af6bcac222608a158fc2830ff02712af5) 5. [](https://git.kernel.org/stable/c/20980195ec8d2e41653800c45c8c367fa1b1f2b4) 6. [](https://git.kernel.org/stable/c/9be71aa12afa91dfe457b3fb4a444c42b1ee036b) 7. [](https://git.kernel.org/stable/c/fa765c4b4aed2d64266b694520ecb025c862c5a9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1380, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1380 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1380 - **State**: PUBLISHED - **Published Date**: January 29, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:46 UTC - **Reserved Date**: January 25, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Firefox before 1.0 and Mozilla before 1.7.5 allows inactive (background) tabs to launch dialog boxes, which can allow remote attackers to spoof the dialog boxes from web sites in other windows and facilitate phishing attacks, aka the "Dialog Box Spoofing Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2005:323](http://www.redhat.com/support/errata/RHSA-2005-323.html) 2. [](http://www.mozilla.org/security/announce/mfsa2005-05.html) 3. [oval:org.mitre.oval:def:100050](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100050) 4. [web-browser-modal-spoofing(18864)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18864) 5. [RHSA-2005:335](http://www.redhat.com/support/errata/RHSA-2005-335.html) 6. [](http://secunia.com/multiple_browsers_form_field_focus_test/) 7. [12712](http://secunia.com/advisories/12712) 8. [](http://secunia.com/multiple_browsers_dialog_box_spoofing_test/) 9. [oval:org.mitre.oval:def:10211](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10211)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19497, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19497 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19497 - **State**: PUBLISHED - **Published Date**: December 17, 2019 at 18:40 UTC - **Last Updated**: August 05, 2024 at 02:16 UTC - **Reserved Date**: December 02, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MDaemon Email Server 17.5.1 allows XSS via the filename of an attachment to an email message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://twitter.com/Dmitriy_Area51) 2. [](https://github.com/Dmitriy-area51/Exploit/blob/master/CVE-2019-19497/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44373, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44373 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44373 - **State**: PUBLISHED - **Published Date**: December 07, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 14:03 UTC - **Reserved Date**: October 30, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A stack overflow vulnerability exists in TrendNet Wireless AC Easy-Upgrader TEW-820AP (Version v1.0R, firmware version 1.01.B01) which may result in remote code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/johnawm/vulner-box/blob/master/TRENDNet/TEW-820AP/02/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1115, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1115 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1115 - **State**: PUBLISHED - **Published Date**: March 25, 2010 at 17:00 UTC - **Last Updated**: August 07, 2024 at 01:14 UTC - **Reserved Date**: March 25, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in news/include/customize.php in Web Server Creator - Web Portal 0.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the l parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [37841](http://www.securityfocus.com/bid/37841) 2. [](http://www.packetstormsecurity.com/1001-exploits/webservercreator-traversalxssrfi.txt) 3. [webservercreator-customize-dir-traversal(55725)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55725)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1518, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1518 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1518 - **State**: PUBLISHED - **Published Date**: May 11, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:51 UTC - **Reserved Date**: May 11, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in Solaris 7 through 9, when using Federated Naming Services (FNS), autofs, and FNS X.500 configuration, allows local users to cause a denial of service (automountd crash) when "accessing" /xfn/_x500. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2005-0517](http://www.vupen.com/english/advisories/2005/0517) 2. [57786](http://sunsolve.sun.com/search/document.do?assetkey=1-26-57786-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4075, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4075 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4075 - **State**: PUBLISHED - **Published Date**: November 02, 2011 at 17:00 UTC - **Last Updated**: August 06, 2024 at 23:53 UTC - **Reserved Date**: October 18, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The masort function in lib/functions.php in phpLDAPadmin 1.2.x before 1.2.2 allows remote attackers to execute arbitrary PHP code via the orderby parameter (aka sortby variable) in a query_engine action to cmd.php, as exploited in the wild in October 2011. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://sourceforge.net/tracker/index.php?func=detail&aid=3417184&group_id=61828&atid=498546) 2. [76594](http://osvdb.org/76594) 3. [50331](http://www.securityfocus.com/bid/50331) 4. [[oss-security] 20111025 Re: CVE request: phpldapadmin <= 1.2.1.1 XSS and and code injection flaws](http://openwall.com/lists/oss-security/2011/10/25/2) 5. [18021](http://www.exploit-db.com/exploits/18021/) 6. [](http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin%3Ba=blobdiff%3Bf=lib/functions.php%3Bh=eb160dc9f7d74e563131e21d4c85d7849a0c6638%3Bhp=19fde9974d4e5eb3bfac04bb223ccbefdb98f9a0%3Bhb=76e6dad13ef77c5448b8dfed1a61e4acc7241165%3Bhpb=5d4245f93ae6f065e7535f268e3cd87a23b07744) 7. [](http://dev.metasploit.com/redmine/issues/5820) 8. [46672](http://secunia.com/advisories/46672) 9. [46551](http://secunia.com/advisories/46551) 10. [[oss-security] 20111024 CVE request: phpldapadmin <= 1.2.1.1 XSS and and code injection flaws](http://openwall.com/lists/oss-security/2011/10/24/9) 11. [](http://phpldapadmin.sourceforge.net/wiki/index.php/Main_Page) 12. [DSA-2333](http://www.debian.org/security/2011/dsa-2333)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-35191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-35191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-35191 - **State**: PUBLISHED - **Published Date**: December 17, 2020 at 01:08 UTC - **Last Updated**: August 04, 2024 at 17:02 UTC - **Reserved Date**: December 12, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The official drupal docker images before 8.5.10-fpm-alpine (Alpine specific) contain a blank password for a root user. System using the drupal docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/koharin/koharin2/blob/main/CVE-2020-35191)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0834, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0834 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0834 - **State**: PUBLISHED - **Published Date**: March 09, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:37 UTC - **Reserved Date**: November 22, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description htsearch CGI program in htdig (ht://Dig) 3.1.5 and earlier allows remote attackers to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero, or (2) read arbitrary files by uploading an alternate configuration file that specifies the target file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-080](http://www.debian.org/security/2001/dsa-080) 2. [CSSA-2001-035.0](http://www.calderasystems.com/support/security/advisories/CSSA-2001-035.0.txt) 3. [CLA-2001:429](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000429) 4. [3410](http://www.securityfocus.com/bid/3410) 5. [SuSE-SA:2001:035](http://www.novell.com/linux/security/advisories/2001_035_htdig_txt.html) 6. [htdig-htsearch-retrieve-files(7263)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7263) 7. [20011007 Re: Bug found in ht://Dig htsearch CGI](http://marc.info/?l=bugtraq&m=100260195401753&w=2) 8. [MDKSA-2001:083](http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-083.php3) 9. [htdig-htsearch-infinite-loop(7262)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7262) 10. [](http://sourceforge.net/tracker/index.php?func=detail&aid=458013&group_id=4593&atid=104593) 11. [RHSA-2001:139](http://www.redhat.com/support/errata/RHSA-2001-139.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15931, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15931 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15931 - **State**: PUBLISHED - **Published Date**: October 27, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 20:04 UTC - **Reserved Date**: October 27, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In radare2 2.0.1, an integer exception (negative number leading to an invalid memory access) exists in store_versioninfo_gnu_verneed() in libr/bin/format/elf/elf.c via crafted ELF files on 32bit systems. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/radare/radare2/commit/c6d0076c924891ad9948a62d89d0bcdaf965f0cd) 2. [101609](http://www.securityfocus.com/bid/101609) 3. [](https://github.com/radare/radare2/issues/8731)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3128, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3128 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3128 - **State**: PUBLISHED - **Published Date**: August 26, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 02:55 UTC - **Reserved Date**: August 26, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Untrusted search path vulnerability in TeamViewer 5.0.8703 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .tvs or .tvc file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [41112](http://secunia.com/advisories/41112) 2. [oval:org.mitre.oval:def:6773](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6773) 3. [14734](http://www.exploit-db.com/exploits/14734) 4. [20100825 TeamViewer <= 5.0.8703 DLL Hijacking Exploit (dwmapi.dll)](http://www.securityfocus.com/archive/1/513317/100/0/threaded) 5. [ADV-2010-2174](http://www.vupen.com/english/advisories/2010/2174)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3525, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3525 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3525 - **State**: PUBLISHED - **Published Date**: February 23, 2006 at 20:00 UTC - **Last Updated**: August 07, 2024 at 23:17 UTC - **Reserved Date**: November 08, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in an ActiveX control for the installer for Adobe Macromedia Shockwave Player 10.1.0.11 and earlier allows remote attackers to execute arbitrary code via crafted large values for unspecified parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [23461](http://www.osvdb.org/23461) 2. [](http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html) 3. [16791](http://www.securityfocus.com/bid/16791) 4. [481](http://securityreason.com/securityalert/481) 5. [ADV-2006-0716](http://www.vupen.com/english/advisories/2006/0716) 6. [shockwave-activex-installer-bo(24914)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24914) 7. [19009](http://secunia.com/advisories/19009) 8. [VU#437212](http://www.kb.cert.org/vuls/id/437212) 9. [20060223 ZDI-06-002: Adobe Macromedia ShockWave Code Execution](http://www.securityfocus.com/archive/1/425900/100/0/threaded) 10. [](http://www.zerodayinitiative.com/advisories/ZDI-06-002.html) 11. [1015673](http://securitytracker.com/id?1015673)