System stringclasses 1
value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21142
- **State**: PUBLISHED
- **Published Date**: July 16, 2024 at 22:39 UTC
- **Last Updated**: March 18, 2025 at 14:15 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- * (Status: affected)
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujul2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8043
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 19:57 UTC
- **Last Updated**: August 04, 2024 at 21:10 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-41.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24972, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24972
- **State**: PUBLISHED
- **Published Date**: March 28, 2023 at 00:00 UTC
- **Last Updated**: February 19, 2025 at 19:11 UTC
- **Reserved Date**: February 11, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR940N 3.20.1 Build 200316 Rel.34392n (5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the lack of proper access control. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-13911.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**TP-Link - TL-WR940N**
Affected versions:
- 3.20.1 Build 200316 Rel.34392n (5553) (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-22-405/)
### Credits
- Vadym Kolisnichenko |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44689, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44689
- **State**: PUBLISHED
- **Published Date**: December 13, 2022 at 00:00 UTC
- **Last Updated**: February 28, 2025 at 20:52 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Subsystem for Linux (WSL2)**
Affected versions:
- 5.0.0.0 (Status: affected)
### References
1. [Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44689) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44941, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44941
- **State**: PUBLISHED
- **Published Date**: August 26, 2024 at 11:20 UTC
- **Last Updated**: May 04, 2025 at 09:29 UTC
- **Reserved Date**: August 21, 2024 at 05:34 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to cover read extent cache access with lock
syzbot reports a f2fs bug as below:
BUG: KASAN: slab-use-after-free in sanity_check_extent_cache+0x370/0x410 fs/f2fs/extent_cache.c:46
Read of size 4 at addr ffff8880739ab220 by task syz-executor200/5097
CPU: 0 PID: 5097 Comm: syz-executor200 Not tainted 6.9.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
print_address_description mm/kasan/report.c:377 [inline]
print_report+0x169/0x550 mm/kasan/report.c:488
kasan_report+0x143/0x180 mm/kasan/report.c:601
sanity_check_extent_cache+0x370/0x410 fs/f2fs/extent_cache.c:46
do_read_inode fs/f2fs/inode.c:509 [inline]
f2fs_iget+0x33e1/0x46e0 fs/f2fs/inode.c:560
f2fs_nfs_get_inode+0x74/0x100 fs/f2fs/super.c:3237
generic_fh_to_dentry+0x9f/0xf0 fs/libfs.c:1413
exportfs_decode_fh_raw+0x152/0x5f0 fs/exportfs/expfs.c:444
exportfs_decode_fh+0x3c/0x80 fs/exportfs/expfs.c:584
do_handle_to_path fs/fhandle.c:155 [inline]
handle_to_path fs/fhandle.c:210 [inline]
do_handle_open+0x495/0x650 fs/fhandle.c:226
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
We missed to cover sanity_check_extent_cache() w/ extent cache lock,
so, below race case may happen, result in use after free issue.
- f2fs_iget
- do_read_inode
- f2fs_init_read_extent_tree
: add largest extent entry in to cache
- shrink
- f2fs_shrink_read_extent_tree
- __shrink_extent_tree
- __detach_extent_node
: drop largest extent entry
- sanity_check_extent_cache
: access et->largest w/o lock
let's refactor sanity_check_extent_cache() to avoid extent cache access
and call it before f2fs_init_read_extent_tree() to fix this issue.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.6.47 (Status: unaffected)
- 6.10.6 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/263df78166d3a9609b97d28c34029bd01874cbb8)
2. [](https://git.kernel.org/stable/c/323ef20b5558b9d9fd10c1224327af6f11a8177d)
3. [](https://git.kernel.org/stable/c/d7409b05a64f212735f0d33f5f1602051a886eab) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23485, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23485 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23485
- **State**: PUBLISHED
- **Published Date**: July 11, 2024 at 02:38 UTC
- **Last Updated**: August 01, 2024 at 23:06 UTC
- **Reserved Date**: February 05, 2024 at 04:16 UTC
- **Assigned By**: Gallagher
### Vulnerability Description
Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation (CWE-1304) in the Controller 6000 and 7000 can lead to secured door locks connected via Aperio Communication Hubs to momentarily allow free access.
This issue affects: Gallagher Controller 6000 and 7000 9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)), 8.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior.
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-1304: Security Weakness
### Affected Products
**Gallagher - Controller 6000 and Controller 7000**
Affected versions:
- 9.10 (Status: affected)
- 9.00 (Status: affected)
- 8.90 (Status: affected)
- 8.80 (Status: affected)
- 8.70 (Status: affected)
- 0 (Status: affected)
### References
1. [](https://security.gallagher.com/Security-Advisories/CVE-2024-23485) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1277
- **State**: PUBLISHED
- **Published Date**: June 16, 2011 at 20:21 UTC
- **Last Updated**: August 06, 2024 at 22:21 UTC
- **Reserved Date**: March 04, 2011 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel 2002 SP3, Office 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information during parsing of Excel spreadsheets, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted spreadsheet, aka "Excel Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [48162](http://www.securityfocus.com/bid/48162)
2. [oval:org.mitre.oval:def:12291](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12291)
3. [MS11-045](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-045) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41171, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41171 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41171
- **State**: PUBLISHED
- **Published Date**: October 11, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 12:35 UTC
- **Reserved Date**: September 21, 2022 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Due to lack of proper memory management, when a victim opens manipulated CATIA4 Part (.model, CatiaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**SAP SE - SAP 3D Visual Enterprise Author**
Affected versions:
- 9 (Status: affected)
### References
1. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
2. [](https://launchpad.support.sap.com/#/notes/3245929) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45930, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45930 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45930
- **State**: REJECTED
- **Last Updated**: January 30, 2024 at 05:48 UTC
- **Reserved Date**: October 16, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1981, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1981 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1981
- **State**: PUBLISHED
- **Published Date**: July 01, 2022 at 16:05 UTC
- **Last Updated**: August 03, 2024 at 00:24 UTC
- **Reserved Date**: June 02, 2022 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab EE affecting all versions starting from 12.2 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1. In GitLab, if a group enables the setting to restrict access to users belonging to specific domains, that allow-list may be bypassed if a Maintainer uses the 'Invite a group' feature to invite a group that has members that don't comply with domain allow-list.
### CVSS Metrics
- **CVSS Base Score**: 2.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=12.2, <14.10.5 (Status: affected)
- >=15.0, <15.0.4 (Status: affected)
- >=15.1, <15.1.1 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/354791)
2. [](https://hackerone.com/reports/1501733)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1981.json)
### Credits
- Thanks [muthu_prakash](https://hackerone.com/muthu_prakash) for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8650
- **State**: PUBLISHED
- **Published Date**: December 16, 2024 at 04:30 UTC
- **Last Updated**: December 16, 2024 at 16:45 UTC
- **Reserved Date**: September 10, 2024 at 12:02 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue was discovered in GitLab CE/EE affecting all versions from 15.0 prior to 17.4.6, 17.5 prior to 17.5.4, and 17.6 prior to 17.6.2 that allowed non-member users to view unresolved threads marked as internal notes in public projects merge requests.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**GitLab - GitLab**
Affected versions:
- 15.0 (Status: affected)
- 17.5 (Status: affected)
- 17.6 (Status: affected)
### References
1. [GitLab Issue #486300](https://gitlab.com/gitlab-org/gitlab/-/issues/486300)
2. [HackerOne Bug Bounty Report #2705909](https://hackerone.com/reports/2705909)
### Credits
- Thanks [salh4ckr](https://hackerone.com/salh4ckr) for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1049, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1049 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1049
- **State**: PUBLISHED
- **Published Date**: February 02, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 04:33 UTC
- **Reserved Date**: January 13, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The web server on Siemens SCALANCE X-200IRT switches with firmware before 5.2.0 allows remote attackers to hijack sessions via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-954136.pdf)
2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-954136.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39312, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39312 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39312
- **State**: PUBLISHED
- **Published Date**: June 19, 2024 at 14:23 UTC
- **Last Updated**: August 02, 2024 at 18:02 UTC
- **Reserved Date**: July 27, 2023 at 14:35 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in ThemeFusion Avada.This issue affects Avada: from n/a through 7.11.1.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**ThemeFusion - Avada**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/avada/wordpress-avada-theme-7-11-1-authenticated-author-unrestricted-zip-extraction-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4129
- **State**: PUBLISHED
- **Published Date**: October 15, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:04 UTC
- **Reserved Date**: June 12, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [60968](http://secunia.com/advisories/60968)
2. [1031018](http://www.securitytracker.com/id/1031018)
3. [MS14-056](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056)
4. [70331](http://www.securityfocus.com/bid/70331) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11421
- **State**: PUBLISHED
- **Published Date**: July 18, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 18:12 UTC
- **Reserved Date**: July 18, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
gnome-exe-thumbnailer before 0.9.5 is prone to a VBScript Injection when generating thumbnails for MSI files, aka the "Bad Taste" issue. There is a local attack if the victim uses the GNOME Files file manager, and navigates to a directory containing a .msi file with VBScript code in its filename.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.debian.org/868705)
2. [](https://github.com/gnome-exe-thumbnailer/gnome-exe-thumbnailer/commit/1d8e3102dd8fd23431ae6127d14a236da6b4a4a5)
3. [](http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html)
4. [99922](http://www.securityfocus.com/bid/99922) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42196, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42196 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42196
- **State**: PUBLISHED
- **Published Date**: December 06, 2024 at 14:47 UTC
- **Last Updated**: December 06, 2024 at 17:46 UTC
- **Reserved Date**: July 29, 2024 at 21:32 UTC
- **Assigned By**: HCL
### Vulnerability Description
HCL Launch stores potentially sensitive information in log files that could be read by a local user with access to HTTP request logs.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**HCL Software - Launch**
Affected versions:
- 7.0 - 7.0.5.24, 7.1 - 7.1.2.20, 7.2 - 7.2.3.13 (Status: affected)
### References
1. [](https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0117910) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32305, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32305
- **State**: PUBLISHED
- **Published Date**: May 18, 2021 at 16:11 UTC
- **Last Updated**: August 03, 2024 at 23:17 UTC
- **Reserved Date**: May 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/websvnphp/websvn/pull/142)
2. [](http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9942
- **State**: PUBLISHED
- **Published Date**: November 23, 2024 at 07:38 UTC
- **Last Updated**: November 24, 2024 at 18:32 UTC
- **Reserved Date**: October 14, 2024 at 16:22 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the MJ_gmgt_user_avatar_image_upload() function in all versions up to, and including, 67.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**dasinfomedia - WPGYM - Wordpress Gym Management System**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/bae5f22d-5085-4230-a7fc-5db85aa6fbdb?source=cve)
2. [](https://codecanyon.net/item/-wpgym-wordpress-gym-management-system/13352964)
### Credits
- Tonn |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20462
- **State**: PUBLISHED
- **Published Date**: November 08, 2022 at 00:00 UTC
- **Last Updated**: May 01, 2025 at 15:15 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In phNxpNciHal_write_unlocked of phNxpNciHal.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230356196
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 Android-12 Android-12L Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2022-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0693
- **State**: PUBLISHED
- **Published Date**: April 25, 2022 at 15:51 UTC
- **Last Updated**: August 02, 2024 at 23:40 UTC
- **Reserved Date**: February 20, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Master Elements WordPress plugin through 8.0 does not validate and escape the meta_ids parameter of its remove_post_meta_condition AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an unauthenticated SQL Injection
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Unknown - Master Elements**
Affected versions:
- 8.0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/a72bf075-fd4b-4aa5-b4a4-5f62a0620643)
### Credits
- cydave |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45653, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45653
- **State**: PUBLISHED
- **Published Date**: January 19, 2025 at 02:39 UTC
- **Last Updated**: January 21, 2025 at 20:29 UTC
- **Reserved Date**: September 03, 2024 at 13:50 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could disclose sensitive IP address information to authenticated users in responses that could be used in further attacks against the system.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-201: Improper Input Validation
### Affected Products
**IBM - Sterling Connect:Direct Web Services**
Affected versions:
- 6.0, 6.1, 6.2, 6.3 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7174104) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30338
- **State**: PUBLISHED
- **Published Date**: June 14, 2022 at 10:10 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 07, 2021 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Improper input validation in TrustZone memory transfer interface can lead to information disclosure in Snapdragon Compute
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N`
### Affected Products
**Qualcomm, Inc. - Snapdragon Compute**
Affected versions:
- SD850, SDXR1 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13033, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13033
- **State**: PUBLISHED
- **Published Date**: December 30, 2024 at 01:31 UTC
- **Last Updated**: December 30, 2024 at 14:26 UTC
- **Reserved Date**: December 29, 2024 at 15:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in code-projects Chat System 1.0. Affected by this issue is some unknown functionality of the file /admin/chatroom.php. The manipulation of the argument id leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**code-projects - Chat System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-289766 | code-projects Chat System chatroom.php cross site scripting](https://vuldb.com/?id.289766)
2. [VDB-289766 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.289766)
3. [Submit #471109 | code-projects Chat System 1.0.0 Cross Site Scripting](https://vuldb.com/?submit.471109)
4. [](https://code-projects.org/)
### Credits
- Havook (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38363, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38363 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38363
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 14:10 UTC
- **Last Updated**: August 02, 2024 at 04:04 UTC
- **Reserved Date**: June 14, 2024 at 14:16 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Airbyte is a data integration platform for ELT pipelines. Airbyte connection builder docker image is vulnerable to RCE via SSTI which allows an authenticated remote attacker to execute arbitrary code on the server as the web server user. The connection builder is used to create and test new connectors. Sensitive information, such as credentials, could be exposed if a user tested a new connector on a compromised instance. The connection builder does not have access to any data processes. This vulnerability is fixed in 0.62.2.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-1336: Security Weakness
### Affected Products
**airbytehq - airbyte**
Affected versions:
- < 0.62.2 (Status: affected)
### References
1. [https://github.com/airbytehq/airbyte/security/advisories/GHSA-4j3c-fgvx-xgqq](https://github.com/airbytehq/airbyte/security/advisories/GHSA-4j3c-fgvx-xgqq) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3074, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3074 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3074
- **State**: PUBLISHED
- **Published Date**: May 13, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 05:32 UTC
- **Reserved Date**: April 09, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, and CVE-2015-3073.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [74604](http://www.securityfocus.com/bid/74604)
2. [](https://helpx.adobe.com/security/products/reader/apsb15-10.html)
3. [1032284](http://www.securitytracker.com/id/1032284)
4. [](http://www.zerodayinitiative.com/advisories/ZDI-15-198) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6114, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6114
- **State**: PUBLISHED
- **Published Date**: December 11, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 12:03 UTC
- **Reserved Date**: September 02, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The Hosted Transparent Decision Service in the Rule Execution Server in IBM WebSphere ILOG JRules 7.1 before MP1 FP5 IF43; WebSphere Operational Decision Management 7.5 before FP3 IF41; and Operational Decision Manager 8.0 before MP1 FP2 IF34, 8.5 before MP1 FP1 IF43, and 8.6 before IF8 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ibm-websphere-cve20146114-info-disc(96211)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96211)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21691815) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2036
- **State**: PUBLISHED
- **Published Date**: April 14, 2023 at 07:00 UTC
- **Last Updated**: August 02, 2024 at 06:12 UTC
- **Reserved Date**: April 14, 2023 at 06:20 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Campcodes Video Sharing Website 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file upload.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-225914 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Campcodes - Video Sharing Website**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.225914)
2. [](https://vuldb.com/?ctiid.225914)
3. [](https://github.com/E1CHO/cve_hub/blob/main/Video%20Sharing%20Website/Video%20Sharing%20Website%20vuln%204.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_ZhangYing (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21413, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21413 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21413
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 18:03 UTC
- **Last Updated**: April 02, 2025 at 13:22 UTC
- **Reserved Date**: December 11, 2024 at 00:29 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Telephony Service Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Telephony Service Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21413) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0968
- **State**: PUBLISHED
- **Published Date**: October 20, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:38 UTC
- **Reserved Date**: October 19, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The catchsegv script in glibc 2.3.2 and earlier allows local users to overwrite files via a symlink attack on temporary files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-636](http://www.debian.org/security/2005/dsa-636)
2. [oval:org.mitre.oval:def:9523](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9523)
3. [RHSA-2005:261](http://www.redhat.com/support/errata/RHSA-2005-261.html)
4. [script-temporary-file-overwrite(17583)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17583)
5. [11286](http://www.securityfocus.com/bid/11286)
6. [USN-4-1](https://www.ubuntu.com/usn/usn-4-1/)
7. [GLSA-200410-19](http://security.gentoo.org/glsa/glsa-200410-19.xml)
8. [2004-0050](http://www.trustix.org/errata/2004/0050)
9. [](http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136318)
10. [RHSA-2004:586](http://www.redhat.com/support/errata/RHSA-2004-586.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-29448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-29448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29448
- **State**: PUBLISHED
- **Published Date**: February 18, 2021 at 15:08 UTC
- **Last Updated**: September 17, 2024 at 02:31 UTC
- **Reserved Date**: December 01, 2020 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.
### Affected Products
**Atlassian - Confluence Server**
Affected versions:
- unspecified (Status: affected)
- 6.14.0 (Status: affected)
- unspecified (Status: affected)
- 7.5.0 (Status: affected)
- unspecified (Status: affected)
**Atlassian - Confluence Data Center**
Affected versions:
- unspecified (Status: affected)
- 6.14.0 (Status: affected)
- unspecified (Status: affected)
- 7.5.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/CONFSERVER-60469) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38708
- **State**: PUBLISHED
- **Published Date**: August 16, 2021 at 02:40 UTC
- **Last Updated**: August 04, 2024 at 01:51 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ocProducts Composr CMS before 10.0.38, an attacker can inject JavaScript via Comcode for XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://compo.sr/news/view/announcements/two-new-xss-security.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5042, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5042
- **State**: PUBLISHED
- **Published Date**: November 12, 2008 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 10:40 UTC
- **Reserved Date**: November 12, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zeeways PhotoVideoTube 1.1 and earlier allows remote attackers to bypass authentication and perform administrative tasks via a direct request to admin/home.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [photovideotube-main-auth-bypass(46501)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46501)
2. [32223](http://www.securityfocus.com/bid/32223)
3. [7070](https://www.exploit-db.com/exploits/7070)
4. [4574](http://securityreason.com/securityalert/4574)
5. [32601](http://secunia.com/advisories/32601)
6. [ADV-2008-3065](http://www.vupen.com/english/advisories/2008/3065) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1411, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1411 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1411
- **State**: PUBLISHED
- **Published Date**: October 20, 2007 at 10:00 UTC
- **Last Updated**: August 08, 2024 at 02:28 UTC
- **Reserved Date**: October 19, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in emailreader_execute_on_each_page.inc.php in Cedric Email Reader 0.4 allows remote attackers to execute arbitrary PHP code via the emailreader_ini parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6820](http://www.securityfocus.com/bid/6820)
2. [5900](http://www.osvdb.org/5900)
3. [8024](http://secunia.com/advisories/8024)
4. [cedric-email-file-include(11278)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11278)
5. [20030209 Cedric Email Reader (PHP)](http://www.securityfocus.com/archive/1/311173) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0122
- **State**: PUBLISHED
- **Published Date**: January 15, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 04:24 UTC
- **Reserved Date**: January 15, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
hplip.postinst in HP Linux Imaging and Printing (HPLIP) 2.7.7 and 2.8.2 on Ubuntu allows local users to change the ownership of arbitrary files via unspecified manipulations in advance of an HPLIP installation or upgrade by an administrator, related to the product's attempt to correct the ownership of its configuration files within home directories.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33539](http://secunia.com/advisories/33539)
2. [33249](http://www.securityfocus.com/bid/33249)
3. [USN-708-1](http://www.ubuntu.com/usn/usn-708-1)
4. [](https://launchpad.net/bugs/191299) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2900
- **State**: PUBLISHED
- **Published Date**: May 30, 2007 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 13:57 UTC
- **Reserved Date**: May 29, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in Scallywag 2005-04-25 allow remote attackers to execute arbitrary PHP code via a URL in the path parameter to template.php in (1) skin/dark/, (2) skin/gold/, or (3) skin/original/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38143](http://osvdb.org/38143)
2. [3972](https://www.exploit-db.com/exploits/3972)
3. [ADV-2007-1933](http://www.vupen.com/english/advisories/2007/1933)
4. [38144](http://osvdb.org/38144)
5. [scallywag-template-file-include(34469)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34469)
6. [38142](http://osvdb.org/38142) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27804, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27804 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27804
- **State**: PUBLISHED
- **Published Date**: March 02, 2021 at 00:30 UTC
- **Last Updated**: August 03, 2024 at 21:33 UTC
- **Reserved Date**: February 26, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JPEG XL (aka jpeg-xl) through 0.3.2 allows writable memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/wg1/jpeg-xl/-/tags)
2. [](http://www.openwall.com/lists/oss-security/2021/03/01/3)
3. [20210302 Multiple Vulnerabilities in jpeg-xl (CVE-2021-27804)](http://seclists.org/fulldisclosure/2021/Mar/2)
4. [](http://packetstormsecurity.com/files/161623/jpeg-xl-0.3.1-Memory-Corruption.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16233, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16233 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16233
- **State**: PUBLISHED
- **Published Date**: August 30, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 30, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MiniCMS V1.10 has XSS via the mc-admin/post-edit.php tags parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/bg5sbk/MiniCMS/issues/22) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1289
- **State**: PUBLISHED
- **Published Date**: November 14, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:19 UTC
- **Reserved Date**: November 13, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read restricted process memory, cause a denial of service (crash), and possibly execute arbitrary code via the getNativeServices function, which creates an instance of the com.ms.awt.peer.INativeServices (INativeServices) class, whose methods do not verify the memory addresses that are passed as parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20021108 Technical information about unpatched MS Java vulnerabilities](http://marc.info/?l=ntbugtraq&m=103684360031565&w=2)
2. [msvm-inativeservices-memory-access(10582)](http://www.iss.net/security_center/static/10582.php)
3. [6140](http://www.securityfocus.com/bid/6140)
4. [20021108 Technical information about unpatched MS Java vulnerabilities](http://marc.info/?l=bugtraq&m=103682630823080&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25839, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25839
- **State**: PUBLISHED
- **Published Date**: April 26, 2021 at 13:30 UTC
- **Last Updated**: August 03, 2024 at 20:11 UTC
- **Reserved Date**: January 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A weak password requirement vulnerability exists in the Create New User function of MintHCM RELEASE 3.0.8, which could lead an attacker to easier password brute-forcing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://minthcm.org/)
2. [](https://github.com/C1inton/CVE-Record/blob/master/CVE%20Record/%5BCVE-2021-25839%5DMintHCM%203.0.8.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37096, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37096 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37096
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:18 UTC
- **Last Updated**: November 01, 2024 at 16:03 UTC
- **Reserved Date**: June 03, 2024 at 11:44 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Popup Box Team Popup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Popup box: from n/a through 4.5.1.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Popup Box Team - Popup box**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/ays-popup-box/wordpress-popup-box-plugin-4-5-1-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9479, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9479 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9479
- **State**: PUBLISHED
- **Published Date**: October 10, 2019 at 16:20 UTC
- **Last Updated**: August 06, 2024 at 08:51 UTC
- **Reserved Date**: October 10, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ACF-Frontend-Display plugin through 2015-07-03 for WordPress has arbitrary file upload via an action=upload request to js/blueimp-jQuery-File-Upload-d45deb1/server/php/index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/132590/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31722
- **State**: PUBLISHED
- **Published Date**: May 17, 2023 at 00:00 UTC
- **Last Updated**: January 22, 2025 at 17:10 UTC
- **Reserved Date**: April 29, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There exists a heap buffer overflow in nasm 2.16.02rc1 (GitHub commit: b952891).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.nasm.us/show_bug.cgi?id=3392857#c1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23045, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23045
- **State**: PUBLISHED
- **Published Date**: October 22, 2021 at 19:20 UTC
- **Last Updated**: August 04, 2024 at 14:58 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Macrob7 Macs Framework Content Management System - 1.14f was discovered to contain a SQL injection vulnerability via the 'roleId' parameter of the `editRole` and `deletUser` modules.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.vulnerability-lab.com/get_content.php?id=2206) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2787, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2787
- **State**: PUBLISHED
- **Published Date**: June 20, 2008 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 09:14 UTC
- **Reserved Date**: June 19, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in out.php in OpenDocMan 1.2.5 allows remote attackers to inject arbitrary web script or HTML via the last_message parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3948](http://securityreason.com/securityalert/3948)
2. [opendocman-out-xss(43135)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43135)
3. [30750](http://secunia.com/advisories/30750)
4. [29765](http://www.securityfocus.com/bid/29765)
5. [](http://www.s21sec.com/avisos/s21sec-044-en.txt)
6. [1020300](http://www.securitytracker.com/id?1020300)
7. [20080617 S21SEC-044-en:OpenDocMan Cross Site Scripting (XSS)](http://www.securityfocus.com/archive/1/493390/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6141, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6141
- **State**: PUBLISHED
- **Published Date**: October 20, 2017 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 22:09 UTC
- **Reserved Date**: February 21, 2017 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
In F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, and WebSafe 12.1.0 through 12.1.2, certain values in a TLS abbreviated handshake when using a client SSL profile with the Session Ticket option enabled may cause disruption of service to the Traffic Management Microkernel (TMM). The Session Ticket option is disabled by default.
### Affected Products
**F5 Networks, Inc. - F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, WebSafe**
Affected versions:
- 12.1.0 through 12.1.2 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K21154730) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3021
- **State**: PUBLISHED
- **Published Date**: February 01, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 23:40 UTC
- **Reserved Date**: March 09, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Access Manager for Web could allow an authenticated attacker to obtain sensitive information from error message using a specially crafted HTTP request.
### Affected Products
**IBM Corporation - Access Manager**
Affected versions:
- 9.0 (Status: affected)
- 9.0.0.1 (Status: affected)
- 9.0.1 (Status: affected)
- 7.0.0 (Status: affected)
- 8.0.0 (Status: affected)
- 8.0.0.1 (Status: affected)
- 8.0.0.2 (Status: affected)
- 8.0.0.3 (Status: affected)
- 8.0.0.4 (Status: affected)
- 8.0.0.5 (Status: affected)
- 8.0.1 (Status: affected)
- 8.0.1.2 (Status: affected)
- 8.0.1.3 (Status: affected)
- 8.0.1.4 (Status: affected)
- 9.0.0 (Status: affected)
- 9.0.1.0 (Status: affected)
### References
1. [96114](http://www.securityfocus.com/bid/96114)
2. [](http://www.ibm.com/support/docview.wss?uid=swg21995436) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47205, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47205 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47205
- **State**: PUBLISHED
- **Published Date**: April 10, 2024 at 18:56 UTC
- **Last Updated**: May 04, 2025 at 07:06 UTC
- **Reserved Date**: March 25, 2024 at 09:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
clk: sunxi-ng: Unregister clocks/resets when unbinding
Currently, unbinding a CCU driver unmaps the device's MMIO region, while
leaving its clocks/resets and their providers registered. This can cause
a page fault later when some clock operation tries to perform MMIO. Fix
this by separating the CCU initialization from the memory allocation,
and then using a devres callback to unregister the clocks and resets.
This also fixes a memory leak of the `struct ccu_reset`, and uses the
correct owner (the specific platform driver) for the clocks and resets.
Early OF clock providers are never unregistered, and limited error
handling is possible, so they are mostly unchanged. The error reporting
is made more consistent by moving the message inside of_sunxi_ccu_probe.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15.5 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/b5dd513daa70ee8f6d281a20bd28485ee9bb7db2)
2. [](https://git.kernel.org/stable/c/9bec2b9c6134052994115d2d3374e96f2ccb9b9d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1803, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1803
- **State**: PUBLISHED
- **Published Date**: December 13, 2018 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 20:41 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 149702.
### Affected Products
**IBM - Security Access Manager Appliance**
Affected versions:
- 9.0.1.0 (Status: affected)
- 9.0.2.0 (Status: affected)
- 9.0.3.0 (Status: affected)
- 9.0.4.0 (Status: affected)
- 9.0.5.0 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=ibm10787785)
2. [ibm-sam-cve20181803-clickjacking(149702)](https://exchange.xforce.ibmcloud.com/vulnerabilities/149702) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4963, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4963 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4963
- **State**: REJECTED
- **Published Date**: December 30, 2019 at 16:19 UTC
- **Last Updated**: December 30, 2019 at 16:19 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28052, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28052 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28052
- **State**: PUBLISHED
- **Published Date**: April 13, 2022 at 14:17 UTC
- **Last Updated**: August 03, 2024 at 05:41 UTC
- **Reserved Date**: March 28, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory Traversal vulnerability in file cn/roothub/store/FileSystemStorageService in function store in Roothub 2.6.0 allows remote attackers with low privlege to arbitrarily upload files via /common/upload API, which could lead to remote arbitrary code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/miansen/Roothub/tree/v2.6)
2. [](https://github.com/Hyperkopite/Roothub_vulns/blob/main/arbitrary%20file%20upload.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3895, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3895
- **State**: PUBLISHED
- **Published Date**: September 03, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 09:53 UTC
- **Reserved Date**: September 03, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LILO 22.6.1 and earlier stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ivizsecurity.com/preboot-patch.html)
2. [](http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf)
3. [20080825 [IVIZ-08-008] LILO Security Model bypass exploiting wrong BIOS API usage](http://www.securityfocus.com/archive/1/495801/100/0/threaded)
4. [4211](http://securityreason.com/securityalert/4211) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6889, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6889
- **State**: REJECTED
- **Published Date**: January 05, 2021 at 17:21 UTC
- **Last Updated**: January 05, 2021 at 17:21 UTC
- **Reserved Date**: January 13, 2020 at 00:00 UTC
- **Assigned By**: zte
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13560, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13560 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13560
- **State**: PUBLISHED
- **Published Date**: July 11, 2019 at 14:59 UTC
- **Last Updated**: August 04, 2024 at 23:57 UTC
- **Reserved Date**: July 11, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DIR-655 C devices before 3.02B05 BETA03 allow remote attackers to force a blank password via the apply_sec.cgi setup_wizard parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/july/the-d-link-dir-655c-from-nothing-to-rce/)
2. [](ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-655/REVC/DIR-655_REVC_RELEASE_NOTES_v3.02B05_BETA03.pdf)
3. [](https://www.nccgroup.trust/contentassets/7188fe7f130846ffa31827fc1661d120/setupwizard.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51240, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51240 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51240
- **State**: PUBLISHED
- **Published Date**: November 05, 2024 at 00:00 UTC
- **Last Updated**: November 06, 2024 at 19:35 UTC
- **Reserved Date**: October 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the luci-mod-rpc package in OpenWRT Luci LTS allows for privilege escalation from an admin account to root via the JSON-RPC-API, which is exposed by the luci-mod-rpc package
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/VitoCrl/vulnerability_research/tree/main/CVE-2024-51240) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0189
- **State**: PUBLISHED
- **Published Date**: September 11, 2019 at 20:29 UTC
- **Last Updated**: August 04, 2024 at 17:44 UTC
- **Reserved Date**: November 14, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
The java.io.ObjectInputStream is known to cause Java serialisation issues. This issue here is exposed by the "webtools/control/httpService" URL, and uses Java deserialization to perform code execution. In the HttpEngine, the value of the request parameter "serviceContext" is passed to the "deserialize" method of "XmlSerializer". Apache Ofbiz is affected via two different dependencies: "commons-beanutils" and an out-dated version of "commons-fileupload" Mitigation: Upgrade to 16.11.06 or manually apply the commits from OFBIZ-10770 and OFBIZ-10837 on branch 16
### Affected Products
**Apache - OFBiz**
Affected versions:
- OFBiz 16.11.01 to 16.11.05 (Status: affected)
### References
1. [[ofbiz-dev] 20190910 [CVE-2019-0189] Apache OFBiz remote code execution and arbitrary file delete via Java](https://s.apache.org/hsn2g)
2. [[ofbiz-notifications] 20190913 [jira] [Updated] (OFBIZ-10837) Improve ObjectInputStream class (CVE-2019-0189)](https://lists.apache.org/thread.html/7316b4fa811e1ec27604cda3c30560e7389fc6b8c91996c9640fabb8%40%3Cnotifications.ofbiz.apache.org%3E)
3. [[ofbiz-notifications] 20190913 [jira] [Updated] (OFBIZ-10770) Update Apache commons-fileupload to last version (CVE-2019-0189)](https://lists.apache.org/thread.html/986ed5f1a0e209f87ed4a2d348ae5735054f9188912bb2fed7a5543f%40%3Cnotifications.ofbiz.apache.org%3E)
4. [[ofbiz-commits] 20200206 svn commit: r1873710 - in /ofbiz/site: security.html template/page/security.tpl.php](https://lists.apache.org/thread.html/r8f01aab5dd92487c191599def3c950c643d7ad297c4db1d6722ea151%40%3Ccommits.ofbiz.apache.org%3E)
5. [[ofbiz-notifications] 20200224 [jira] [Commented] (OFBIZ-10837) Improve ObjectInputStream class (CVE-2019-0189)](https://lists.apache.org/thread.html/r11fd9562dbdfc0be95e40518cbef70ab2565129f6f542a870ab82c69%40%3Cnotifications.ofbiz.apache.org%3E)
6. [[ofbiz-commits] 20200224 [ofbiz-framework] branch trunk updated: Fixed: Improve ObjectInputStream class (CVE-2019-0189) Improved: no functional change (OFBIZ-10837) (OFBIZ-11398)](https://lists.apache.org/thread.html/ref1b535d7bd5423bfb456cd05aa41e52875390cdfc6ae7c50397ead6%40%3Ccommits.ofbiz.apache.org%3E)
7. [[ofbiz-commits] 20200224 [ofbiz-framework] branch release17.12 updated: Fixed: Improve ObjectInputStream class (CVE-2019-0189) Improved: no functional change (OFBIZ-10837) (OFBIZ-11398)](https://lists.apache.org/thread.html/r883840bbb4e2366acd0f6477e86b584000900a270a86587f979a55f9%40%3Ccommits.ofbiz.apache.org%3E)
8. [[ofbiz-commits] 20200224 [ofbiz-framework] branch release18.12 updated: Fixed: Improve ObjectInputStream class (CVE-2019-0189) Improved: no functional change (OFBIZ-10837) (OFBIZ-11398)](https://lists.apache.org/thread.html/rb0e716837168dc1073fcd76bea644806e5337c247fdb5d8c243d41f8%40%3Ccommits.ofbiz.apache.org%3E)
9. [[ofbiz-notifications] 20200224 [jira] [Updated] (OFBIZ-10837) Improve ObjectInputStream class (CVE-2019-0189)](https://lists.apache.org/thread.html/re4623c0fec904882cbbf8cda558f88c1857397fb5c35761bc12a78bd%40%3Cnotifications.ofbiz.apache.org%3E)
10. [[ofbiz-notifications] 20200225 [jira] [Updated] (OFBIZ-10837) Improve ObjectInputStream class (CVE-2019-0189)](https://lists.apache.org/thread.html/rc0a839fe38d3de775f62e39d45af91870950b59688b64ab61ecc080e%40%3Cnotifications.ofbiz.apache.org%3E)
11. [[ofbiz-commits] 20200306 svn commit: r1874880 [5/5] - in /ofbiz/site: download.html release-notes-17.12.01.html security.html template/page/download.tpl.php template/page/release-notes-17.12.01.tpl.php template/page/security.tpl.php](https://lists.apache.org/thread.html/rf8651e75162819a267384f8a31c20884bc3a9a6707afbf75200cd98d%40%3Ccommits.ofbiz.apache.org%3E)
12. [[ofbiz-commits] 20200430 [ofbiz-site] branch master updated: Update for 2 last CVEs: CVE-2019-0235 & CVE-2019-12425](https://lists.apache.org/thread.html/rfafb229c0d805c8f2bd232d28cd1297876faf5c953f1d7bcf76eef4f%40%3Ccommits.ofbiz.apache.org%3E)
13. [[ofbiz-notifications] 20200502 [jira] [Commented] (OFBIZ-10837) Improve ObjectInputStream class (CVE-2019-0189)](https://lists.apache.org/thread.html/r2c2db313ac9a43f1cfbd01092e4acb0b8bd38d90091889236ad827e7%40%3Cnotifications.ofbiz.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5598, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5598
- **State**: PUBLISHED
- **Published Date**: June 29, 2024 at 04:33 UTC
- **Last Updated**: August 01, 2024 at 21:18 UTC
- **Reserved Date**: June 03, 2024 at 17:20 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Advanced File Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.2.4 via the 'fma_local_file_system' function. This makes it possible for unauthenticated attackers to extract sensitive data including backups or other sensitive information if the files have been moved to the built-in Trash folder.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**modalweb - Advanced File Manager**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/9d4ff5ed-8857-46b8-942b-ac0f47880a95?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/file-manager-advanced/trunk/application/class_fma_connector.php#L13)
3. [](https://plugins.trac.wordpress.org/changeset/3107587/)
### Credits
- emad |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4342, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4342 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4342
- **State**: PUBLISHED
- **Published Date**: October 10, 2013 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 16:38 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201611-06](https://security.gentoo.org/glsa/201611-06)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1006100)
3. [](https://github.com/xinetd-org/xinetd/pull/10)
4. [RHSA-2013:1409](http://rhn.redhat.com/errata/RHSA-2013-1409.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5671
- **State**: PUBLISHED
- **Published Date**: February 27, 2019 at 23:00 UTC
- **Last Updated**: September 17, 2024 at 00:46 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the software does not release a resource after its effective lifetime has ended, which may lead to denial of service.
### Affected Products
**Nvidia Corporation - NVIDIA GPU Graphics Driver**
Affected versions:
- All (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/4772)
2. [](http://support.lenovo.com/us/en/solutions/LEN-26250) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0260
- **State**: PUBLISHED
- **Published Date**: January 07, 2024 at 00:00 UTC
- **Last Updated**: August 01, 2024 at 17:41 UTC
- **Reserved Date**: January 06, 2024 at 08:29 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file change_password_teacher.php of the component Password Change. The manipulation leads to session expiration. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249816.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-613: Security Weakness
### Affected Products
**SourceCodester - Engineers Online Portal**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.249816)
2. [](https://vuldb.com/?ctiid.249816)
3. [](https://mega.nz/file/yEsSwK6D#--ygVt0NtzhZdqVxvjaPLCYfnIeBSyf76KaRozOxfVo)
### Credits
- ahmed8199 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16298, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16298 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16298
- **State**: PUBLISHED
- **Published Date**: February 20, 2020 at 21:39 UTC
- **Last Updated**: August 05, 2024 at 01:10 UTC
- **Reserved Date**: September 13, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Open Network Operating System (ONOS) 1.14. In the virtual broadband network gateway application (org.onosproject.virtualbng), the host event listener does not handle the following event types: HOST_MOVED, HOST_REMOVED, HOST_UPDATED. In combination with other applications, this could lead to the absence of intended code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ndss-symposium.org/wp-content/uploads/2020/02/24080.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1222, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1222
- **State**: PUBLISHED
- **Published Date**: February 21, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 18:53 UTC
- **Reserved Date**: February 20, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in RabidHamster R2/Extreme 1.65 and earlier allows remote authenticated users to execute arbitrary code via a long string to TCP port 23.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [79093](http://osvdb.org/79093)
2. [47966](http://secunia.com/advisories/47966)
3. [r2-file-bo(73113)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73113)
4. [](http://aluigi.org/adv/r2_1-adv.txt)
5. [52061](http://www.securityfocus.com/bid/52061) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0711, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0711
- **State**: PUBLISHED
- **Published Date**: April 30, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 22:20 UTC
- **Reserved Date**: November 28, 2017 at 00:00 UTC
- **Assigned By**: qnap
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in QNAP QTS 4.3.3 build 20180126, QTS 4.3.4 build 20180315, and their earlier versions could allow remote attackers to inject arbitrary web script or HTML.
### Affected Products
**QNAP - QTS**
Affected versions:
- QTS 4.3.3 build 20180126, QTS 4.3.4 build 20180315 and earlier (Status: affected)
### References
1. [](https://www.qnap.com/zh-tw/security-advisory/nas-201804-27)
2. [1040779](http://www.securitytracker.com/id/1040779) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-21140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-21140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21140
- **State**: PUBLISHED
- **Published Date**: April 21, 2020 at 20:54 UTC
- **Last Updated**: August 05, 2024 at 12:26 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D3600 before 1.0.0.76 and D6000 before 1.0.0.76.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000060221/Security-Advisory-for-Security-Misconfiguration-on-Some-Modem-Routers-PSV-2018-0097) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50231
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:14 UTC
- **Last Updated**: September 18, 2024 at 18:30 UTC
- **Reserved Date**: December 05, 2023 at 16:15 UTC
- **Assigned By**: zdi
### Vulnerability Description
NETGEAR ProSAFE Network Management System saveNodeLabel Cross-Site Scripting Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Minimal user interaction is required to exploit this vulnerability.
The specific flaw exists within the saveNodeLabel method. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-21838.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NETGEAR - ProSAFE Network Management System**
Affected versions:
- 1.7.0.26 x64 (Status: affected)
### References
1. [ZDI-23-1847](https://www.zerodayinitiative.com/advisories/ZDI-23-1847/)
2. [vendor-provided URL](https://kb.netgear.com/000065901/Security-Advisory-for-Stored-Cross-Site-Scripting-on-the-NMS300-PSV-2023-0106) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56585, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56585 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56585
- **State**: PUBLISHED
- **Published Date**: December 27, 2024 at 14:50 UTC
- **Last Updated**: May 04, 2025 at 09:59 UTC
- **Reserved Date**: December 27, 2024 at 14:03 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: Fix sleeping in atomic context for PREEMPT_RT
Commit bab1c299f3945ffe79 ("LoongArch: Fix sleeping in atomic context in
setup_tlb_handler()") changes the gfp flag from GFP_KERNEL to GFP_ATOMIC
for alloc_pages_node(). However, for PREEMPT_RT kernels we can still get
a "sleeping in atomic context" error:
[ 0.372259] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
[ 0.372266] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 0, name: swapper/1
[ 0.372268] preempt_count: 1, expected: 0
[ 0.372270] RCU nest depth: 1, expected: 1
[ 0.372272] 3 locks held by swapper/1/0:
[ 0.372274] #0: 900000000c9f5e60 (&pcp->lock){+.+.}-{3:3}, at: get_page_from_freelist+0x524/0x1c60
[ 0.372294] #1: 90000000087013b8 (rcu_read_lock){....}-{1:3}, at: rt_spin_trylock+0x50/0x140
[ 0.372305] #2: 900000047fffd388 (&zone->lock){+.+.}-{3:3}, at: __rmqueue_pcplist+0x30c/0xea0
[ 0.372314] irq event stamp: 0
[ 0.372316] hardirqs last enabled at (0): [<0000000000000000>] 0x0
[ 0.372322] hardirqs last disabled at (0): [<9000000005947320>] copy_process+0x9c0/0x26e0
[ 0.372329] softirqs last enabled at (0): [<9000000005947320>] copy_process+0x9c0/0x26e0
[ 0.372335] softirqs last disabled at (0): [<0000000000000000>] 0x0
[ 0.372341] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.12.0-rc7+ #1891
[ 0.372346] Hardware name: Loongson Loongson-3A5000-7A1000-1w-CRB/Loongson-LS3A5000-7A1000-1w-CRB, BIOS vUDK2018-LoongArch-V2.0.0-prebeta9 10/21/2022
[ 0.372349] Stack : 0000000000000089 9000000005a0db9c 90000000071519c8 9000000100388000
[ 0.372486] 900000010038b890 0000000000000000 900000010038b898 9000000007e53788
[ 0.372492] 900000000815bcc8 900000000815bcc0 900000010038b700 0000000000000001
[ 0.372498] 0000000000000001 4b031894b9d6b725 00000000055ec000 9000000100338fc0
[ 0.372503] 00000000000000c4 0000000000000001 000000000000002d 0000000000000003
[ 0.372509] 0000000000000030 0000000000000003 00000000055ec000 0000000000000003
[ 0.372515] 900000000806d000 9000000007e53788 00000000000000b0 0000000000000004
[ 0.372521] 0000000000000000 0000000000000000 900000000c9f5f10 0000000000000000
[ 0.372526] 90000000076f12d8 9000000007e53788 9000000005924778 0000000000000000
[ 0.372532] 00000000000000b0 0000000000000004 0000000000000000 0000000000070000
[ 0.372537] ...
[ 0.372540] Call Trace:
[ 0.372542] [<9000000005924778>] show_stack+0x38/0x180
[ 0.372548] [<90000000071519c4>] dump_stack_lvl+0x94/0xe4
[ 0.372555] [<900000000599b880>] __might_resched+0x1a0/0x260
[ 0.372561] [<90000000071675cc>] rt_spin_lock+0x4c/0x140
[ 0.372565] [<9000000005cbb768>] __rmqueue_pcplist+0x308/0xea0
[ 0.372570] [<9000000005cbed84>] get_page_from_freelist+0x564/0x1c60
[ 0.372575] [<9000000005cc0d98>] __alloc_pages_noprof+0x218/0x1820
[ 0.372580] [<900000000593b36c>] tlb_init+0x1ac/0x298
[ 0.372585] [<9000000005924b74>] per_cpu_trap_init+0x114/0x140
[ 0.372589] [<9000000005921964>] cpu_probe+0x4e4/0xa60
[ 0.372592] [<9000000005934874>] start_secondary+0x34/0xc0
[ 0.372599] [<900000000715615c>] smpboot_entry+0x64/0x6c
This is because in PREEMPT_RT kernels normal spinlocks are replaced by
rt spinlocks and rt_spin_lock() will cause sleeping. Fix it by disabling
NUMA optimization completely for PREEMPT_RT kernels.
### Affected Products
**Linux - Linux**
Affected versions:
- fa96b57c149061f71a70bd6582d995f6424fbbf4 (Status: affected)
- fa96b57c149061f71a70bd6582d995f6424fbbf4 (Status: affected)
- fa96b57c149061f71a70bd6582d995f6424fbbf4 (Status: affected)
- fa96b57c149061f71a70bd6582d995f6424fbbf4 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.19 (Status: affected)
- 0 (Status: unaffected)
- 6.1.120 (Status: unaffected)
- 6.6.66 (Status: unaffected)
- 6.12.5 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/08715b741f9b2a925d6485491e4907f3b29bac70)
2. [](https://git.kernel.org/stable/c/c5f89458a2ea0800866b9fc690d3fa8367dc8f8d)
3. [](https://git.kernel.org/stable/c/6575e0867bd478a5d7ef1783ca1e73160807d238)
4. [](https://git.kernel.org/stable/c/88fd2b70120d52c1010257d36776876941375490) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6772, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6772
- **State**: PUBLISHED
- **Published Date**: December 27, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 20:42 UTC
- **Reserved Date**: December 27, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://w3m.cvs.sourceforge.net/w3m/w3m/file.c?view=log)
2. [FEDORA-2007-077](http://fedoranews.org/cms/node/2415)
3. [20061225 w3m format string bug](http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051457.html)
4. [ADV-2006-5164](http://www.vupen.com/english/advisories/2006/5164)
5. [OpenPKG-SA-2006.44](http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.044.html)
6. [](http://w3m.cvs.sourceforge.net/w3m/w3m/file.c?r1=1.249&r2=1.250)
7. [w3m-certificate-format-string(31114)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31114)
8. [23717](http://secunia.com/advisories/23717)
9. [GLSA-200701-06](http://security.gentoo.org/glsa/glsa-200701-06.xml)
10. [23492](http://secunia.com/advisories/23492)
11. [23792](http://secunia.com/advisories/23792)
12. [](http://w3m.cvs.sourceforge.net/%2Acheckout%2A/w3m/w3m/NEWS?revision=1.79)
13. [1017440](http://securitytracker.com/id?1017440)
14. [w3m-inputanswer-format-string(34821)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34821)
15. [](http://sourceforge.net/tracker/index.php?func=detail&aid=1612792&group_id=39518&atid=425439)
16. [SUSE-SA:2007:005](http://www.novell.com/linux/security/advisories/2007_05_w3m.html)
17. [21735](http://www.securityfocus.com/bid/21735)
18. [24332](http://www.securityfocus.com/bid/24332)
19. [USN-399-1](http://www.ubuntu.com/usn/usn-399-1)
20. [23773](http://secunia.com/advisories/23773)
21. [23588](http://secunia.com/advisories/23588)
22. [FEDORA-2007-078](http://fedoranews.org/cms/node/2416) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3612, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3612 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3612
- **State**: PUBLISHED
- **Published Date**: July 06, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 14:21 UTC
- **Reserved Date**: July 06, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in Visual IRC (ViRC) 2.0 allows remote IRC servers to execute arbitrary code via a long response to a JOIN command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25977](http://secunia.com/advisories/25977)
2. [24798](http://www.securityfocus.com/bid/24798)
3. [37888](http://osvdb.org/37888)
4. [ADV-2007-2467](http://www.vupen.com/english/advisories/2007/2467)
5. [4152](https://www.exploit-db.com/exploits/4152)
6. [virc-join-bo(35276)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35276) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31841
- **State**: PUBLISHED
- **Published Date**: April 19, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 01:59 UTC
- **Reserved Date**: April 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Italtel Embrace 1.6.4. The web server fails to sanitize input data, allowing remote unauthenticated attackers to read arbitrary files on the filesystem.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.gruppotim.it/it/footer/red-team.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14336
- **State**: PUBLISHED
- **Published Date**: June 02, 2021 at 11:48 UTC
- **Last Updated**: August 04, 2024 at 12:39 UTC
- **Reserved Date**: June 17, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in the Restricted Security Context Constraints (SCC), where it allows pods to craft custom network packets. This flaw allows an attacker to cause a denial of service attack on an OpenShift Container Platform cluster if they can deploy pods. The highest threat from this vulnerability is to system availability.
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**n/a - Openshift**
Affected versions:
- Red Hat OpenShift Container Platform 4.6 and Red Hat OpenShift Container Platform 4.5.16 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1858981) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31789
- **State**: PUBLISHED
- **Published Date**: September 06, 2022 at 18:16 UTC
- **Last Updated**: August 03, 2024 at 07:26 UTC
- **Reserved Date**: May 27, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An integer overflow in WatchGuard Firebox and XTM appliances allows an unauthenticated remote attacker to trigger a buffer overflow and potentially execute arbitrary code by sending a malicious request to exposed management ports. This is fixed in Fireware OS 12.8.1, 12.5.10, and 12.1.4.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00015) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0996
- **State**: REJECTED
- **Last Updated**: February 22, 2023 at 00:00 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49541
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:13 UTC
- **Last Updated**: May 04, 2025 at 08:40 UTC
- **Reserved Date**: February 26, 2025 at 02:08 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
cifs: fix potential double free during failed mount
RHBZ: https://bugzilla.redhat.com/show_bug.cgi?id=2088799
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15.46 (Status: unaffected)
- 5.17.14 (Status: unaffected)
- 5.18.3 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ce0008a0e410cdd95f0d8cd81b2902ec10a660c4)
2. [](https://git.kernel.org/stable/c/9a167fc440e5693c1cdd7f07071e05658bd9d89d)
3. [](https://git.kernel.org/stable/c/ee71f8f1cd3c8c4a251fd3e8abc89215ae3457cb)
4. [](https://git.kernel.org/stable/c/8378a51e3f8140f60901fb27208cc7a6e47047b5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3487, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3487 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3487
- **State**: PUBLISHED
- **Published Date**: March 03, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 16:14 UTC
- **Reserved Date**: May 07, 2013 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the security log in the BulletProof Security plugin before .49 for WordPress allow remote attackers to inject arbitrary web script or HTML via unspecified HTML header fields to (1) 400.php, (2) 403.php, or (3) 403.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [53614](http://secunia.com/advisories/53614)
2. [wp-bulletproofsecurity-cve20133487-xss(86160)](https://exchange.xforce.ibmcloud.com/vulnerabilities/86160)
3. [61583](http://www.securityfocus.com/bid/61583)
4. [95928](http://osvdb.org/95928)
5. [](http://wordpress.org/plugins/bulletproof-security/changelog)
6. [95930](http://osvdb.org/95930)
7. [95929](http://osvdb.org/95929) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26716, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26716
- **State**: PUBLISHED
- **Published Date**: February 21, 2021 at 05:53 UTC
- **Last Updated**: August 03, 2024 at 20:33 UTC
- **Reserved Date**: February 05, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Modules/input/Views/schedule.php in Emoncms through 10.2.7 allows XSS via the node parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/emoncms/emoncms/issues/1652) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27006
- **State**: PUBLISHED
- **Published Date**: February 09, 2021 at 15:38 UTC
- **Last Updated**: August 04, 2024 at 16:03 UTC
- **Reserved Date**: October 12, 2020 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PCT files. This could result in a memory corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12182)
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Siemens - JT2Go**
Affected versions:
- All versions < V13.1.0.1 (Status: affected)
**Siemens - Teamcenter Visualization**
Affected versions:
- All versions < V13.1.0.1 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-232/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29821
- **State**: PUBLISHED
- **Published Date**: October 18, 2024 at 23:06 UTC
- **Last Updated**: October 21, 2024 at 17:17 UTC
- **Reserved Date**: March 20, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Ivanti DSM < version 2024.2 allows authenticated users on the local machine to run code with elevated privileges due to insecure ACL via unspecified attack vector.
### Affected Products
**Ivanti - DSM**
Affected versions:
- 2024.2 (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/SA-2024-07-12-CVE-2024-29821) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48251, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48251 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48251
- **State**: PUBLISHED
- **Published Date**: January 10, 2024 at 13:00 UTC
- **Last Updated**: August 02, 2024 at 21:23 UTC
- **Reserved Date**: November 13, 2023 at 13:44 UTC
- **Assigned By**: bosch
### Vulnerability Description
The vulnerability allows a remote attacker to authenticate to the SSH service with root privileges through a hidden hard-coded account.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Rexroth - Nexo cordless nutrunner NXA015S-36V (0608842001)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA030S-36V (0608842002)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA050S-36V (0608842003)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXP012QD-36V (0608842005)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA015S-36V-B (0608842006)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA030S-36V-B (0608842007)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA050S-36V-B (0608842008)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXP012QD-36V-B (0608842010)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA011S-36V (0608842011)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA011S-36V-B (0608842012)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA065S-36V (0608842013)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA065S-36V-B (0608842014)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXV012T-36V (0608842015)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXV012T-36V-B (0608842016)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2272)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2301)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2514)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2515)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2666)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2673)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
### References
1. [https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html](https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43246, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43246
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 14:15 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Hyper-V Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43246) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5840
- **State**: PUBLISHED
- **Published Date**: June 06, 2018 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 21:08 UTC
- **Reserved Date**: January 19, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Buffer Copy without Checking Size of Input can occur during the DRM SDE driver initialization sequence in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-security-bulletin-2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0920, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0920 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0920
- **State**: PUBLISHED
- **Published Date**: June 12, 2019 at 13:49 UTC
- **Last Updated**: May 20, 2025 at 17:49 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
In a web-based attack scenario, an attacker could host a specially crafted website designed to exploit the vulnerability through a Microsoft browser and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the browser rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.
The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Internet Explorer 11**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Internet Explorer 10**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Internet Explorer 9**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Scripting Engine Memory Corruption Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-0920) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2102, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2102 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2102
- **State**: PUBLISHED
- **Published Date**: April 28, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 13:39 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in Hands-on Vulnerability Learning Tool "AppGoat" for Web Application V3.0.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
### Affected Products
**INFORMATION-TECHNOLOGY PROMOTION AGENCY, JAPAN (IPA) - Hands-on Vulnerability Learning Tool "AppGoat" for Web Application**
Affected versions:
- V3.0.0 and earlier (Status: affected)
### References
1. [96260](http://www.securityfocus.com/bid/96260)
2. [JVN#39008927](http://jvn.jp/en/jp/JVN39008927/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6020
- **State**: PUBLISHED
- **Published Date**: September 24, 2020 at 13:25 UTC
- **Last Updated**: August 04, 2024 at 08:47 UTC
- **Reserved Date**: January 07, 2020 at 00:00 UTC
- **Assigned By**: checkpoint
### Vulnerability Description
Check Point Security Management's Internal CA web management before Jumbo HFAs R80.10 Take 278, R80.20 Take 160, R80.30 Take 210, and R80.40 Take 38, can be manipulated to run commands as a high privileged user or crash, due to weak input validation on inputs by a trusted management administrator.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - ICA Management Portal**
Affected versions:
- before JHFs R80.20 Take 160, R80.30 Take 210, and R80.40 Take 38 (Status: affected)
### References
1. [](https://supportcontent.checkpoint.com/solutions?id=sk142952) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7062, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7062 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7062
- **State**: PUBLISHED
- **Published Date**: June 27, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 01:50 UTC
- **Reserved Date**: August 23, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
rhscon-ceph in Red Hat Storage Console 2 x86_64 and Red Hat Storage Console Node 2 x86_64 allows local users to obtain the password as cleartext.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93796](http://www.securityfocus.com/bid/93796)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1381681)
3. [1037062](http://www.securitytracker.com/id/1037062)
4. [RHSA-2016:2082](https://access.redhat.com/errata/RHSA-2016:2082) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34710
- **State**: PUBLISHED
- **Published Date**: May 20, 2024 at 21:59 UTC
- **Last Updated**: August 02, 2024 at 02:59 UTC
- **Reserved Date**: May 07, 2024 at 13:53 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Wiki.js is al wiki app built on Node.js. Client side template injection was discovered, that could allow an attacker to inject malicious JavaScript into the content section of pages that would execute once a victim loads the page that contains the payload. This was possible through the injection of a invalid HTML tag with a template injection payload on the next line. This vulnerability is fixed in 2.5.303.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-1336: Security Weakness
### Affected Products
**requarks - wiki**
Affected versions:
- <= 2.5.302 (Status: affected)
### References
1. [https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf](https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf)
2. [https://github.com/requarks/wiki/commit/1238d614e1599fefadd4614ee4b5797a087f50ac](https://github.com/requarks/wiki/commit/1238d614e1599fefadd4614ee4b5797a087f50ac) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3823, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3823 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3823
- **State**: PUBLISHED
- **Published Date**: July 25, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 18:48 UTC
- **Reserved Date**: July 24, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in GeodesicSolutions (1) GeoAuctions Premier 2.0.3 and (2) GeoClassifieds Basic 2.0.3 allows remote attackers to execute arbitrary SQL commands via the b parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [106367](http://osvdb.org/show/osvdb/106367)
2. [21340](http://secunia.com/advisories/21340)
3. [ADV-2006-3132](http://www.vupen.com/english/advisories/2006/3132)
4. [](http://www.packetstormsecurity.org/0607-exploits/geoauctionsSQL.txt)
5. [67078](http://www.securityfocus.com/bid/67078)
6. [58308](http://secunia.com/advisories/58308)
7. [](http://packetstormsecurity.com/files/126329/GeoCore-MAX-DB-7.3.3-Blind-SQL-Injection.html)
8. [33075](http://www.exploit-db.com/exploits/33075)
9. [19093](http://www.securityfocus.com/bid/19093) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20650
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 17:29 UTC
- **Last Updated**: August 05, 2024 at 02:46 UTC
- **Reserved Date**: April 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by denial of service. This affects R8900 before 1.0.5.2, R9000 before 1.0.5.2, XR500 before 2.3.2.56, and XR700 before 1.0.1.20.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000061492/Security-Advisory-for-Denial-of-Service-on-Some-Routers-PSV-2019-0197) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49220, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49220
- **State**: PUBLISHED
- **Published Date**: October 17, 2024 at 18:05 UTC
- **Last Updated**: October 17, 2024 at 18:34 UTC
- **Reserved Date**: October 14, 2024 at 10:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Cookie Scanner – Nikel Schubert Cookie Scanner allows Stored XSS.This issue affects Cookie Scanner: from n/a through 1.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Cookie Scanner – Nikel Schubert - Cookie Scanner**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/cookie-scanner/wordpress-cookie-scanner-plugin-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0532
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:49 UTC
- **Reserved Date**: June 07, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
EMU Webmail allows local users to execute arbitrary programs via a .. (dot dot) in the HTTP Host header that points to a Trojan horse configuration file that contains a pageroot specifier that contains shell metacharacters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5270](http://www.osvdb.org/5270)
2. [emumail-http-host-execute(8836)](http://www.iss.net/security_center/static/8836.php)
3. [20020410 Re: emumail.cgi, one more local vulnerability (not verified)](http://online.securityfocus.com/archive/1/266930)
4. [4488](http://www.securityfocus.com/bid/4488) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1001
- **State**: PUBLISHED
- **Published Date**: March 19, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 08:08 UTC
- **Reserved Date**: February 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Apple Safari before 3.1, when running on Windows XP or Vista, allows remote attackers to inject arbitrary web script or HTML via a crafted URL that is not properly handled in the error page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28321](http://www.securityfocus.com/bid/28321)
2. [safari-errorpage-xss(41333)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41333)
3. [1019653](http://www.securitytracker.com/id?1019653)
4. [TA08-079A](http://www.us-cert.gov/cas/techalerts/TA08-079A.html)
5. [APPLE-SA-2008-03-18](http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html)
6. [28290](http://www.securityfocus.com/bid/28290)
7. [](http://docs.info.apple.com/article.html?artnum=307563)
8. [ADV-2008-0920](http://www.vupen.com/english/advisories/2008/0920/references) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17588
- **State**: PUBLISHED
- **Published Date**: October 02, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 10:54 UTC
- **Reserved Date**: September 28, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AirTies Air 5021 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45525](https://www.exploit-db.com/exploits/45525/)
2. [](http://packetstormsecurity.com/files/149598/Airties-AIR5021-1.0.0.18-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4161, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4161 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4161
- **State**: PUBLISHED
- **Published Date**: December 02, 2009 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 01:16 UTC
- **Reserved Date**: December 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the [AN] Search it! (an_searchit) extension 2.4.1 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37165](http://www.securityfocus.com/bid/37165)
2. [](http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-017/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28850, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28850
- **State**: PUBLISHED
- **Published Date**: April 03, 2023 at 17:09 UTC
- **Last Updated**: February 11, 2025 at 14:36 UTC
- **Reserved Date**: March 24, 2023 at 16:25 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Pimcore Perspective Editor provides an editor for Pimcore that allows users to add/remove/edit custom views and perspectives. This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Version 1.5.1 has a patch. As a workaround, one may apply the patch manually.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**pimcore - perspective-editor**
Affected versions:
- < 1.5.1 (Status: affected)
### References
1. [https://github.com/pimcore/perspective-editor/security/advisories/GHSA-fq8q-55v3-2986](https://github.com/pimcore/perspective-editor/security/advisories/GHSA-fq8q-55v3-2986)
2. [https://github.com/pimcore/perspective-editor/pull/121.patch](https://github.com/pimcore/perspective-editor/pull/121.patch)
3. [https://huntr.dev/bounties/5529f51e-e40f-46f1-887b-c9dbebab4f06/](https://huntr.dev/bounties/5529f51e-e40f-46f1-887b-c9dbebab4f06/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1699
- **State**: PUBLISHED
- **Published Date**: June 10, 2009 at 17:37 UTC
- **Last Updated**: August 07, 2024 at 05:20 UTC
- **Reserved Date**: May 20, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The XSL stylesheet implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle XML external entities, which allows remote attackers to read arbitrary files via a crafted DTD, as demonstrated by a file:///etc/passwd URL in an entity declaration, related to an "XXE attack."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT3639)
2. [43068](http://secunia.com/advisories/43068)
3. [ADV-2009-1621](http://www.vupen.com/english/advisories/2009/1621)
4. [8907](https://www.exploit-db.com/exploits/8907)
5. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212)
6. [](http://scary.beasts.org/security/CESA-2009-006.html)
7. [APPLE-SA-2009-06-08-1](http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html)
8. [54972](http://osvdb.org/54972)
9. [35260](http://www.securityfocus.com/bid/35260)
10. [ADV-2009-1522](http://www.vupen.com/english/advisories/2009/1522)
11. [APPLE-SA-2009-06-17-1](http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html)
12. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html)
13. [35379](http://secunia.com/advisories/35379)
14. [USN-857-1](http://www.ubuntu.com/usn/USN-857-1)
15. [35321](http://www.securityfocus.com/bid/35321)
16. [](http://scarybeastsecurity.blogspot.com/2009/06/apples-safari-4-fixes-local-file-theft.html)
17. [](http://support.apple.com/kb/HT3613) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37894
- **State**: PUBLISHED
- **Published Date**: May 20, 2025 at 15:21 UTC
- **Last Updated**: May 26, 2025 at 05:23 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: use sock_gen_put() when sk_state is TCP_TIME_WAIT
It is possible for a pointer of type struct inet_timewait_sock to be
returned from the functions __inet_lookup_established() and
__inet6_lookup_established(). This can cause a crash when the
returned pointer is of type struct inet_timewait_sock and
sock_put() is called on it. The following is a crash call stack that
shows sk->sk_wmem_alloc being accessed in sk_free() during the call to
sock_put() on a struct inet_timewait_sock pointer. To avoid this issue,
use sock_gen_put() instead of sock_put() when sk->sk_state
is TCP_TIME_WAIT.
mrdump.ko ipanic() + 120
vmlinux notifier_call_chain(nr_to_call=-1, nr_calls=0) + 132
vmlinux atomic_notifier_call_chain(val=0) + 56
vmlinux panic() + 344
vmlinux add_taint() + 164
vmlinux end_report() + 136
vmlinux kasan_report(size=0) + 236
vmlinux report_tag_fault() + 16
vmlinux do_tag_recovery() + 16
vmlinux __do_kernel_fault() + 88
vmlinux do_bad_area() + 28
vmlinux do_tag_check_fault() + 60
vmlinux do_mem_abort() + 80
vmlinux el1_abort() + 56
vmlinux el1h_64_sync_handler() + 124
vmlinux > 0xFFFFFFC080011294()
vmlinux __lse_atomic_fetch_add_release(v=0xF2FFFF82A896087C)
vmlinux __lse_atomic_fetch_sub_release(v=0xF2FFFF82A896087C)
vmlinux arch_atomic_fetch_sub_release(i=1, v=0xF2FFFF82A896087C)
+ 8
vmlinux raw_atomic_fetch_sub_release(i=1, v=0xF2FFFF82A896087C)
+ 8
vmlinux atomic_fetch_sub_release(i=1, v=0xF2FFFF82A896087C) + 8
vmlinux __refcount_sub_and_test(i=1, r=0xF2FFFF82A896087C,
oldp=0) + 8
vmlinux __refcount_dec_and_test(r=0xF2FFFF82A896087C, oldp=0) + 8
vmlinux refcount_dec_and_test(r=0xF2FFFF82A896087C) + 8
vmlinux sk_free(sk=0xF2FFFF82A8960700) + 28
vmlinux sock_put() + 48
vmlinux tcp6_check_fraglist_gro() + 236
vmlinux tcp6_gro_receive() + 624
vmlinux ipv6_gro_receive() + 912
vmlinux dev_gro_receive() + 1116
vmlinux napi_gro_receive() + 196
ccmni.ko ccmni_rx_callback() + 208
ccmni.ko ccmni_queue_recv_skb() + 388
ccci_dpmaif.ko dpmaif_rxq_push_thread() + 1088
vmlinux kthread() + 268
vmlinux 0xFFFFFFC08001F30C()
### Affected Products
**Linux - Linux**
Affected versions:
- c9d1d23e5239f41700be69133a5769ac5ebc88a8 (Status: affected)
- c9d1d23e5239f41700be69133a5769ac5ebc88a8 (Status: affected)
- c9d1d23e5239f41700be69133a5769ac5ebc88a8 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.10 (Status: affected)
- 0 (Status: unaffected)
- 6.12.28 (Status: unaffected)
- 6.14.6 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c0dba059b118b5206e755042b15b49368a388898)
2. [](https://git.kernel.org/stable/c/786650e644c5b1c063921799ca203c0b8670d79a)
3. [](https://git.kernel.org/stable/c/f920436a44295ca791ebb6dae3f4190142eec703) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12270, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12270 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12270
- **State**: PUBLISHED
- **Published Date**: May 20, 2019 at 13:32 UTC
- **Last Updated**: August 05, 2024 at 08:30 UTC
- **Reserved Date**: June 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Valve Steam 1528829181 BETA, it is possible to perform a homograph / homoglyph attack to create fake URLs in the client, which may trick users into visiting unintended web sites.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/VixusFoxy/CVE/wiki/CVE-2018-12270) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23847
- **State**: PUBLISHED
- **Published Date**: June 09, 2021 at 14:19 UTC
- **Last Updated**: September 17, 2024 at 02:46 UTC
- **Reserved Date**: January 12, 2021 at 00:00 UTC
- **Assigned By**: bosch
### Vulnerability Description
A Missing Authentication in Critical Function in Bosch IP cameras allows an unauthenticated remote attacker to extract sensitive information or change settings of the camera by sending crafted requests to the device. Only devices of the CPP6, CPP7 and CPP7.3 family with firmware 7.70, 7.72, and 7.80 prior to B128 are affected by this vulnerability. Versions 7.62 or lower and INTEOX cameras are not affected.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Bosch - CPP Firmware**
Affected versions:
- 7.70 (Status: affected)
- 7.72 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://psirt.bosch.com/security-advisories/bosch-sa-478243-bt.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29742
- **State**: PUBLISHED
- **Published Date**: May 30, 2023 at 00:00 UTC
- **Last Updated**: January 14, 2025 at 16:55 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue found in BestWeather v.7.3.1 for Android allows unauthorized apps to cause a code execution attack by manipulating the database.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zmtqsh.com/)
2. [](https://play.google.com/store/apps/details?id=com.icoolme.android.weather)
3. [](https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29742/CVE%20detail.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10375, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10375 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10375
- **State**: PUBLISHED
- **Published Date**: February 05, 2021 at 19:26 UTC
- **Last Updated**: August 04, 2024 at 10:58 UTC
- **Reserved Date**: March 10, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in New Media Smarty before 9.10. Passwords are stored in the database in an obfuscated format that can be easily reversed. The file data.mdb contains these obfuscated passwords in the second column. NOTE: this is unrelated to the popular Smarty template engine product.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.x41-dsec.de/lab/advisories/x41-2020-005-smarty/)
2. [](https://www.smarty-online.de) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2731, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2731 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2731
- **State**: PUBLISHED
- **Published Date**: June 01, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:58 UTC
- **Reserved Date**: June 01, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Enigma Haber 4.3 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in (a) e_mesaj_yas.asp, (b) edi_haber.asp, and (c) haber_devam.asp; (2) hid parameter in (d) yazdir.asp and (e) yorum.asp, and the (3) e parameter in (f) arsiv.asp. NOTE: with administrator credentials, additional vectors exist including (4) yid parameter to (g) admin/y_admin.asp, (5) bid parameter to (h) admin/reklam_detay.asp, hid parameter to (i) admin/detay_yorum.asp and (j) admin/haber_sil.asp, (6) kid parameter to (k) admin/kategori_d.asp, (7) tur parameter to (l) admin/haber_ekle.asp, (8) s parameter to (m) admin/e_mesaj_yaz.asp, and id parameter to (n) admin/admin_sil.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26109](http://www.osvdb.org/26109)
2. [26119](http://www.osvdb.org/26119)
3. [26115](http://www.osvdb.org/26115)
4. [26107](http://www.osvdb.org/26107)
5. [20060528 Advisory: Enigma Haber <= 4.3 Multiple Remote SQL InjectionVulnerabilities](http://www.securityfocus.com/archive/1/435282/100/0/threaded)
6. [enigmahaber-multiple-sql-injection(26837)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26837)
7. [26110](http://www.osvdb.org/26110)
8. [26108](http://www.osvdb.org/26108)
9. [1016171](http://securitytracker.com/id?1016171)
10. [ADV-2006-2032](http://www.vupen.com/english/advisories/2006/2032)
11. [1003](http://securityreason.com/securityalert/1003)
12. [26111](http://www.osvdb.org/26111)
13. [](http://www.nukedx.com/?getxpl=34)
14. [26112](http://www.osvdb.org/26112)
15. [26116](http://www.osvdb.org/26116)
16. [26117](http://www.osvdb.org/26117)
17. [](http://www.nukedx.com/?viewdoc=34)
18. [18148](http://www.securityfocus.com/bid/18148)
19. [26106](http://www.osvdb.org/26106)
20. [26114](http://www.osvdb.org/26114)
21. [26113](http://www.osvdb.org/26113)
22. [26118](http://www.osvdb.org/26118)
23. [20357](http://secunia.com/advisories/20357) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35802, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35802
- **State**: REJECTED
- **Published Date**: May 17, 2024 at 13:23 UTC
- **Last Updated**: May 28, 2024 at 19:07 UTC
- **Reserved Date**: May 17, 2024 at 12:19 UTC
- **Assigned By**: Linux
### Vulnerability Description
No description available |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.