System stringclasses 1
value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1550
- **State**: PUBLISHED
- **Published Date**: September 26, 2018 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 22:50 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Spectrum Protect 7.1 and 8.1 could allow a local user to corrupt or delete highly sensitive information that would cause a denial of service to other users. IBM X-Force ID: 142696.
### Affected Products
**IBM - Spectrum Protect**
Affected versions:
- 7.1 (Status: affected)
- 8.1 (Status: affected)
### References
1. [ibm-tivoli-cve20181550-dos(142696)](https://exchange.xforce.ibmcloud.com/vulnerabilities/142696)
2. [](http://www.ibm.com/support/docview.wss?uid=ibm10719401) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4141, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4141
- **State**: PUBLISHED
- **Published Date**: April 30, 2025 at 22:00 UTC
- **Last Updated**: May 01, 2025 at 15:33 UTC
- **Reserved Date**: April 30, 2025 at 14:07 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Netgear EX6200 1.0.3.94. This affects the function sub_3C03C. The manipulation of the argument host leads to buffer overflow. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
- CWE-119: Security Weakness
### Affected Products
**Netgear - EX6200**
Affected versions:
- 1.0.3.94 (Status: affected)
### References
1. [VDB-306633 | Netgear EX6200 sub_3C03C buffer overflow](https://vuldb.com/?id.306633)
2. [VDB-306633 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.306633)
3. [Submit #560789 | Netgear EX6200 1.0.3.94 Buffer Overflow](https://vuldb.com/?submit.560789)
4. [](https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_ex6200/Buffer_overflow-sub_3C03C-bpa_server/README.md)
5. [](https://www.netgear.com/)
### Credits
- 54357 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4430, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4430 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4430
- **State**: PUBLISHED
- **Published Date**: July 17, 2019 at 14:05 UTC
- **Last Updated**: September 17, 2024 at 03:02 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Maximo Asset Management 7.6 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 162887.
### Affected Products
**IBM - Maximo Asset Management**
Affected versions:
- 7.6 (Status: affected)
### References
1. [](https://www.ibm.com/support/docview.wss?uid=ibm10959173)
2. [ibm-maximo-cve20194430-info-disc (162887)](https://exchange.xforce.ibmcloud.com/vulnerabilities/162887) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20292, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20292
- **State**: PUBLISHED
- **Published Date**: May 28, 2021 at 10:42 UTC
- **Last Updated**: August 03, 2024 at 17:37 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**n/a - kernel**
Affected versions:
- Kernel 5.9 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1939686)
2. [[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1021
- **State**: PUBLISHED
- **Published Date**: January 29, 2024 at 22:00 UTC
- **Last Updated**: June 06, 2025 at 20:16 UTC
- **Reserved Date**: January 29, 2024 at 10:47 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in Rebuild up to 3.5.5. Affected by this issue is the function readRawText of the component HTTP Request Handler. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252290 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**n/a - Rebuild**
Affected versions:
- 3.5.0 (Status: affected)
- 3.5.1 (Status: affected)
- 3.5.2 (Status: affected)
- 3.5.3 (Status: affected)
- 3.5.4 (Status: affected)
- 3.5.5 (Status: affected)
### References
1. [](https://vuldb.com/?id.252290)
2. [](https://vuldb.com/?ctiid.252290)
3. [](https://www.yuque.com/mailemonyeyongjuan/tha8tr/yemvnt5uo53gfem5)
### Credits
- lemono (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20301, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20301 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20301
- **State**: PUBLISHED
- **Published Date**: December 20, 2018 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 11:58 UTC
- **Reserved Date**: December 19, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Steve Pallen Coherence before 0.5.2 that is similar to a Mass Assignment vulnerability. In particular, "registration" endpoints (e.g., creating, editing, updating) allow users to update any coherence_fields data. For example, users can automatically confirm their accounts by sending the confirmed_at parameter with their registration request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/smpallen99/coherence/issues/270) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30563
- **State**: PUBLISHED
- **Published Date**: July 13, 2023 at 19:04 UTC
- **Last Updated**: October 22, 2024 at 15:48 UTC
- **Reserved Date**: April 12, 2023 at 16:30 UTC
- **Assigned By**: BD
### Vulnerability Description
A malicious file could be uploaded into a System Manager User Import Function resulting in a hijacked session.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Becton Dickinson & Co - BD Alarisâ„¢ Systems Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-alaris-system-with-guardrails-suite-mx) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8638
- **State**: PUBLISHED
- **Published Date**: December 28, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 08:20 UTC
- **Reserved Date**: December 23, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:2403](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html)
2. [1034544](http://www.securitytracker.com/id/1034544)
3. [RHSA-2015:2697](http://rhn.redhat.com/errata/RHSA-2015-2697.html)
4. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680)
5. [](https://helpx.adobe.com/security/products/flash-player/apsb16-01.html)
6. [SUSE-SU-2015:2401](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html)
7. [](http://www.zerodayinitiative.com/advisories/ZDI-15-648)
8. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722)
9. [SUSE-SU-2015:2402](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html)
10. [79701](http://www.securityfocus.com/bid/79701)
11. [openSUSE-SU-2015:2400](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html)
12. [GLSA-201601-03](https://security.gentoo.org/glsa/201601-03)
13. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4889, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4889
- **State**: PUBLISHED
- **Published Date**: September 10, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 20:50 UTC
- **Reserved Date**: September 10, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine Firewall Analyzer 7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) subTab or (2) tab parameter to createAnomaly.do; (3) url, (4) subTab, or (5) tab parameter to mindex.do; (6) tab parameter to index2.do; or (7) port parameter to syslogViewer.do.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [firewallanalyzer-multiple-xss(74538)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74538)
2. [48657](http://secunia.com/advisories/48657)
3. [80874](http://osvdb.org/80874)
4. [80875](http://osvdb.org/80875)
5. [52841](http://www.securityfocus.com/bid/52841)
6. [](http://www.vulnerability-lab.com/get_content.php?id=437)
7. [](http://packetstormsecurity.org/files/111474/VL-437.txt)
8. [80873](http://osvdb.org/80873)
9. [80872](http://osvdb.org/80872) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18250, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18250
- **State**: PUBLISHED
- **Published Date**: March 27, 2018 at 03:00 UTC
- **Last Updated**: August 05, 2024 at 21:13 UTC
- **Reserved Date**: March 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in ImageMagick 7.0.7. A NULL pointer dereference vulnerability was found in the function LogOpenCLBuildFailure in MagickCore/opencl.c, which allows attackers to cause a denial of service via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/issues/793) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7598, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7598
- **State**: PUBLISHED
- **Published Date**: February 20, 2017 at 08:35 UTC
- **Last Updated**: August 06, 2024 at 02:04 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory via a crafted web site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT207427)
2. [94907](http://www.securityfocus.com/bid/94907)
3. [](https://support.apple.com/HT207421)
4. [1037459](http://www.securitytracker.com/id/1037459)
5. [](https://support.apple.com/HT207422)
6. [GLSA-201706-15](https://security.gentoo.org/glsa/201706-15)
7. [](https://support.apple.com/HT207424) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-22204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-22204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-22204
- **State**: PUBLISHED
- **Published Date**: June 16, 2021 at 17:13 UTC
- **Last Updated**: August 04, 2024 at 14:51 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection in ECShop 2.7.6 via the goods_number parameter to flow.php. .
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/blindkey/cve_like/issues/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2260
- **State**: REJECTED
- **Published Date**: January 02, 2017 at 09:46 UTC
- **Last Updated**: January 02, 2017 at 09:57 UTC
- **Reserved Date**: February 08, 2016 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7300, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7300 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7300
- **State**: PUBLISHED
- **Published Date**: March 29, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 15:56 UTC
- **Reserved Date**: March 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a heap-based buffer over-read (off-by-one) because of an incomplete check for invalid string offsets while loading symbols, leading to a GNU linker (ld) program crash.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [97219](http://www.securityfocus.com/bid/97219)
2. [](https://sourceware.org/bugzilla/show_bug.cgi?id=20909) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3222, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3222
- **State**: PUBLISHED
- **Published Date**: June 03, 2020 at 17:41 UTC
- **Last Updated**: November 15, 2024 at 17:15 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass access control restrictions on an affected device. The vulnerability is due to the presence of a proxy service at a specific endpoint of the web UI. An attacker could exploit this vulnerability by connecting to the proxy service. An exploit could allow the attacker to bypass access restrictions on the network by proxying their access request through the management network of the affected device. As the proxy is reached over the management virtual routing and forwarding (VRF), this could reduce the effectiveness of the bypass.
### Weakness Classification (CWE)
- CWE-17: Security Weakness
### Affected Products
**Cisco - Cisco IOS XE Software 16.10.1**
Affected versions:
- n/a (Status: affected)
### References
1. [20200603 Cisco IOS XE Software Web UI Unauthenticated Proxy Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-unauthprxy-KXXsbWh) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29213, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29213 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29213
- **State**: PUBLISHED
- **Published Date**: May 20, 2022 at 23:30 UTC
- **Last Updated**: April 22, 2025 at 17:56 UTC
- **Reserved Date**: April 13, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the `tf.compat.v1.signal.rfft2d` and `tf.compat.v1.signal.rfft3d` lack input validation and under certain condition can result in crashes (due to `CHECK`-failures). Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- < 2.6.4 (Status: affected)
- >= 2.7.0rc0, < 2.7.2 (Status: affected)
- >= 2.8.0rc0, < 2.8.1 (Status: affected)
- >= 2.9.0rc0, < 2.9.0 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4)
2. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2)
3. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1)
4. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0)
5. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5889-7v45-q28m)
6. [](https://github.com/tensorflow/tensorflow/issues/55263)
7. [](https://github.com/tensorflow/tensorflow/pull/55274)
8. [](https://github.com/tensorflow/tensorflow/commit/0a8a781e597b18ead006d19b7d23d0a369e9ad73) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46044, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46044
- **State**: PUBLISHED
- **Published Date**: January 06, 2022 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 04:54 UTC
- **Reserved Date**: January 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1via ShiftMetaOffset.isra, which causes a Denial of Service (context-dependent).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gpac/gpac/issues/2006)
2. [DSA-5411](https://www.debian.org/security/2023/dsa-5411) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0650
- **State**: PUBLISHED
- **Published Date**: August 05, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:58 UTC
- **Reserved Date**: August 04, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in GSAPAK.EXE for GameSpy Arcade, possibly versions before 1.3e, allows remote attackers to overwrite arbitrary files and execute arbitrary code via .. (dot dot) sequences in filenames in a .APK (Zip) file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8309](http://www.securityfocus.com/bid/8309)
2. [20030730 GameSpy Arcade Arbitrary File Writing Vulnerability](http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0064.html)
3. [20030730 GameSpy Arcade Arbitrary File Writing Vulnerability](http://marc.info/?l=bugtraq&m=105958779017085&w=2)
4. [](http://www.gamespyarcade.com/features/versions.shtml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39549
- **State**: PUBLISHED
- **Published Date**: September 20, 2021 at 15:26 UTC
- **Last Updated**: August 04, 2024 at 02:06 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function file::WavFile::WavFile() located in wav_file.c. It allows an attacker to cause Denial of Service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sahaRatul/sela/issues/27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4203, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4203
- **State**: PUBLISHED
- **Published Date**: September 24, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 10:08 UTC
- **Reserved Date**: September 24, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in cn_users.php in CzarNews 1.20 and earlier allows remote attackers to execute arbitrary SQL commands via a recook cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6462](https://www.exploit-db.com/exploits/6462)
2. [4306](http://securityreason.com/securityalert/4306)
3. [czarnews-cnusers-sql-injection(45127)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45127)
4. [31182](http://www.securityfocus.com/bid/31182) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44079
- **State**: PUBLISHED
- **Published Date**: November 22, 2021 at 07:00 UTC
- **Last Updated**: August 04, 2024 at 04:10 UTC
- **Reserved Date**: November 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the wazuh-slack active response script in Wazuh 4.2.x before 4.2.5, untrusted user agents are passed to a curl command line, potentially resulting in remote code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wazuh/wazuh/issues/10858)
2. [](https://github.com/wazuh/wazuh/pull/10809)
3. [](https://github.com/wazuh/wazuh/issues/10858#issuecomment-991118254) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41781, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41781
- **State**: PUBLISHED
- **Published Date**: August 29, 2022 at 04:54 UTC
- **Last Updated**: August 04, 2024 at 03:15 UTC
- **Reserved Date**: September 29, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.foxit.com/support/security-bulletins.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49812, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49812 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49812
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 14:09 UTC
- **Last Updated**: May 04, 2025 at 08:45 UTC
- **Reserved Date**: May 01, 2025 at 14:05 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
bridge: switchdev: Fix memory leaks when changing VLAN protocol
The bridge driver can offload VLANs to the underlying hardware either
via switchdev or the 8021q driver. When the former is used, the VLAN is
marked in the bridge driver with the 'BR_VLFLAG_ADDED_BY_SWITCHDEV'
private flag.
To avoid the memory leaks mentioned in the cited commit, the bridge
driver will try to delete a VLAN via the 8021q driver if the VLAN is not
marked with the previously mentioned flag.
When the VLAN protocol of the bridge changes, switchdev drivers are
notified via the 'SWITCHDEV_ATTR_ID_BRIDGE_VLAN_PROTOCOL' attribute, but
the 8021q driver is also called to add the existing VLANs with the new
protocol and delete them with the old protocol.
In case the VLANs were offloaded via switchdev, the above behavior is
both redundant and buggy. Redundant because the VLANs are already
programmed in hardware and drivers that support VLAN protocol change
(currently only mlx5) change the protocol upon the switchdev attribute
notification. Buggy because the 8021q driver is called despite these
VLANs being marked with 'BR_VLFLAG_ADDED_BY_SWITCHDEV'. This leads to
memory leaks [1] when the VLANs are deleted.
Fix by not calling the 8021q driver for VLANs that were already
programmed via switchdev.
[1]
unreferenced object 0xffff8881f6771200 (size 256):
comm "ip", pid 446855, jiffies 4298238841 (age 55.240s)
hex dump (first 32 bytes):
00 00 7f 0e 83 88 ff ff 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<00000000012819ac>] vlan_vid_add+0x437/0x750
[<00000000f2281fad>] __br_vlan_set_proto+0x289/0x920
[<000000000632b56f>] br_changelink+0x3d6/0x13f0
[<0000000089d25f04>] __rtnl_newlink+0x8ae/0x14c0
[<00000000f6276baf>] rtnl_newlink+0x5f/0x90
[<00000000746dc902>] rtnetlink_rcv_msg+0x336/0xa00
[<000000001c2241c0>] netlink_rcv_skb+0x11d/0x340
[<0000000010588814>] netlink_unicast+0x438/0x710
[<00000000e1a4cd5c>] netlink_sendmsg+0x788/0xc40
[<00000000e8992d4e>] sock_sendmsg+0xb0/0xe0
[<00000000621b8f91>] ____sys_sendmsg+0x4ff/0x6d0
[<000000000ea26996>] ___sys_sendmsg+0x12e/0x1b0
[<00000000684f7e25>] __sys_sendmsg+0xab/0x130
[<000000004538b104>] do_syscall_64+0x3d/0x90
[<0000000091ed9678>] entry_SYSCALL_64_after_hwframe+0x46/0xb0
### Affected Products
**Linux - Linux**
Affected versions:
- 279737939a8194f02fa352ab4476a1b241f44ef4 (Status: affected)
- 279737939a8194f02fa352ab4476a1b241f44ef4 (Status: affected)
- 279737939a8194f02fa352ab4476a1b241f44ef4 (Status: affected)
- 279737939a8194f02fa352ab4476a1b241f44ef4 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.0 (Status: affected)
- 0 (Status: unaffected)
- 5.10.157 (Status: unaffected)
- 5.15.80 (Status: unaffected)
- 6.0.10 (Status: unaffected)
- 6.1 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/347f1793b573466424c550f2748ed837b6690fe7)
2. [](https://git.kernel.org/stable/c/fc16a2c81a3eb1cbba8775f5bdc67856df903a7c)
3. [](https://git.kernel.org/stable/c/f8926e2d2225eb7b7e11cd3fa266aaad9075b767)
4. [](https://git.kernel.org/stable/c/9d45921ee4cb364910097e7d1b7558559c2f9fd2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2996
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 13:00 UTC
- **Last Updated**: March 31, 2025 at 13:25 UTC
- **Reserved Date**: March 30, 2025 at 17:16 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Tenda FH1202 1.2.0.14(408) and classified as critical. This issue affects some unknown processing of the file /goform/SysToolDDNS of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
- CWE-266: Security Weakness
### Affected Products
**Tenda - FH1202**
Affected versions:
- 1.2.0.14(408) (Status: affected)
### References
1. [VDB-302045 | Tenda FH1202 Web Management Interface SysToolDDNS access control](https://vuldb.com/?id.302045)
2. [VDB-302045 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.302045)
3. [Submit #523419 | Tenda FH1202 V1.2.0.14(408) Improper Access Controls](https://vuldb.com/?submit.523419)
4. [](https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-SysToolDDNS-1bc53a41781f8012a03be8bebed1125b?pvs=4)
5. [](https://www.tenda.com.cn/)
### Credits
- yhryhryhr (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17072, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17072 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17072
- **State**: PUBLISHED
- **Published Date**: September 16, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 10:39 UTC
- **Reserved Date**: September 15, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JSON++ through 2016-06-15 has a buffer over-read in yyparse() in json.y.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/tunnuz/json/issues/11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1487, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1487 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1487
- **State**: PUBLISHED
- **Published Date**: May 22, 2021 at 06:45 UTC
- **Last Updated**: November 08, 2024 at 21:14 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute arbitrary commands on an affected system. The vulnerability is due to insufficient validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the interface. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system (OS) with the permissions of a special non-root user. In this way, an attacker could take control of the affected system, which would allow them to obtain and alter sensitive data. The attacker could also affect the devices that are managed by the affected system by pushing arbitrary configuration files, retrieving device credentials and confidential information, and ultimately undermining the stability of the devices, causing a denial of service (DoS) condition.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Cisco - Cisco Prime Infrastructure**
Affected versions:
- n/a (Status: affected)
### References
1. [20210519 Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Command Injection Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-cmd-inj-YU5e6tB3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2361, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2361
- **State**: PUBLISHED
- **Published Date**: May 15, 2006 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 17:51 UTC
- **Reserved Date**: May 15, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in pafiledb_constants.php in Download Manager (mxBB pafiledb) integration, as used with phpBB, allows remote attackers to execute arbitrary PHP code via a URL in the module_root_path parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25507](http://www.osvdb.org/25507)
2. [17930](http://www.securityfocus.com/bid/17930)
3. [20062](http://secunia.com/advisories/20062)
4. [1774](https://www.exploit-db.com/exploits/1774)
5. [pafiledb-pafiledbconstants-file-include(26496)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26496)
6. [ADV-2006-1776](http://www.vupen.com/english/advisories/2006/1776) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29312, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29312 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29312
- **State**: PUBLISHED
- **Published Date**: July 12, 2023 at 15:56 UTC
- **Last Updated**: March 05, 2025 at 18:51 UTC
- **Reserved Date**: April 04, 2023 at 20:46 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe InDesign versions ID18.3 (and earlier) and ID17.4.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - InDesign**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/indesign/apsb23-38.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48962, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48962 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48962
- **State**: PUBLISHED
- **Published Date**: November 18, 2024 at 08:41 UTC
- **Last Updated**: November 21, 2024 at 15:34 UTC
- **Reserved Date**: October 10, 2024 at 06:25 UTC
- **Assigned By**: apache
### Vulnerability Description
Improper Control of Generation of Code ('Code Injection'), Cross-Site Request Forgery (CSRF), : Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Apache OFBiz.
This issue affects Apache OFBiz: before 18.12.17.
Users are recommended to upgrade to version 18.12.17, which fixes the issue.
### Weakness Classification (CWE)
- CWE-94: Code Injection
- CWE-352: Cross-Site Request Forgery (CSRF)
- CWE-1336: Security Weakness
### Affected Products
**Apache Software Foundation - Apache OFBiz**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://ofbiz.apache.org/download.html)
2. [](https://ofbiz.apache.org/security.html)
3. [](https://issues.apache.org/jira/browse/OFBIZ-13162)
4. [](https://lists.apache.org/thread/6sddh4pts90cp8ktshqb4xykdp6lb6q6)
### Credits
- Sebastiano Sartor <s@sebsrt.xyz>
- Ryan <marimoo.eth@gmail.com> |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10725
- **State**: PUBLISHED
- **Published Date**: May 20, 2020 at 13:16 UTC
- **Last Updated**: August 04, 2024 at 11:14 UTC
- **Reserved Date**: March 20, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in DPDK version 19.11 and above that allows a malicious guest to cause a segmentation fault of the vhost-user backend application running on the host, which could result in a loss of connectivity for the other guests running on that host. This is caused by a missing validity check of the descriptor address in the function `virtio_dev_rx_batch_packed()`.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-665: Security Weakness
### Affected Products
**[UNKNOWN] - dpdk**
Affected versions:
- 20.02.1 (Status: affected)
- 19.11.2 (Status: affected)
### References
1. [openSUSE-SU-2020:0693](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html)
2. [FEDORA-2020-04e3d34451](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/)
3. [](https://www.openwall.com/lists/oss-security/2020/05/18/2)
4. [](https://www.oracle.com/security-alerts/cpujan2021.html)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10725)
6. [](https://bugs.dpdk.org/show_bug.cgi?id=270) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30462
- **State**: PUBLISHED
- **Published Date**: May 24, 2022 at 13:48 UTC
- **Last Updated**: August 03, 2024 at 06:48 UTC
- **Reserved Date**: May 09, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Water-billing-management-system v1.0 is affected by: Cross Site Scripting (XSS) via /wbms/classes/Users.php?f=save, firstname.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mikeccltt/wbms_bug_report/blob/main/water-billing-management-system/xss.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13932, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13932 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13932
- **State**: REJECTED
- **Published Date**: November 23, 2021 at 19:59 UTC
- **Last Updated**: November 23, 2021 at 19:59 UTC
- **Reserved Date**: July 11, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7094, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7094 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7094
- **State**: PUBLISHED
- **Published Date**: December 13, 2013 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 17:53 UTC
- **Reserved Date**: December 13, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the RSDDCVER_COUNT_TAB_COLS function in SAP NetWeaver 7.30 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://erpscan.io/advisories/erpscan-13-022-sap-netweaver-rsddcver_count_tab_cols-potential-sql-injection/)
2. [](https://service.sap.com/sap/support/notes/1836718)
3. [netweaver-rsddcvercounttabcols-sql-inject(89603)](https://exchange.xforce.ibmcloud.com/vulnerabilities/89603)
4. [56061](http://secunia.com/advisories/56061)
5. [64232](http://www.securityfocus.com/bid/64232)
6. [](http://scn.sap.com/docs/DOC-8218) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22305, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22305
- **State**: PUBLISHED
- **Published Date**: February 06, 2021 at 02:20 UTC
- **Last Updated**: August 03, 2024 at 18:37 UTC
- **Reserved Date**: January 05, 2021 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is a buffer overflow vulnerability in Mate 30 10.1.0.126(C00E125R5P3). A module does not verify the some input when dealing with messages. Attackers can exploit this vulnerability by sending malicious input through specific module. This could cause buffer overflow, compromising normal service.
### Affected Products
**n/a - HUAWEI Mate 30**
Affected versions:
- 10.1.0.126(C00E125R5P3) (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210127-04-smartphone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49913, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49913 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49913
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 14:12 UTC
- **Last Updated**: August 02, 2024 at 22:09 UTC
- **Reserved Date**: December 01, 2023 at 22:10 UTC
- **Assigned By**: talos
### Vulnerability Description
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `action` parameter at offset `0x422448` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tp-Link - AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)**
Affected versions:
- v5.1.0 Build 20220926 (Status: affected)
**Tp-Link - N300 Wireless Access Point (EAP115)**
Affected versions:
- v5.0.4 Build 20220216 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888)
### Credits
- Discovered by the Vulnerability Discovery and Research team of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20338
- **State**: PUBLISHED
- **Published Date**: June 02, 2021 at 20:40 UTC
- **Last Updated**: September 16, 2024 at 16:27 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Jazz Foundation and IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194449.
### Affected Products
**IBM - Engineering Test Management**
Affected versions:
- 7.0.0 (Status: affected)
- 7.0.1 (Status: affected)
**IBM - Rational Rhapsody Model Manager**
Affected versions:
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
- 7.0 (Status: affected)
**IBM - Rational Quality Manager**
Affected versions:
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
**IBM - Engineering Lifecycle Optimization**
Affected versions:
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
- 7.0.2 (Status: affected)
**IBM - Rational Engineering Lifecycle Manager**
Affected versions:
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
- 7.0.2 (Status: affected)
**IBM - Rational Collaborative Lifecycle Management**
Affected versions:
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
**IBM - Rational DOORS Next Generation**
Affected versions:
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
- 7.0.2 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6457739)
2. [ibm-engineering-cve202120338-xss (194449)](https://exchange.xforce.ibmcloud.com/vulnerabilities/194449) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-55653, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-55653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-55653
- **State**: PUBLISHED
- **Published Date**: December 10, 2024 at 22:56 UTC
- **Last Updated**: December 11, 2024 at 16:04 UTC
- **Reserved Date**: December 10, 2024 at 14:47 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
PwnDoc is a penetration test report generator. In versions up to and including 0.5.3, an authenticated user is able to crash the backend by raising a `UnhandledPromiseRejection` on audits which exits the backend. The user doesn't need to know the audit id, since a bad audit id will also raise the rejection. With the backend being unresponsive, the whole application becomes unusable for all users of the application. As of time of publication, no known patches are available.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**pwndoc - pwndoc**
Affected versions:
- <= 0.5.3 (Status: affected)
### References
1. [https://github.com/pwndoc/pwndoc/security/advisories/GHSA-ggqg-3f7v-c8rc](https://github.com/pwndoc/pwndoc/security/advisories/GHSA-ggqg-3f7v-c8rc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4673, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4673 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4673
- **State**: PUBLISHED
- **Published Date**: May 09, 2024 at 10:00 UTC
- **Last Updated**: August 01, 2024 at 20:47 UTC
- **Reserved Date**: May 09, 2024 at 03:35 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in Campcodes Complete Web-Based School Management System 1.0. Affected by this issue is some unknown functionality of the file /view/show_student_grade_subject.php. The manipulation of the argument id leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263594 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Campcodes - Complete Web-Based School Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-263594 | Campcodes Complete Web-Based School Management System show_student_grade_subject.php cross site scripting](https://vuldb.com/?id.263594)
2. [VDB-263594 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263594)
3. [Submit #331308 | Campcodes Complete Web-Based School Management System ≤1.0 XSS injection](https://vuldb.com/?submit.331308)
4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2023.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0751
- **State**: PUBLISHED
- **Published Date**: January 13, 2013 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 14:33 UTC
- **Reserved Date**: January 02, 2013 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Mozilla Firefox before 18.0 on Android and SeaMonkey before 2.15 do not restrict a touch event to a single IFRAME element, which allows remote attackers to obtain sensitive information or possibly conduct cross-site scripting (XSS) attacks via a crafted HTML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=790454)
2. [SUSE-SU-2013:0048](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html)
3. [openSUSE-SU-2013:0131](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html)
4. [oval:org.mitre.oval:def:16616](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16616)
5. [](http://www.mozilla.org/security/announce/2013/mfsa2013-06.html)
6. [SUSE-SU-2013:0049](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html)
7. [openSUSE-SU-2013:0149](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1262, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1262
- **State**: PUBLISHED
- **Published Date**: September 11, 2019 at 21:24 UTC
- **Last Updated**: August 04, 2024 at 18:13 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'.
### Affected Products
**Microsoft - Microsoft SharePoint Foundation**
Affected versions:
- 2013 Service Pack 1 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1262)
2. [](http://packetstormsecurity.com/files/154591/Microsoft-SharePoint-2013-SP1-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5631, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5631 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5631
- **State**: PUBLISHED
- **Published Date**: November 25, 2019 at 14:08 UTC
- **Last Updated**: August 06, 2024 at 21:14 UTC
- **Reserved Date**: October 24, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
ipa 3.0 does not properly check server identity before sending credential containing cookies
### Affected Products
**ipa - ipa**
Affected versions:
- Fixed in freeipa 3.0.2 (Status: affected)
- freeipa 3.1.0 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5631)
2. [](https://access.redhat.com/security/cve/cve-2012-5631)
3. [](http://www.securityfocus.com/bid/56919)
4. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/80784) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4302
- **State**: PUBLISHED
- **Published Date**: December 23, 2021 at 19:48 UTC
- **Last Updated**: August 05, 2024 at 05:11 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A null pointer dereference was addressed with improved validation. This issue is fixed in macOS High Sierra 10.13, iCloud for Windows 7.0, watchOS 4, iOS 11, iTunes 12.7 for Windows. Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT208144)
2. [](https://support.apple.com/en-us/HT208112)
3. [](https://support.apple.com/en-us/HT208115)
4. [](https://support.apple.com/en-us/HT208141)
5. [](https://support.apple.com/en-us/HT208142) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12718
- **State**: PUBLISHED
- **Published Date**: May 07, 2020 at 23:29 UTC
- **Last Updated**: August 04, 2024 at 12:04 UTC
- **Reserved Date**: May 07, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In administration/comments.php in PHP-Fusion 9.03.50, an authenticated attacker can take advantage of a stored XSS vulnerability in the Preview Comment feature. The protection mechanism can be bypassed by using HTML event handlers such as ontoggle.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/php-fusion/PHP-Fusion/issues/2309) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33485, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33485 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33485
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 17:59 UTC
- **Last Updated**: February 13, 2025 at 15:52 UTC
- **Reserved Date**: April 23, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection vulnerability in CASAP Automated Enrollment System using PHP/MySQLi with Source Code V1.0 allows a remote attacker to obtain sensitive information via a crafted payload to the login.php component
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/CveSecLook/cve/issues/17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35331
- **State**: PUBLISHED
- **Published Date**: July 11, 2023 at 17:02 UTC
- **Last Updated**: January 01, 2025 at 01:52 UTC
- **Reserved Date**: June 14, 2023 at 23:09 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Local Security Authority (LSA) Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Local Security Authority (LSA) Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35331) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3388, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3388 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3388
- **State**: PUBLISHED
- **Published Date**: July 16, 2020 at 17:22 UTC
- **Last Updated**: November 13, 2024 at 18:19 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated to access the CLI. A successful exploit could allow the attacker to execute commands with root privileges.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Cisco - Cisco SD-WAN vManage**
Affected versions:
- n/a (Status: affected)
### References
1. [20200715 Cisco SD-WAN vManage Software Command Injection Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clibypvman-sKcLf2L) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6394
- **State**: PUBLISHED
- **Published Date**: March 04, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 11:27 UTC
- **Reserved Date**: March 04, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in core/user.php in CS-Cart 1.3.5 and earlier allows remote attackers to execute arbitrary SQL commands via the cs_cookies[customer_user_id] cookie parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6352](https://www.exploit-db.com/exploits/6352)
2. [31686](http://secunia.com/advisories/31686)
3. [](http://www.gulftech.org/?node=research&article_id=00128-09022008)
4. [20080902 CS-Cart <= 1.3.5 SQL Injection](http://www.securityfocus.com/archive/1/495907/100/0/threaded)
5. [cscart-user-sql-injection(44852)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44852)
6. [30979](http://www.securityfocus.com/bid/30979) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48601, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48601
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 10:16 UTC
- **Last Updated**: October 07, 2024 at 14:19 UTC
- **Reserved Date**: November 16, 2023 at 23:29 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.18 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6470, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6470
- **State**: PUBLISHED
- **Published Date**: May 21, 2020 at 03:46 UTC
- **Last Updated**: August 04, 2024 at 09:02 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient validation of untrusted input in clipboard in Google Chrome prior to 83.0.4103.61 allowed a local attacker to inject arbitrary scripts or HTML (UXSS) via crafted clipboard contents.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html)
2. [](https://crbug.com/1065761)
3. [GLSA-202006-02](https://security.gentoo.org/glsa/202006-02)
4. [openSUSE-SU-2020:0823](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html)
5. [openSUSE-SU-2020:0832](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html)
6. [FEDORA-2020-08561721ad](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/)
7. [DSA-4714](https://www.debian.org/security/2020/dsa-4714)
8. [FEDORA-2020-77f89ab772](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/)
9. [GLSA-202101-30](https://security.gentoo.org/glsa/202101-30) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3510, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3510 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3510
- **State**: PUBLISHED
- **Published Date**: October 05, 2021 at 20:50 UTC
- **Last Updated**: September 16, 2024 at 19:04 UTC
- **Reserved Date**: April 20, 2021 at 00:00 UTC
- **Assigned By**: zephyr
### Vulnerability Description
Zephyr JSON decoder incorrectly decodes array of array. Zephyr versions >= >1.14.0, >= >2.5.0 contain Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-588: Security Weakness
### Affected Products
**zephyrproject-rtos - zephyr**
Affected versions:
- >1.14.0 (Status: affected)
- >2.5.0 (Status: affected)
### References
1. [](http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13999, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13999
- **State**: PUBLISHED
- **Published Date**: September 08, 2020 at 09:31 UTC
- **Last Updated**: August 05, 2024 at 00:05 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
u'Lack of check for integer overflow for round up and addition operations result into memory corruption and potential information leakage' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4923, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4923
- **State**: PUBLISHED
- **Published Date**: September 15, 2012 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 20:50 UTC
- **Reserved Date**: September 15, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Endian Firewall 2.4 allow remote attackers to inject arbitrary web script or HTML via the (1) createrule parameter to dnat.cgi, (2) addrule parameter to dansguardian.cgi, or (3) PATH_INFO to openvpn_users.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [endianfirewall-multiple-xss(73330)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73330)
2. [52076](http://www.securityfocus.com/bid/52076)
3. [](http://www.vulnerability-lab.com/get_content.php?id=436)
4. [](http://packetstormsecurity.org/files/109942/Endian-UTM-Firewall-2.4.x-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43616
- **State**: PUBLISHED
- **Published Date**: November 13, 2021 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 04:03 UTC
- **Reserved Date**: November 13, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. NOTE: The npm team believes this is not a vulnerability. It would require someone to socially engineer package.json which has different dependencies than package-lock.json. That user would have to have file system or write access to change dependencies. The npm team states preventing malicious actors from socially engineering or gaining file system access is outside the scope of the npm CLI.
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/npm/cli/issues/2701)
2. [](https://docs.npmjs.com/cli/v7/commands/npm-ci)
3. [](https://github.com/icatalina/CVE-2021-43616)
4. [](https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0)
5. [](https://security.netapp.com/advisory/ntap-20211210-0002/)
6. [](https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f)
7. [FEDORA-2022-97b214b298](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/)
8. [](https://docs.npmjs.com/cli/v8/commands/npm-ci)
9. [](https://github.com/npm/cli/issues/2701#issuecomment-979054224)
10. [](https://github.com/npm/cli/issues/2701#issuecomment-972900511) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8792
- **State**: PUBLISHED
- **Published Date**: January 29, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 08:29 UTC
- **Reserved Date**: January 29, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The KaxInternalBlock::ReadData function in libMatroska before 1.4.4 allows context-dependent attackers to obtain sensitive information from process heap memory via crafted EBML lacing, which triggers an invalid memory access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Matroska-Org/libmatroska/blob/release-1.4.4/ChangeLog)
2. [](https://github.com/Matroska-Org/libmatroska/commit/0a2d3e3644a7453b6513db2f9bc270f77943573f)
3. [openSUSE-SU-2016:0125](http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html)
4. [DSA-3526](http://www.debian.org/security/2016/dsa-3526)
5. [[matroska-users] 20151020 libEBML v1.3.3, libMatroska v1.4.4 released: important fixes](http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0801, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0801 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0801
- **State**: PUBLISHED
- **Published Date**: February 28, 2025 at 04:21 UTC
- **Last Updated**: February 28, 2025 at 15:14 UTC
- **Reserved Date**: January 28, 2025 at 14:45 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The RateMyAgent Official plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.0. This is due to missing or incorrect nonce validation on the 'rma-settings-wizard'. This makes it possible for unauthenticated attackers to update the plugin's API key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**ratemyagent - RateMyAgent Official**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b559017c-f1d2-4f18-bfb6-e52f05910e34?source=cve)
2. [](https://wordpress.org/plugins/ratemyagent-official/)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3244718%40ratemyagent-official&new=3244718%40ratemyagent-official&sfp_email=&sfph_mail=)
### Credits
- Dhabaleshwar Das |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1843
- **State**: PUBLISHED
- **Published Date**: March 20, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 15:13 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Open redirect vulnerability in the Access tracking mechanism in TYPO3 4.5.x before 4.5.24, 4.6.x before 4.6.17, 4.7.x before 4.7.9, and 6.0.x before 6.0.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20130311 Re: CVE Request: typo3 sql injection and open redirection](http://www.openwall.com/lists/oss-security/2013/03/12/3)
2. [DSA-2646](http://www.debian.org/security/2013/dsa-2646)
3. [openSUSE-SU-2013:0510](http://lists.opensuse.org/opensuse-updates/2013-03/msg00079.html)
4. [52638](http://secunia.com/advisories/52638)
5. [90924](http://www.osvdb.org/90924)
6. [58330](http://www.securityfocus.com/bid/58330)
7. [52433](http://secunia.com/advisories/52433)
8. [](http://typo3.org/support/teamssecuritysecurity-bulletins/security-bulletins-single-view/article/sql-injection-and-open-redirection-in-typo3-core/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5961, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5961 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5961
- **State**: PUBLISHED
- **Published Date**: June 14, 2024 at 07:48 UTC
- **Last Updated**: August 01, 2024 at 21:25 UTC
- **Reserved Date**: June 13, 2024 at 10:10 UTC
- **Assigned By**: CERT-PL
### Vulnerability Description
Improper neutralization of input during web page generation vulnerability in 2ClickPortal software allows reflected cross-site scripting (XSS). An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser. This issue affects 2ClickPortal software versions from 7.2.31 through 7.6.4.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Trol InterMedia Sp. z o.o. Sp. k. - 2ClickPortal**
Affected versions:
- 7.2.31 (Status: affected)
### References
1. [](https://cert.pl/en/posts/2024/06/CVE-2024-5961/)
2. [](https://cert.pl/posts/2024/06/CVE-2024-5961/)
3. [](https://2clickportal.pl/)
### Credits
- Kacper Rybczyński |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0162, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0162 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0162
- **State**: PUBLISHED
- **Published Date**: March 30, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: March 28, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LogWatch before 2.5 allows local users to execute arbitrary code via a symlink attack on the logwatch temporary directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020327 Root compromise through LogWatch 2.1.1](http://marc.info/?l=bugtraq&m=101724766216872)
2. [4374](http://www.securityfocus.com/bid/4374)
3. [20020327 Root compromise through LogWatch 2.1.1](http://online.securityfocus.com/archive/82/264233)
4. [logwatch-tmp-race-condition(8652)](http://www.iss.net/security_center/static/8652.php)
5. [](http://list.kaybee.org/archives/logwatch-announce/2002-March/000002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1451
- **State**: PUBLISHED
- **Published Date**: June 12, 2008 at 01:30 UTC
- **Last Updated**: August 07, 2024 at 08:24 UTC
- **Reserved Date**: March 21, 2008 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The WINS service on Microsoft Windows 2000 SP4, and Server 2003 SP1 and SP2, does not properly validate data structures in WINS network packets, which allows local users to gain privileges via a crafted packet, aka "Memory Overwrite Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30584](http://secunia.com/advisories/30584)
2. [29588](http://www.securityfocus.com/bid/29588)
3. [TA08-162B](http://www.us-cert.gov/cas/techalerts/TA08-162B.html)
4. [oval:org.mitre.oval:def:5582](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5582)
5. [ADV-2008-1781](http://www.vupen.com/english/advisories/2008/1781)
6. [MS08-034](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-034)
7. [1020228](http://securitytracker.com/id?1020228) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49670
- **State**: PUBLISHED
- **Published Date**: October 29, 2024 at 11:05 UTC
- **Last Updated**: October 29, 2024 at 15:19 UTC
- **Reserved Date**: October 17, 2024 at 09:52 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sam Glover Client Power Tools Portal allows Reflected XSS.This issue affects Client Power Tools Portal: from n/a through 1.8.6.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Sam Glover - Client Power Tools Portal**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/client-power-tools/wordpress-client-power-tools-portal-plugin-1-8-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-5002, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-5002 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-5002
- **State**: PUBLISHED
- **Published Date**: March 28, 2022 at 20:45 UTC
- **Last Updated**: August 08, 2024 at 02:35 UTC
- **Reserved Date**: January 28, 2022 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
A vulnerability was found in ISS BlackICE PC Protection. It has been declared as problematic. Affected by this vulnerability is the component Update Handler which allows cleartext transmission of data. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-319: Security Weakness
### Affected Products
**ISS - BlackICE PC Protection**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.295)
### Credits
- Marc Ruef |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4531, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4531 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4531
- **State**: PUBLISHED
- **Published Date**: December 31, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 07:08 UTC
- **Reserved Date**: December 31, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
httpdx 1.4.4 and earlier allows remote attackers to obtain the source code for a web page by appending a . (dot) character to the URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://freetexthost.com/eiyfyt0km5)
2. [58857](http://www.osvdb.org/58857)
3. [httpdx-http-information-disclosure(53733)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53733)
4. [](http://packetstormsecurity.org/0910-exploits/httpdx-disclose.txt)
5. [37013](http://secunia.com/advisories/37013)
6. [](http://pocoftheday.blogspot.com/2009/10/httpdx-144-remote-arbitrary-source.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34340, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34340
- **State**: PUBLISHED
- **Published Date**: May 13, 2024 at 15:26 UTC
- **Last Updated**: February 13, 2025 at 17:52 UTC
- **Reserved Date**: May 02, 2024 at 06:36 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, Cacti calls `compat_password_hash` when users set their password. `compat_password_hash` use `password_hash` if there is it, else use `md5`. When verifying password, it calls `compat_password_verify`. In `compat_password_verify`, `password_verify` is called if there is it, else use `md5`. `password_verify` and `password_hash` are supported on PHP < 5.5.0, following PHP manual. The vulnerability is in `compat_password_verify`. Md5-hashed user input is compared with correct password in database by `$md5 == $hash`. It is a loose comparison, not `===`. It is a type juggling vulnerability. Version 1.2.27 contains a patch for the issue.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
- CWE-697: Security Weakness
### Affected Products
**Cacti - cacti**
Affected versions:
- < 1.2.27 (Status: affected)
### References
1. [https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m](https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m)
2. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20200, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20200 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20200
- **State**: PUBLISHED
- **Published Date**: December 31, 2019 at 20:30 UTC
- **Last Updated**: August 05, 2024 at 02:39 UTC
- **Reserved Date**: December 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_decode, while parsing crafted a XML file, performs incorrect memory handling, leading to a heap-based buffer over-read in the "normalize line endings" feature.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/ezxml/bugs/19/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20830
- **State**: PUBLISHED
- **Published Date**: September 04, 2023 at 02:27 UTC
- **Last Updated**: October 10, 2024 at 15:25 UTC
- **Reserved Date**: October 28, 2022 at 02:03 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014156.
### Affected Products
**MediaTek, Inc. - MT2713, MT2735, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8168, MT8173, MT8195, MT8362A, MT8365, MT8781**
Affected versions:
- Android 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/September-2023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41240, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41240 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41240
- **State**: PUBLISHED
- **Published Date**: August 07, 2024 at 00:00 UTC
- **Last Updated**: August 13, 2024 at 14:18 UTC
- **Reserved Date**: July 18, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Reflected Cross Site Scripting (XSS) vulnerability was found in " /smsa/teacher_login.php" in Kashipara Responsive School Management System v3.2.0, which allows remote attackers to execute arbitrary code via the "error" parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Responsive%20School%20Management%20System%20v3.2.0/Reflected%20XSS%20-%20Teacher.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3545, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3545 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3545
- **State**: PUBLISHED
- **Published Date**: October 17, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 13:43 UTC
- **Reserved Date**: October 17, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Linux - Kernel**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a)
2. [](https://vuldb.com/?id.211045)
3. [](https://security.netapp.com/advisory/ntap-20221223-0003/)
4. [DSA-5324](https://www.debian.org/security/2023/dsa-5324)
5. [[debian-lts-announce] 20230302 [SECURITY] [DLA 3349-1] linux-5.10 security update](https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html)
6. [[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update](https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7467, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7467 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7467
- **State**: PUBLISHED
- **Published Date**: January 17, 2016 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 07:51 UTC
- **Reserved Date**: September 29, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Report Builder in IBM Jazz Reporting Service (JRS) 5.x before 5.0.2-Rational-CLM-ifix011 and 6.0 before 6.0.0-Rational-CLM-ifix005 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21972485) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6425, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6425 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6425
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 13:49 UTC
- **Last Updated**: August 02, 2024 at 08:28 UTC
- **Reserved Date**: November 30, 2023 at 10:45 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
A vulnerability has been discovered in BigProf Online Clinic Management System 2.2, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /clinic/medical_records_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**BigProf - Online Clinic Management System**
Affected versions:
- 2.2 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products)
### Credits
- Rafael Pedrero |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25000, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25000 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25000
- **State**: PUBLISHED
- **Published Date**: April 03, 2025 at 23:59 UTC
- **Last Updated**: June 04, 2025 at 17:52 UTC
- **Reserved Date**: January 30, 2025 at 15:14 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-843: Security Weakness
### Affected Products
**Microsoft - Microsoft Edge (Chromium-based)**
Affected versions:
- 1.0.0.0 (Status: affected)
### References
1. [Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25000) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2507
- **State**: PUBLISHED
- **Published Date**: June 08, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 10:14 UTC
- **Reserved Date**: March 14, 2014 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P14, 7.0 before P15, and 7.1 before P05 allows remote authenticated users to execute arbitrary commands via shell metacharacters in arguments to unspecified methods.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140605 ESA-2014-046: EMC Documentum Content Server Multiple Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2014-06/0051.html)
2. [67916](http://www.securityfocus.com/bid/67916)
3. [1030339](http://www.securitytracker.com/id/1030339)
4. [20140630 ESA-2014-046: EMC Documentum Content Server Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/532596/100/0/threaded)
5. [](http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html)
6. [58954](http://secunia.com/advisories/58954) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1816
- **State**: PUBLISHED
- **Published Date**: April 13, 2017 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 01:35 UTC
- **Reserved Date**: May 06, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Buffer overflow in ImageIO in Apple Mac OS X 10.6 through 10.6.3 and Mac OS X Server 10.6 through 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a crafted image.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2016-01-28-4188](https://support.apple.com/en-us/HT4188) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9785
- **State**: PUBLISHED
- **Published Date**: April 01, 2020 at 17:57 UTC
- **Last Updated**: August 04, 2024 at 10:43 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple memory corruption issues were addressed with improved state management. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2. A malicious application may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT211100)
2. [](https://support.apple.com/HT211102)
3. [](https://support.apple.com/HT211101)
4. [](https://support.apple.com/HT211103) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4976
- **State**: REJECTED
- **Published Date**: November 05, 2020 at 22:02 UTC
- **Last Updated**: November 05, 2020 at 22:02 UTC
- **Reserved Date**: December 23, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1578, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1578 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1578
- **State**: PUBLISHED
- **Published Date**: November 21, 2022 at 00:00 UTC
- **Last Updated**: April 30, 2025 at 14:57 UTC
- **Reserved Date**: May 04, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The My wpdb WordPress plugin before 2.5 is missing CSRF check when running SQL queries, which could allow attacker to make a logged in admin run arbitrary SQL query via a CSRF attack
### Weakness Classification (CWE)
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - My wpdb**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/c280da92-4ac2-43ea-93a2-6c583b79b98b)
### Credits
- Daniel Ruf |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35892, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35892 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35892
- **State**: PUBLISHED
- **Published Date**: December 31, 2020 at 08:24 UTC
- **Last Updated**: August 04, 2024 at 17:16 UTC
- **Reserved Date**: December 31, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the simple-slab crate before 0.3.3 for Rust. index() allows an out-of-bounds read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2020-0039.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0137, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0137 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0137
- **State**: PUBLISHED
- **Published Date**: May 07, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:06 UTC
- **Reserved Date**: February 06, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Windows Media Player 7 allows remote attackers to execute malicious Java applets in Internet Explorer clients by enclosing the applet in a skin file named skin.wmz, then referencing that skin in the codebase parameter to an applet tag, aka the Windows Media Player Skins File Download" vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2203](http://www.securityfocus.com/bid/2203)
2. [MS01-010](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-010)
3. [20010115 Windows Media Player 7 and IE java vulnerability - executing arbitrary programs](http://marc.info/?l=bugtraq&m=97958100816503&w=2)
4. [win-mediaplayer-arbitrary-code(5937)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5937) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21789
- **State**: PUBLISHED
- **Published Date**: August 01, 2022 at 13:55 UTC
- **Last Updated**: August 03, 2024 at 02:53 UTC
- **Reserved Date**: November 26, 2021 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In audio ipi, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06478101; Issue ID: ALPS06478101.
### Affected Products
**MediaTek, Inc. - MT6779, MT6781, MT6785, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8791, MT8797, MT8798**
Affected versions:
- Android 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/August-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4418
- **State**: PUBLISHED
- **Published Date**: August 24, 2023 at 18:05 UTC
- **Last Updated**: December 09, 2024 at 14:12 UTC
- **Reserved Date**: August 18, 2023 at 13:09 UTC
- **Assigned By**: SICK AG
### Vulnerability Description
A remote unprivileged attacker can sent multiple packages to the LMS5xx to disrupt its availability through a TCP SYN-based denial-of-service (DDoS) attack.
By exploiting this vulnerability, an attacker can flood the targeted LMS5xx with a high volume of TCP SYN requests, overwhelming its resources and causing it to become unresponsive or unavailable for legitimate users.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**SICK AG - LMS5xx**
Affected versions:
- all firmware versions (Status: affected)
### References
1. [](https://sick.com/psirt)
2. [](https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf)
3. [](https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15032, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15032
- **State**: PUBLISHED
- **Published Date**: October 05, 2017 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 19:42 UTC
- **Reserved Date**: October 05, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ImageMagick version 7.0.7-2 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3681-1](https://usn.ubuntu.com/3681-1/)
2. [](https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46585, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46585 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46585
- **State**: PUBLISHED
- **Published Date**: September 18, 2024 at 00:00 UTC
- **Last Updated**: March 17, 2025 at 14:11 UTC
- **Reserved Date**: September 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sProfileName parameter at usergrp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ink-desk-28f.notion.site/Draytek-vigor-3910-Analysis-Report-b3b23e150c4f4bab822c3c47fd7b9de9#8defec5c93be4cdfa5a1ea1078cbe7d2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21841
- **State**: PUBLISHED
- **Published Date**: May 16, 2024 at 20:47 UTC
- **Last Updated**: August 01, 2024 at 22:27 UTC
- **Reserved Date**: January 02, 2024 at 16:55 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled search path for some Intel(R) Distribution for GDB software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**n/a - Intel(R) Distribution for GDB software**
Affected versions:
- before version 2024.0 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01042.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01042.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36716, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36716
- **State**: PUBLISHED
- **Published Date**: July 14, 2021 at 15:37 UTC
- **Last Updated**: August 04, 2024 at 01:01 UTC
- **Reserved Date**: July 12, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A ReDoS (regular expression denial of service) flaw was found in the Segment is-email package before 1.0.1 for Node.js. An attacker that is able to provide crafted input to the isEmail(input) function may cause an application to consume an excessive amount of CPU.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/segmentio/is-email/releases)
2. [](https://segment.com/docs/release_notes/2021-07-13-cve-2021-36716/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24071, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24071
- **State**: PUBLISHED
- **Published Date**: January 28, 2022 at 10:04 UTC
- **Last Updated**: August 03, 2024 at 03:59 UTC
- **Reserved Date**: January 27, 2022 at 00:00 UTC
- **Assigned By**: naver
### Vulnerability Description
A Built-in extension in Whale browser before 3.12.129.46 allows attackers to compromise the rendering process which could lead to controlling browser internal APIs.
### Weakness Classification (CWE)
- CWE-648: Security Weakness
### Affected Products
**NAVER - NAVER Whale browser**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://cve.naver.com/detail/cve-2022-24071)
### Credits
- Young Min Kim |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4280
- **State**: PUBLISHED
- **Published Date**: December 03, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 13:09 UTC
- **Reserved Date**: December 03, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in Dot Tech Smart Campus System. Affected by this issue is some unknown functionality of the file /services/Card/findUser. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-214778 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-266: Security Weakness
### Affected Products
**Dot Tech - Smart Campus System**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Peanut886/Vulnerability/blob/main/Information%20leakage%20vulnerability%20exists%20in%20findUser%2C%20a%20smart%20campus%20system%20developed%20by%20Dot%20Tech.md)
2. [](https://vuldb.com/?id.214778) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20753, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20753
- **State**: PUBLISHED
- **Published Date**: June 13, 2024 at 11:22 UTC
- **Last Updated**: August 01, 2024 at 21:59 UTC
- **Reserved Date**: December 04, 2023 at 16:52 UTC
- **Assigned By**: adobe
### Vulnerability Description
Photoshop Desktop versions 24.7.3, 25.7 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Photoshop Desktop**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/photoshop/apsb24-27.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2334
- **State**: PUBLISHED
- **Published Date**: July 20, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:22 UTC
- **Reserved Date**: July 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Y.SAK allows remote attackers to execute arbitrary commands via shell metacharacters in the $no variable to (1) w_s3mbfm.cgi, (2) w_s3adix.cgi, or (3) w_s3sbfm.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1014502](http://securitytracker.com/id?1014502)
2. [14299](http://www.securityfocus.com/bid/14299) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2739, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2739
- **State**: PUBLISHED
- **Published Date**: September 07, 2010 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 20:43 UTC
- **Reserved Date**: July 14, 2010 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Buffer overflow in the CreateDIBPalette function in win32k.sys in Microsoft Windows XP SP3, Server 2003 R2 Enterprise SP2, Vista Business SP1, Windows 7, and Server 2008 SP2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code by performing a clipboard operation (GetClipboardData API function) with a crafted bitmap with a palette that contains a large number of colors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [40870](http://secunia.com/advisories/40870)
2. [](http://www.ragestorm.net/blogs/?p=255)
3. [ADV-2010-2029](http://www.vupen.com/english/advisories/2010/2029)
4. [](http://blogs.technet.com/b/msrc/archive/2010/08/10/update-on-the-publicly-disclosed-win32k-sys-eop-vulnerability.aspx)
5. [](https://msrc.microsoft.com/blog/2010/08/update-on-the-publicly-disclosed-win32k-sys-eop-vulnerability/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28708
- **State**: PUBLISHED
- **Published Date**: November 24, 2021 at 00:00 UTC
- **Last Updated**: November 18, 2024 at 20:21 UTC
- **Reserved Date**: March 18, 2021 at 00:00 UTC
- **Assigned By**: XEN
### Vulnerability Description
PoD operations on misaligned GFNs T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). The implementation of some of these hypercalls for PoD does not enforce the base page frame number to be suitably aligned for the specified order, yet some code involved in PoD handling actually makes such an assumption. These operations are XENMEM_decrease_reservation (CVE-2021-28704) and XENMEM_populate_physmap (CVE-2021-28707), the latter usable only by domains controlling the guest, i.e. a de-privileged qemu or a stub domain. (Patch 1, combining the fix to both these two issues.) In addition handling of XENMEM_decrease_reservation can also trigger a host crash when the specified page order is neither 4k nor 2M nor 1G (CVE-2021-28708, patch 2).
### Affected Products
**Xen - xen**
Affected versions:
- xen-unstable (Status: affected)
**Xen - xen**
Affected versions:
- unspecified (Status: unknown)
- 4.12.x (Status: affected)
- next of 4.14.x (Status: unaffected)
**Xen - xen**
Affected versions:
- 4.15.x (Status: affected)
### References
1. [](https://xenbits.xenproject.org/xsa/advisory-388.txt)
2. [FEDORA-2021-03645e9807](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT/)
3. [DSA-5017](https://www.debian.org/security/2021/dsa-5017)
4. [FEDORA-2021-2b3a2de94f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF/)
5. [GLSA-202402-07](https://security.gentoo.org/glsa/202402-07)
### Credits
- {'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'This issue was discovered by Jan Beulich of SUSE.'}]}}} |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9652, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9652 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9652
- **State**: PUBLISHED
- **Published Date**: March 11, 2019 at 01:00 UTC
- **Last Updated**: August 04, 2024 at 21:54 UTC
- **Reserved Date**: March 10, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a CSRF in SDCMS V1.7 via an m=admin&c=theme&a=edit request. It allows PHP code injection by providing a filename in the file parameter, and providing file content in the t2 parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.iwantacve.cn/index.php/archives/156/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18286, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18286
- **State**: PUBLISHED
- **Published Date**: December 12, 2019 at 19:08 UTC
- **Last Updated**: August 05, 2024 at 01:47 UTC
- **Reserved Date**: October 23, 2019 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). The Application Server exposes directory listings and files containing sensitive information. This vulnerability is independent from CVE-2019-18287. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Siemens - SPPA-T3000 Application Server**
Affected versions:
- All versions < Service Pack R8.2 SP2 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf)
2. [](http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0591, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0591
- **State**: PUBLISHED
- **Published Date**: June 24, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:24 UTC
- **Reserved Date**: June 23, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the print_header_uc function for SqWebMail 4.0.4 and earlier, and possibly 3.x, allows remote attackers to inject arbitrary web script or HRML via (1) e-mail headers or (2) a message with a "message/delivery-status" MIME Content-Type.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-200408-02](http://www.gentoo.org/security/en/glsa/glsa-200408-02.xml)
2. [sqwebmail-print-header-xss(16467)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16467)
3. [11918](http://secunia.com/advisories/11918/)
4. [DSA-533](http://www.debian.org/security/2004/dsa-533)
5. [20040621 XSS vulnerability in Sqwebmail 4.0.4](http://marc.info/?l=bugtraq&m=108786212220140&w=2)
6. [10588](http://www.securityfocus.com/bid/10588) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27096, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27096 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27096
- **State**: PUBLISHED
- **Published Date**: March 18, 2024 at 16:11 UTC
- **Last Updated**: April 10, 2025 at 20:23 UTC
- **Reserved Date**: February 19, 2024 at 14:43 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An authenticated user can exploit a SQL injection vulnerability in the search engine to extract data from the database. This issue has been patched in version 10.0.13.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**glpi-project - glpi**
Affected versions:
- >= 0.65, < 10.0.13 (Status: affected)
### References
1. [https://github.com/glpi-project/glpi/security/advisories/GHSA-2x8m-vrcm-2jqv](https://github.com/glpi-project/glpi/security/advisories/GHSA-2x8m-vrcm-2jqv)
2. [https://github.com/glpi-project/glpi/commit/61a0c2302b4f633f5065358adc36058e1abc37f9](https://github.com/glpi-project/glpi/commit/61a0c2302b4f633f5065358adc36058e1abc37f9)
3. [https://github.com/glpi-project/glpi/releases/tag/10.0.13](https://github.com/glpi-project/glpi/releases/tag/10.0.13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21722
- **State**: PUBLISHED
- **Published Date**: February 14, 2023 at 19:33 UTC
- **Last Updated**: January 01, 2025 at 00:41 UTC
- **Reserved Date**: December 13, 2022 at 18:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
.NET Framework Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**Microsoft - Microsoft .NET Framework 4.8**
Affected versions:
- 4.8.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8**
Affected versions:
- 4.8.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.7.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8.1**
Affected versions:
- 4.8.1 (Status: affected)
**Microsoft - Microsoft .NET Framework 4.6.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 and 4.6.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 2.0 Service Pack 2**
Affected versions:
- 2.0.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.0 Service Pack 2**
Affected versions:
- 3.0.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5**
Affected versions:
- 3.5.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5.1**
Affected versions:
- 3.5.0 (Status: affected)
### References
1. [.NET Framework Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21722) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10761
- **State**: PUBLISHED
- **Published Date**: June 29, 2019 at 19:06 UTC
- **Last Updated**: August 06, 2024 at 03:38 UTC
- **Reserved Date**: June 29, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Logitech Unifying devices before 2016-02-26 allow keystroke injection, bypassing encryption, aka MouseJack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BastilleResearch/mousejack/blob/master/doc/advisories/bastille-2.logitech.public.txt)
2. [](https://www.kb.cert.org/vuls/id/981271) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0309
- **State**: PUBLISHED
- **Published Date**: February 10, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:05 UTC
- **Reserved Date**: February 10, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in (1) index.php or (2) mod.php in Exponent 0.95 allow remote attackers to inject arbitrary web script or HTML via the module parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [13190](http://www.osvdb.org/13190)
2. [12358](http://www.securityfocus.com/bid/12358)
3. [20050125 Vulnerabilities in eXponent 0.95](http://marc.info/?l=bugtraq&m=110666998407073&w=2)
4. [exponent-module-xss(19061)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19061)
5. [13188](http://www.osvdb.org/13188) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8897, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8897 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8897
- **State**: PUBLISHED
- **Published Date**: November 16, 2020 at 11:55 UTC
- **Last Updated**: August 04, 2024 at 10:12 UTC
- **Reserved Date**: February 12, 2020 at 00:00 UTC
- **Assigned By**: Google
### Vulnerability Description
A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and Javalcript prior to versions 2.0.0. Due to the non-committing property of AES-GCM (and other AEAD ciphers such as AES-GCM-SIV or (X)ChaCha20Poly1305) used by the SDKs to encrypt messages, an attacker can craft a unique cyphertext which will decrypt to multiple different results, and becomes especially relevant in a multi-recipient setting. We recommend users update their SDK to 2.0.0 or later.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-310: Security Weakness
### Affected Products
**Amazon - AWS SDK**
Affected versions:
- stable (Status: affected)
### References
1. [](https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf)
2. [](https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/)
### Credits
- Thai Duong |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0704, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0704
- **State**: PUBLISHED
- **Published Date**: February 25, 2010 at 00:00 UTC
- **Last Updated**: September 16, 2024 at 19:30 UTC
- **Reserved Date**: February 24, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Portlet Palette in IBM WebSphere Portal 6.0.1.5 wp6015_008_01 allows remote attackers to inject arbitrary web script or HTML via the search field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [PM05829](http://www-01.ibm.com/support/docview.wss?uid=swg1PM05829)
2. [38574](http://secunia.com/advisories/38574) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45562, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45562
- **State**: PUBLISHED
- **Published Date**: December 02, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 13:54 UTC
- **Reserved Date**: November 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Insecure permissions in Telos Alliance Omnia MPX Node v1.0.0 to v1.4.9 allow attackers to manipulate and access system settings with backdoor account low privilege, this can lead to change hardware settings and execute arbitrary commands in vulnerable system functions that is requires high privilege to access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-45562) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-58061, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-58061 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-58061
- **State**: PUBLISHED
- **Published Date**: March 06, 2025 at 15:54 UTC
- **Last Updated**: May 04, 2025 at 10:09 UTC
- **Reserved Date**: March 06, 2025 at 15:52 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: prohibit deactivating all links
In the internal API this calls this is a WARN_ON, but that
should remain since internally we want to know about bugs
that may cause this. Prevent deactivating all links in the
debugfs write directly.
### Affected Products
**Linux - Linux**
Affected versions:
- 3d901102922723eedce6ef10ebd03315a7abb8a5 (Status: affected)
- 3d901102922723eedce6ef10ebd03315a7abb8a5 (Status: affected)
- 3d901102922723eedce6ef10ebd03315a7abb8a5 (Status: affected)
- 3d901102922723eedce6ef10ebd03315a7abb8a5 (Status: affected)
- 3d901102922723eedce6ef10ebd03315a7abb8a5 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.1 (Status: affected)
- 0 (Status: unaffected)
- 6.1.129 (Status: unaffected)
- 6.6.76 (Status: unaffected)
- 6.12.13 (Status: unaffected)
- 6.13.2 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/dfe9a043300261afe5eadc07b867a6810c4e999a)
2. [](https://git.kernel.org/stable/c/d36e48a4d81c647df8a76cc58fd4d2442ba10744)
3. [](https://git.kernel.org/stable/c/270ad6776e7cf1be3b769e0447070f9d0e8269db)
4. [](https://git.kernel.org/stable/c/18100796c11dfdea9101fdc95d2428b2093477ee)
5. [](https://git.kernel.org/stable/c/7553477cbfd784b128297f9ed43751688415bbaa) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.