System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0908, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0908 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0908 - **State**: PUBLISHED - **Published Date**: February 18, 2023 at 07:55 UTC - **Last Updated**: August 02, 2024 at 05:24 UTC - **Reserved Date**: February 18, 2023 at 07:54 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, was found in Xoslab Easy File Locker 2.2.0.184. This affects the function MessageNotifyCallback in the library xlkfs.sys. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-221457 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-404: Security Weakness ### Affected Products **Xoslab - Easy File Locker** Affected versions: - 2.2.0.184 (Status: affected) ### References 1. [](https://vuldb.com/?id.221457) 2. [](https://vuldb.com/?ctiid.221457) 3. [](https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0908) ### Credits - Zeze7w (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2056, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2056 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2056 - **State**: PUBLISHED - **Published Date**: May 10, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:15 UTC - **Reserved Date**: May 04, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in action.php in Nucleus CMS 3.01 allows remote attackers to execute arbitrary SQL statements via the itemid parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20040725 NucleusCMS 3.01 SQL Injection Vulnerability](http://marc.info/?l=bugtraq&m=109087144509299&w=2) 2. [nucleus-sql-injection(18002)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18002) 3. [13136](http://secunia.com/advisories/13136)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25551, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25551 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25551 - **State**: PUBLISHED - **Published Date**: March 03, 2024 at 00:00 UTC - **Last Updated**: October 29, 2024 at 20:14 UTC - **Reserved Date**: February 07, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Scripting (XSS) vulnerability in sourcecodester Simple Student Attendance System v1.0 allows attackers to execute arbitrary code via crafted GET request to web application URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://medium.com/%40jose.inaciot/my-first-cve-cve-2024-25551-f91787c05ae9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9041, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9041 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9041 - **State**: PUBLISHED - **Published Date**: September 20, 2024 at 16:31 UTC - **Last Updated**: September 20, 2024 at 17:26 UTC - **Reserved Date**: September 20, 2024 at 08:32 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in SourceCodester Best House Rental Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /ajax.php?action=update_account. The manipulation of the argument firstname/lastname/email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Best House Rental Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-278212 | SourceCodester Best House Rental Management System ajax.php sql injection](https://vuldb.com/?id.278212) 2. [VDB-278212 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.278212) 3. [Submit #411502 | SourceCodester Best house rental management system project in php admin_class.php update_account​ function 4/15 SQL Injection](https://vuldb.com/?submit.411502) 4. [](https://github.com/para-paradise/webray.com.cn/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Best%20house%20rental%20management%20system%20update_account%20time-based%20SQL%20Injection%20Vulnerability.md) 5. [](https://www.sourcecodester.com/) ### Credits - webray.com.cn (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9530, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9530 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9530 - **State**: PUBLISHED - **Published Date**: November 14, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 07:24 UTC - **Reserved Date**: April 05, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In ixheaacd_tns_ar_filter_dec of ixheaacd_aac_tns.c there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-112609715 ### Affected Products **Google Inc. - Android** Affected versions: - Android-9 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-11-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24520, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24520 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24520 - **State**: PUBLISHED - **Published Date**: July 06, 2023 at 14:53 UTC - **Last Updated**: November 14, 2024 at 14:41 UTC - **Reserved Date**: January 25, 2023 at 15:05 UTC - **Assigned By**: talos ### Vulnerability Description Two OS command injection vulnerability exist in the vtysh_ubus toolsh_excute.constprop.1 functionality of Milesight UR32L v32.3.0.5. A specially-crafted network request can lead to command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is in the trace tool utility. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **Milesight - UR32L** Affected versions: - v32.3.0.5 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706) ### Credits - Discovered by Francesco Benvenuto of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-22294, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-22294 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-22294 - **State**: PUBLISHED - **Published Date**: January 24, 2024 at 12:05 UTC - **Last Updated**: August 29, 2024 at 20:19 UTC - **Reserved Date**: January 08, 2024 at 20:58 UTC - **Assigned By**: Patchstack ### Vulnerability Description Exposure of Sensitive Information to an Unauthorized Actor vulnerability in IP2Location IP2Location Country Blocker.This issue affects IP2Location Country Blocker: from n/a through 2.33.3. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **IP2Location - IP2Location Country Blocker** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/ip2location-country-blocker/wordpress-ip2location-country-blocker-plugin-2-33-3-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13930, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13930 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13930 - **State**: PUBLISHED - **Published Date**: May 22, 2025 at 17:55 UTC - **Last Updated**: May 22, 2025 at 18:42 UTC - **Reserved Date**: March 17, 2025 at 14:39 UTC - **Assigned By**: ABB ### Vulnerability Description An Unchecked Loop Condition in ASPECT provides an attacker the ability to maliciously consume system resources if session administrator credentials become compromised This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-606: Security Weakness ### Affected Products **ABB - ASPECT-Enterprise** Affected versions: - 0 (Status: affected) **ABB - NEXUS Series** Affected versions: - 0 (Status: affected) **ABB - MATRIX Series** Affected versions: - 0 (Status: affected) ### References 1. [](https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A0021&LanguageCode=en&DocumentPartId=pdf&Action=Launch) ### Credits - ABB likes to thank Gjoko Krstikj, Zero Science Lab, for reporting the vulnerabilities in responsible disclosure
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45098, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45098 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45098 - **State**: PUBLISHED - **Published Date**: February 01, 2023 at 05:00 UTC - **Last Updated**: March 26, 2025 at 20:20 UTC - **Reserved Date**: November 09, 2022 at 15:48 UTC - **Assigned By**: dell ### Vulnerability Description Dell PowerScale OneFS, 9.0.0.x-9.4.0.x, contain a cleartext storage of sensitive information vulnerability in S3 component. An authenticated local attacker could potentially exploit this vulnerability, leading to information disclosure. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **Dell - PowerScale OneFS** Affected versions: - 9.0.0.x (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000206357/dell-emc-powerscale-onefs-security-updates-for-multiple-security-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36247 - **State**: PUBLISHED - **Published Date**: February 19, 2021 at 05:19 UTC - **Last Updated**: August 04, 2024 at 17:23 UTC - **Reserved Date**: February 19, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open OnDemand before 1.5.7 and 1.6.x before 1.6.22 allows CSRF. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://listsprd.osu.edu/pipermail/ood-users/2020-April/000397.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40760, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40760 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40760 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 21:36 UTC - **Last Updated**: August 03, 2024 at 12:28 UTC - **Reserved Date**: September 16, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Buffer Access with Incorrect Length Value vulnerablity in the TEE_MACUpdate function in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_MACUpdate with an excessive size value of chunkSize. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Samsung/mTower/issues/81) 2. [](https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1188) 3. [](https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/crypto/libtomcrypt/include/tomcrypt_hash.h#L397)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3977, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3977 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3977 - **State**: PUBLISHED - **Published Date**: November 15, 2015 at 02:00 UTC - **Last Updated**: August 06, 2024 at 06:04 UTC - **Reserved Date**: May 12, 2015 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Buffer overflow in Schneider Electric IMT25 Magnetic Flow DTM before 1.500.004 for the HART Protocol allows remote authenticated users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HART reply. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-215-01) 2. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-223-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6817, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6817 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6817 - **State**: PUBLISHED - **Published Date**: September 30, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:31 UTC - **Reserved Date**: September 19, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Cove (aka org.covechurch.app) application 1.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#322545](http://www.kb.cert.org/vuls/id/322545) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2935, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2935 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2935 - **State**: PUBLISHED - **Published Date**: May 30, 2023 at 21:31 UTC - **Last Updated**: May 05, 2025 at 15:58 UTC - **Reserved Date**: May 27, 2023 at 19:39 UTC - **Assigned By**: Chrome ### Vulnerability Description Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) ### Affected Products **Google - Chrome** Affected versions: - 114.0.5735.90 (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html) 2. [](https://crbug.com/1440695) 3. [](https://www.debian.org/security/2023/dsa-5418) 4. [](http://packetstormsecurity.com/files/173196/Chrome-v8-internal-Object-SetPropertyWithAccessor-Type-Confusion.html) 5. [](https://security.gentoo.org/glsa/202311-11) 6. [](https://security.gentoo.org/glsa/202401-34)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0466, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0466 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0466 - **State**: PUBLISHED - **Published Date**: April 10, 2011 at 01:00 UTC - **Last Updated**: September 16, 2024 at 17:28 UTC - **Reserved Date**: January 14, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The API in SUSE openSUSE Build Service (OBS) 2.0.x before 2.0.8 and 2.1.x before 2.1.6 allows attackers to bypass intended write-access restrictions and modify a (1) package or (2) project via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://news.opensuse.org/2011/03/02/build-service-team-releases-new-versions-fixing-security-problems/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12622, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12622 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12622 - **State**: PUBLISHED - **Published Date**: December 24, 2024 at 05:23 UTC - **Last Updated**: December 24, 2024 at 15:27 UTC - **Reserved Date**: December 13, 2024 at 14:40 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_cart_button' and 'wp_cart_display_product' shortcodes in all versions up to, and including, 5.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **wptipsntricks - WordPress Simple Shopping Cart** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/adfba556-6a96-4836-af0f-39c214099481?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.0.7/wp_shopping_cart_shortcodes.php#L5) 3. [](https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.0.7/wp_shopping_cart_shortcodes.php#L11) 4. [](https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.0.7/wp_shopping_cart_shortcodes.php#L49) 5. [](https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.0.7/includes/wpsc-shortcodes-related.php#L3) 6. [](https://plugins.trac.wordpress.org/changeset/3210506/wordpress-simple-paypal-shopping-cart/trunk/includes/wpsc-shortcodes-related.php) ### Credits - muhammad yudha
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44042, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44042 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44042 - **State**: PUBLISHED - **Published Date**: October 06, 2024 at 12:01 UTC - **Last Updated**: October 07, 2024 at 12:29 UTC - **Reserved Date**: August 18, 2024 at 21:58 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Fahad Mahmood WP Datepicker allows Stored XSS.This issue affects WP Datepicker: from n/a through 2.1.1. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Fahad Mahmood - WP Datepicker** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-datepicker/wordpress-wp-datepicker-plugin-2-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3627, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3627 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3627 - **State**: PUBLISHED - **Published Date**: July 11, 2023 at 16:08 UTC - **Last Updated**: October 30, 2024 at 14:22 UTC - **Reserved Date**: July 11, 2023 at 16:08 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Cross-Site Request Forgery (CSRF) in GitHub repository salesagility/suitecrm-core prior to 8.3.1. ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **salesagility - salesagility/suitecrm-core** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/558b3dce-db03-47ba-b60b-c6eb578e04f1) 2. [](https://github.com/salesagility/suitecrm-core/commit/78285702d76317f081b1fbc59cb2754e93b9a4c3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-20202, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-20202 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-20202 - **State**: PUBLISHED - **Published Date**: May 07, 2025 at 17:35 UTC - **Last Updated**: May 07, 2025 at 19:45 UTC - **Reserved Date**: October 10, 2024 at 19:15 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in Cisco IOS XE Wireless Controller Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of access point (AP) Cisco Discovery Protocol (CDP) neighbor reports when they are processed by the wireless controller. An attacker could exploit this vulnerability by sending a crafted CDP packet to an AP. A successful exploit could allow the attacker to cause an unexpected reload of the wireless controller that is managing the AP, resulting in a DoS condition that affects the wireless network. ### CVSS Metrics - **CVSS Base Score**: 7.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H` ### Affected Products **Cisco - Cisco IOS XE Software** Affected versions: - 16.10.1 (Status: affected) - 16.10.1a (Status: affected) - 16.10.1b (Status: affected) - 16.10.1s (Status: affected) - 16.10.1c (Status: affected) - 16.10.1e (Status: affected) - 16.10.1d (Status: affected) - 16.10.2 (Status: affected) - 16.10.1f (Status: affected) - 16.10.1g (Status: affected) - 16.10.3 (Status: affected) - 16.11.1 (Status: affected) - 16.11.1a (Status: affected) - 16.11.1b (Status: affected) - 16.11.2 (Status: affected) - 16.11.1s (Status: affected) - 16.12.1 (Status: affected) - 16.12.1s (Status: affected) - 16.12.1a (Status: affected) - 16.12.1c (Status: affected) - 16.12.1w (Status: affected) - 16.12.2 (Status: affected) - 16.12.1y (Status: affected) - 16.12.2a (Status: affected) - 16.12.3 (Status: affected) - 16.12.8 (Status: affected) - 16.12.2s (Status: affected) - 16.12.1x (Status: affected) - 16.12.1t (Status: affected) - 16.12.4 (Status: affected) - 16.12.3s (Status: affected) - 16.12.3a (Status: affected) - 16.12.4a (Status: affected) - 16.12.5 (Status: affected) - 16.12.6 (Status: affected) - 16.12.1z1 (Status: affected) - 16.12.5a (Status: affected) - 16.12.5b (Status: affected) - 16.12.1z2 (Status: affected) - 16.12.6a (Status: affected) - 16.12.7 (Status: affected) - 16.12.9 (Status: affected) - 16.12.10 (Status: affected) - 16.12.10a (Status: affected) - 16.12.11 (Status: affected) - 16.12.12 (Status: affected) - 17.1.1 (Status: affected) - 17.1.1a (Status: affected) - 17.1.1s (Status: affected) - 17.1.1t (Status: affected) - 17.1.3 (Status: affected) - 17.2.1 (Status: affected) - 17.2.1r (Status: affected) - 17.2.1a (Status: affected) - 17.2.1v (Status: affected) - 17.2.2 (Status: affected) - 17.2.3 (Status: affected) - 17.3.1 (Status: affected) - 17.3.2 (Status: affected) - 17.3.3 (Status: affected) - 17.3.1a (Status: affected) - 17.3.1w (Status: affected) - 17.3.2a (Status: affected) - 17.3.1x (Status: affected) - 17.3.1z (Status: affected) - 17.3.4 (Status: affected) - 17.3.5 (Status: affected) - 17.3.4a (Status: affected) - 17.3.6 (Status: affected) - 17.3.4b (Status: affected) - 17.3.4c (Status: affected) - 17.3.5a (Status: affected) - 17.3.5b (Status: affected) - 17.3.7 (Status: affected) - 17.3.8 (Status: affected) - 17.3.8a (Status: affected) - 17.4.1 (Status: affected) - 17.4.2 (Status: affected) - 17.4.1a (Status: affected) - 17.4.1b (Status: affected) - 17.4.2a (Status: affected) - 17.5.1 (Status: affected) - 17.5.1a (Status: affected) - 17.6.1 (Status: affected) - 17.6.2 (Status: affected) - 17.6.1w (Status: affected) - 17.6.1a (Status: affected) - 17.6.1x (Status: affected) - 17.6.3 (Status: affected) - 17.6.1y (Status: affected) - 17.6.1z (Status: affected) - 17.6.3a (Status: affected) - 17.6.4 (Status: affected) - 17.6.1z1 (Status: affected) - 17.6.5 (Status: affected) - 17.6.6 (Status: affected) - 17.6.6a (Status: affected) - 17.6.5a (Status: affected) - 17.6.7 (Status: affected) - 17.6.8 (Status: affected) - 17.6.8a (Status: affected) - 17.7.1 (Status: affected) - 17.7.1a (Status: affected) - 17.7.1b (Status: affected) - 17.7.2 (Status: affected) - 17.10.1 (Status: affected) - 17.10.1a (Status: affected) - 17.10.1b (Status: affected) - 17.8.1 (Status: affected) - 17.8.1a (Status: affected) - 17.9.1 (Status: affected) - 17.9.1w (Status: affected) - 17.9.2 (Status: affected) - 17.9.1a (Status: affected) - 17.9.1x (Status: affected) - 17.9.1y (Status: affected) - 17.9.3 (Status: affected) - 17.9.2a (Status: affected) - 17.9.1x1 (Status: affected) - 17.9.3a (Status: affected) - 17.9.4 (Status: affected) - 17.9.1y1 (Status: affected) - 17.9.5 (Status: affected) - 17.9.4a (Status: affected) - 17.9.5a (Status: affected) - 17.9.5b (Status: affected) - 17.9.5e (Status: affected) - 17.9.5f (Status: affected) - 17.11.1 (Status: affected) - 17.11.1a (Status: affected) - 17.12.1 (Status: affected) - 17.12.1w (Status: affected) - 17.12.1a (Status: affected) - 17.12.1x (Status: affected) - 17.12.2 (Status: affected) - 17.12.3 (Status: affected) - 17.12.2a (Status: affected) - 17.12.1y (Status: affected) - 17.12.1z (Status: affected) - 17.12.4 (Status: affected) - 17.12.3a (Status: affected) - 17.12.1z1 (Status: affected) - 17.12.4a (Status: affected) - 17.12.4b (Status: affected) - 17.13.1 (Status: affected) - 17.13.1a (Status: affected) - 17.14.1 (Status: affected) - 17.14.1a (Status: affected) - 17.11.99SW (Status: affected) - 17.15.1 (Status: affected) - 17.15.1w (Status: affected) - 17.15.1a (Status: affected) - 17.15.1b (Status: affected) ### References 1. [cisco-sa-ewlc-cdp-dos-fpeks9K](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-cdp-dos-fpeks9K)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7705, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7705 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7705 - **State**: PUBLISHED - **Published Date**: October 21, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:56 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Atkins Diet Free Shopping List (aka com.wAtkinsDietFreeShoppingList) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#553985](http://www.kb.cert.org/vuls/id/553985) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2665, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2665 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2665 - **State**: PUBLISHED - **Published Date**: June 17, 2015 at 18:00 UTC - **Last Updated**: August 06, 2024 at 05:24 UTC - **Reserved Date**: March 20, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Cacti before 0.8.8d allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2016-a8e2be0fe6](http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183449.html) 2. [](http://www.cacti.net/release_notes_0_8_8d.php) 3. [1032672](http://www.securitytracker.com/id/1032672) 4. [](http://www.fortiguard.com/advisory/FG-VD-15-017/) 5. [FEDORA-2016-852a39e085](http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183919.html) 6. [75309](http://www.securityfocus.com/bid/75309) 7. [DSA-3295](http://www.debian.org/security/2015/dsa-3295) 8. [FEDORA-2016-4a5ce6a6c0](http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183454.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43787, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43787 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43787 - **State**: PUBLISHED - **Published Date**: August 22, 2024 at 14:23 UTC - **Last Updated**: August 22, 2024 at 15:40 UTC - **Reserved Date**: August 16, 2024 at 14:20 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8. ### CVSS Metrics - **CVSS Base Score**: 5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **honojs - hono** Affected versions: - < 4.5.8 (Status: affected) ### References 1. [https://github.com/honojs/hono/security/advisories/GHSA-rpfr-3m35-5vx5](https://github.com/honojs/hono/security/advisories/GHSA-rpfr-3m35-5vx5) 2. [https://github.com/honojs/hono/commit/41ce840379516410dee60c783142e05bb5a22449](https://github.com/honojs/hono/commit/41ce840379516410dee60c783142e05bb5a22449) 3. [https://github.com/honojs/hono/blob/b0af71fbcc6dbe44140ea76f16d68dfdb32a99a0/src/middleware/csrf/index.ts#L16-L17](https://github.com/honojs/hono/blob/b0af71fbcc6dbe44140ea76f16d68dfdb32a99a0/src/middleware/csrf/index.ts#L16-L17)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5738, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5738 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5738 - **State**: PUBLISHED - **Published Date**: September 09, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 11:55 UTC - **Reserved Date**: August 30, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Garfield's Defense (aka com.webprancer.google.garfieldDefense) application 1.5.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#558385](http://www.kb.cert.org/vuls/id/558385) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10230, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10230 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10230 - **State**: PUBLISHED - **Published Date**: August 08, 2017 at 15:00 UTC - **Last Updated**: October 04, 2024 at 17:06 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Hospitality Cruise Dining Room Management component of Oracle Hospitality Applications (subcomponent: SilverWhere). The supported version that is affected is 8.0.75. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Cruise Dining Room Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Cruise Dining Room Management accessible data as well as unauthorized read access to a subset of Oracle Hospitality Cruise Dining Room Management accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N). ### Affected Products **Oracle Corporation - Hospitality Cruise Dining Room Management** Affected versions: - 8.0.75 (Status: affected) ### References 1. [99688](http://www.securityfocus.com/bid/99688) 2. [1038941](http://www.securitytracker.com/id/1038941) 3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0255, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0255 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0255 - **State**: PUBLISHED - **Published Date**: January 22, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:14 UTC - **Reserved Date**: April 26, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Nbase-Xyplex EdgeBlaster router allows remote attackers to cause a denial of service via a scan for the FormMail CGI program. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1091](http://www.securityfocus.com/bid/1091) 2. [20000405 SilverBack Security Advisory: Nbase-Xyplex DoS](http://archives.neohapsis.com/archives/bugtraq/2000-04/0022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38503, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38503 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38503 - **State**: PUBLISHED - **Published Date**: July 25, 2023 at 22:06 UTC - **Last Updated**: October 10, 2024 at 17:46 UTC - **Reserved Date**: July 18, 2023 at 16:28 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 10.3.0 and prior to version 10.5.0, the permission filters (i.e. `user_created IS $CURRENT_USER`) are not properly checked when using GraphQL subscription resulting in unauthorized users getting event on their subscription which they should not be receiving according to the permissions. This can be any collection but out-of-the box the `directus_users` collection is configured with such a permissions filter allowing you to get updates for other users when changes happen. Version 10.5.0 contains a patch. As a workaround, disable GraphQL subscriptions. ### CVSS Metrics - **CVSS Base Score**: 5.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **directus - directus** Affected versions: - >= 10.3.0, < 10.5.0 (Status: affected) ### References 1. [https://github.com/directus/directus/security/advisories/GHSA-gggm-66rh-pp98](https://github.com/directus/directus/security/advisories/GHSA-gggm-66rh-pp98) 2. [https://github.com/directus/directus/pull/19155](https://github.com/directus/directus/pull/19155)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0658, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0658 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0658 - **State**: PUBLISHED - **Published Date**: March 28, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 04:17 UTC - **Reserved Date**: January 07, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1031992](http://www.securitytracker.com/id/1031992) 2. [20150327 Cisco NX-OS Software DHCP Options Command Injection Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=38062)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1082, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1082 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1082 - **State**: PUBLISHED - **Published Date**: March 29, 2022 at 05:50 UTC - **Last Updated**: April 15, 2025 at 14:43 UTC - **Reserved Date**: March 25, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Microfinance Management System 1.0. It has been rated as critical. This issue affects the file /mims/login.php of the Login Page. The manipulation of the argument username/password with the input '||1=1# leads to sql injection. The attack may be initiated remotely. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Microfinance Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.195641)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21273 - **State**: PUBLISHED - **Published Date**: January 19, 2022 at 11:22 UTC - **Last Updated**: September 24, 2024 at 20:28 UTC - **Reserved Date**: November 15, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Project Costing product of Oracle E-Business Suite (component: Expenses, Currency Override). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Project Costing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Project Costing accessible data as well as unauthorized access to critical data or complete access to all Oracle Project Costing accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N` ### Affected Products **Oracle Corporation - Project Costing** Affected versions: - 12.2.3-12.2.11 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33514, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33514 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33514 - **State**: PUBLISHED - **Published Date**: May 21, 2021 at 22:10 UTC - **Last Updated**: August 03, 2024 at 23:50 UTC - **Reserved Date**: May 21, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:U/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071) 2. [](https://gynvael.coldwind.pl/?lang=en&id=733)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3196, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3196 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3196 - **State**: PUBLISHED - **Published Date**: July 16, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 09:28 UTC - **Reserved Date**: July 16, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description skeleton.c in yacc does not properly handle reduction of a rule with an empty right hand side, which allows context-dependent attackers to cause an out-of-bounds stack access when the yacc stack pointer points to the end of the stack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[openbsd-cvs] 20080708 Re: CVS: cvs.openbsd.org: src](http://marc.info/?l=openbsd-cvs&m=121553036432044&w=2) 2. [31073](http://secunia.com/advisories/31073) 3. [[openbsd-cvs] 20080708 CVS: cvs.openbsd.org: src](http://marc.info/?l=openbsd-cvs&m=121553004431393&w=2) 4. [ADV-2008-2151](http://www.vupen.com/english/advisories/2008/2151/references)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-22654, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-22654 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-22654 - **State**: PUBLISHED - **Published Date**: January 20, 2023 at 00:00 UTC - **Last Updated**: April 03, 2025 at 17:43 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to bypass firmware image bad md5 checksum failed error. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.ruckuswireless.com/security_bulletins/302) 2. [](https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8268, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8268 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8268 - **State**: PUBLISHED - **Published Date**: June 10, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 08:13 UTC - **Reserved Date**: November 19, 2015 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The up.time agent in Idera Uptime Infrastructure Monitor 7.5 and 7.6 on Linux allows remote attackers to read arbitrary files via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://docs.uptimesoftware.com/display/UT/Release+Notes) 2. [VU#204232](http://www.kb.cert.org/vuls/id/204232) 3. [](http://jira.uptimesoftware.com/browse/UT-16039)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18600, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18600 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18600 - **State**: PUBLISHED - **Published Date**: September 10, 2019 at 11:01 UTC - **Last Updated**: August 05, 2024 at 21:28 UTC - **Reserved Date**: September 10, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The formcraft3 plugin before 3.4 for WordPress has stored XSS via the "New Form > Heading > Heading Text" field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wpvulndb.com/vulnerabilities/8877)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29643, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29643 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29643 - **State**: PUBLISHED - **Published Date**: May 18, 2022 at 11:50 UTC - **Last Updated**: August 03, 2024 at 06:26 UTC - **Reserved Date**: April 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the macAddress parameter in the function setMacQos. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/6.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2630, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2630 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2630 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: February 26, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7750, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7750 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7750 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 16:12 UTC - **Reserved Date**: April 12, 2017 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description A use-after-free vulnerability during video control operations when a "<track>" element holds a reference to an older window if that window has been replaced in the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) **Mozilla - Firefox ESR** Affected versions: - unspecified (Status: affected) **Mozilla - Thunderbird** Affected versions: - unspecified (Status: affected) ### References 1. [99057](http://www.securityfocus.com/bid/99057) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1356558) 3. [](https://www.mozilla.org/security/advisories/mfsa2017-15/) 4. [DSA-3918](https://www.debian.org/security/2017/dsa-3918) 5. [1038689](http://www.securitytracker.com/id/1038689) 6. [DSA-3881](https://www.debian.org/security/2017/dsa-3881) 7. [RHSA-2017:1440](https://access.redhat.com/errata/RHSA-2017:1440) 8. [RHSA-2017:1561](https://access.redhat.com/errata/RHSA-2017:1561) 9. [](https://www.mozilla.org/security/advisories/mfsa2017-17/) 10. [](https://www.mozilla.org/security/advisories/mfsa2017-16/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-25002, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-25002 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-25002 - **State**: PUBLISHED - **Published Date**: December 31, 2020 at 08:33 UTC - **Last Updated**: August 05, 2024 at 03:00 UTC - **Reserved Date**: December 31, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the sodiumoxide crate before 0.2.5 for Rust. generichash::Digest::eq compares itself to itself and thus has degenerate security properties. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rustsec.org/advisories/RUSTSEC-2019-0026.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31142, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31142 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31142 - **State**: PUBLISHED - **Published Date**: May 16, 2024 at 13:39 UTC - **Last Updated**: March 27, 2025 at 21:00 UTC - **Reserved Date**: March 28, 2024 at 18:14 UTC - **Assigned By**: XEN ### Vulnerability Description Because of a logical error in XSA-407 (Branch Type Confusion), the mitigation is not applied properly when it is intended to be used. XSA-434 (Speculative Return Stack Overflow) uses the same infrastructure, so is equally impacted. For more details, see: https://xenbits.xen.org/xsa/advisory-407.html https://xenbits.xen.org/xsa/advisory-434.html ### Affected Products **Xen - Xen** Affected versions: - consult Xen advisory XSA-455 (Status: unknown) ### References 1. [](https://xenbits.xenproject.org/xsa/advisory-455.html) ### Credits - This issue was discovered by Andrew Cooper of XenServer.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44429, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44429 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44429 - **State**: PUBLISHED - **Published Date**: November 29, 2021 at 22:08 UTC - **Last Updated**: August 04, 2024 at 04:25 UTC - **Reserved Date**: November 29, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Serva 4.4.0 allows remote attackers to cause a denial of service (daemon crash) via a TFTP read (RRQ) request, aka opcode 1, a related issue to CVE-2013-0145. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/165058/Serva-4.4.0-TFTP-Remote-Buffer-Overflow.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-25191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-25191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-25191 - **State**: PUBLISHED - **Published Date**: December 11, 2020 at 01:46 UTC - **Last Updated**: August 04, 2024 at 15:26 UTC - **Reserved Date**: September 04, 2020 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Incorrect permissions are set by default for an API entry-point of a specific service, allowing a non-authenticated user to trigger a function that could reboot the CompactRIO (Driver versions prior to 20.5) remotely. ### Weakness Classification (CWE) - CWE-732: Security Weakness ### Affected Products **n/a - CompactRIO** Affected versions: - Driver versions prior to 20.5 (Status: affected) ### References 1. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-338-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0200, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0200 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0200 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: April 04, 2003 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1733, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1733 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1733 - **State**: PUBLISHED - **Published Date**: May 20, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 05:20 UTC - **Reserved Date**: May 20, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in IPplan 4.91a allows remote attackers to hijack the authentication of administrators for requests that (1) change the password, (2) add users, or (3) delete users via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [54601](http://osvdb.org/54601) 2. [34985](http://secunia.com/advisories/34985) 3. [ipplan-unspecified-csrf(50632)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50632) 4. [](http://holisticinfosec.org/content/view/113/45/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4653, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4653 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4653 - **State**: PUBLISHED - **Published Date**: October 21, 2008 at 22:00 UTC - **Last Updated**: August 07, 2024 at 10:24 UTC - **Reserved Date**: October 21, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in makale.php in Makale 0.26 and possibly other versions, a module for XOOPS, allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [31834](http://www.securityfocus.com/bid/31834) 2. [makale-xoops-makale-sql-injection(45991)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45991) 3. [6795](https://www.exploit-db.com/exploits/6795) 4. [4459](http://securityreason.com/securityalert/4459) 5. [32347](http://secunia.com/advisories/32347)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39119, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39119 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39119 - **State**: PUBLISHED - **Published Date**: September 01, 2021 at 22:50 UTC - **Last Updated**: October 11, 2024 at 19:07 UTC - **Reserved Date**: August 16, 2021 at 00:00 UTC - **Assigned By**: atlassian ### Vulnerability Description Affected versions of Atlassian Jira Server and Data Center allow users who have watched an issue to continue receiving updates on the issue even after their Jira account is revoked, via a Broken Access Control vulnerability in the issue notification feature. The affected versions are before version 8.19.0. ### Affected Products **Atlassian - Jira Server** Affected versions: - unspecified (Status: affected) **Atlassian - Jira Data Center** Affected versions: - unspecified (Status: affected) ### References 1. [](https://jira.atlassian.com/browse/JRASERVER-72737)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17422, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17422 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17422 - **State**: PUBLISHED - **Published Date**: March 07, 2019 at 22:00 UTC - **Last Updated**: August 05, 2024 at 10:47 UTC - **Reserved Date**: September 23, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description dotCMS before 5.0.2 has open redirects via the html/common/forward_js.jsp FORWARD_URL parameter or the html/portlet/ext/common/page_preview_popup.jsp hostname parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/dotCMS/core/issues/15286)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0498, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0498 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0498 - **State**: PUBLISHED - **Published Date**: June 11, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:49 UTC - **Reserved Date**: June 07, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Etnus TotalView 5.0.0-4 installs certain files with UID 5039 and GID 59, which could allow local users with that UID or GID to modify the files and gain privileges as other TotalView users. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4365](http://www.securityfocus.com/bid/4365) 2. [totalview-insecure-privileges(8635)](http://www.iss.net/security_center/static/8635.php) 3. [20020326 Etnus TotalView 5.](http://www.securityfocus.com/archive/1/264085)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34972, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34972 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34972 - **State**: PUBLISHED - **Published Date**: July 05, 2022 at 19:27 UTC - **Last Updated**: August 03, 2024 at 09:22 UTC - **Reserved Date**: July 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description So Filter Shop v3.x was discovered to contain multiple blind SQL injection vulnerabilities via the att_value_id , manu_value_id , opt_value_id , and subcate_value_id parameters at /index.php?route=extension/module/so_filter_shop_by/filter_data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/167605/OpenCart-3.x-So-Filter-Shop-By-SQL-Injection.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0095, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0095 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0095 - **State**: PUBLISHED - **Published Date**: March 17, 2017 at 00:00 UTC - **Last Updated**: August 05, 2024 at 12:55 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Hyper-V in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 does not properly validate vSMB packet data, which allows attackers to execute arbitrary code on a target OS, aka "Hyper-V vSMB Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0021. ### Affected Products **n/a - vSMB Hyper-V in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016.** Affected versions: - vSMB Hyper-V in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016. (Status: affected) ### References 1. [96699](http://www.securityfocus.com/bid/96699) 2. [1037999](http://www.securitytracker.com/id/1037999) 3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0095)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3989, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3989 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3989 - **State**: PUBLISHED - **Published Date**: August 05, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 18:48 UTC - **Reserved Date**: August 04, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in index.php in Knusperleicht Shoutbox 4.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the sb_include_path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060801 [Kurdish Security # 21] ShoutBox v4.4 Remote Command Execution](http://www.securityfocus.com/archive/1/441815/100/0/threaded) 2. [2103](https://www.exploit-db.com/exploits/2103) 3. [shoutbox-index-file-include(28123)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28123) 4. [19273](http://www.securityfocus.com/bid/19273) 5. [27709](http://www.osvdb.org/27709) 6. [1325](http://securityreason.com/securityalert/1325) 7. [21302](http://secunia.com/advisories/21302) 8. [ADV-2006-3090](http://www.vupen.com/english/advisories/2006/3090)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30198 - **State**: PUBLISHED - **Published Date**: October 11, 2022 at 00:00 UTC - **Last Updated**: January 02, 2025 at 21:26 UTC - **Reserved Date**: May 03, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30198)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5941, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5941 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5941 - **State**: PUBLISHED - **Published Date**: January 22, 2009 at 11:00 UTC - **Last Updated**: September 16, 2024 at 19:09 UTC - **Reserved Date**: January 21, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in MODx 0.9.6.1p2 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [JVN#66828183](http://jvn.jp/en/jp/JVN66828183/index.html) 2. [](http://svn.modxcms.com/svn/tattoo/tattoo/releases/0.9.6.3/install/changelog.txt) 3. [JVNDB-2009-000004](http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000004.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0821, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0821 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0821 - **State**: PUBLISHED - **Published Date**: March 05, 2009 at 02:00 UTC - **Last Updated**: September 16, 2024 at 16:17 UTC - **Reserved Date**: March 04, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mozilla Firefox 2.0.0.20 and earlier allows remote attackers to cause a denial of service (application crash) via nested calls to the window.print function, as demonstrated by a window.print(window.print()) in the onclick attribute of an INPUT element. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33969](http://www.securityfocus.com/bid/33969) 2. [](http://downloads.securityfocus.com/vulnerabilities/exploits/33969.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2003, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2003 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2003 - **State**: PUBLISHED - **Published Date**: April 12, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 13:13 UTC - **Reserved Date**: April 12, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description InoutMailingListManager 3.1 and earlier sends a Location redirect header but does not exit after an authorization check fails, which allows remote attackers to access certain restricted functionality, and upload and execute arbitrary PHP code, by ignoring the redirect. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [24842](http://secunia.com/advisories/24842) 2. [3702](https://www.exploit-db.com/exploits/3702) 3. [ADV-2007-1345](http://www.vupen.com/english/advisories/2007/1345)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-7163, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-7163 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-7163 - **State**: PUBLISHED - **Published Date**: March 10, 2007 at 00:00 UTC - **Last Updated**: September 16, 2024 at 16:57 UTC - **Reserved Date**: March 09, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description DreameeSoft Password Master 1.0 stores the database in an unencrypted format when the master password is set, which allows attackers with physical access to read the database contents via an unspecified authentication bypass. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19983](http://www.securityfocus.com/bid/19983)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-57394, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-57394 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-57394 - **State**: PUBLISHED - **Published Date**: April 21, 2025 at 00:00 UTC - **Last Updated**: May 12, 2025 at 14:10 UTC - **Reserved Date**: January 09, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The quarantine - restore function in Qi-ANXIN Tianqing Endpoint Security Management System v10.0 allows user to restore a malicious file to an arbitrary file path. Attackers can write malicious DLL to system path and perform privilege escalation by leveraging Windows DLL hijacking vulnerabilities. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://en.qianxin.com/product/detail/165) 2. [](https://github.com/cwjchoi01/CVE-2024-57394)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51420 - **State**: PUBLISHED - **Published Date**: December 29, 2023 at 09:16 UTC - **Last Updated**: November 20, 2024 at 19:30 UTC - **Reserved Date**: December 19, 2023 at 00:04 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Control of Generation of Code ('Code Injection') vulnerability in Soft8Soft LLC Verge3D Publishing and E-Commerce.This issue affects Verge3D Publishing and E-Commerce: from n/a through 4.5.2. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **Soft8Soft LLC - Verge3D Publishing and E-Commerce** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/verge3d/wordpress-verge3d-plugin-4-5-2-remote-code-execution-rce-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2296, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2296 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2296 - **State**: PUBLISHED - **Published Date**: September 17, 2013 at 01:00 UTC - **Last Updated**: September 17, 2024 at 03:13 UTC - **Reserved Date**: March 02, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Walrus in Eucalyptus before 3.2.2 does not verify authorization for the GetBucketLoggingStatus, SetBucketLoggingStatus, and SetBucketVersioningStatus bucket operations, which allows remote authenticated users to bypass intended restrictions on (1) modifying the logging setting, (2) modifying the versioning setting, or (3) accessing activity logs via a request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://eucalyptus.atlassian.net/browse/EUCA-3074) 2. [](http://www.eucalyptus.com/resources/security/advisories/esa-10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48350, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48350 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48350 - **State**: PUBLISHED - **Published Date**: March 27, 2023 at 00:00 UTC - **Last Updated**: February 24, 2025 at 17:48 UTC - **Reserved Date**: February 25, 2023 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description The HUAWEI Messaging app has a vulnerability of unauthorized file access. Successful exploitation of this vulnerability may affect confidentiality. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 3.0.0 (Status: affected) **Huawei - EMUI** Affected versions: - 13.0.0 (Status: affected) ### References 1. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505) 2. [](https://consumer.huawei.com/en/support/bulletin/2023/3/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4389, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4389 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4389 - **State**: PUBLISHED - **Published Date**: August 14, 2024 at 08:29 UTC - **Last Updated**: August 14, 2024 at 13:24 UTC - **Reserved Date**: May 01, 2024 at 14:51 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Slider and Carousel slider by Depicter plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the uploadFile function in all versions up to, and including, 3.1.1. This makes it possible for authenticated attackers, with contributor access or higher, to upload arbitrary files on the affected site's server which may make remote code execution possible. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **averta - Slider & Popup Builder by Depicter – Add Image Slider, Carousel Slider, Exit Intent Popup, Popup Modal, Coupon Popup, Post Slider Carousel** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/81f025da-c28c-4a80-8b4f-27dae07b2b04?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/depicter/trunk/app/src/WordPress/FileUploaderService.php#L28) 3. [](https://plugins.trac.wordpress.org/changeset/3108589/depicter/trunk/app/src/WordPress/FileUploaderService.php) ### Credits - Arkadiusz Hydzik
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1798, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1798 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1798 - **State**: PUBLISHED - **Published Date**: April 08, 2019 at 19:30 UTC - **Last Updated**: November 19, 2024 at 19:12 UTC - **Reserved Date**: December 06, 2018 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Cisco - ClamAV** Affected versions: - unspecified (Status: affected) ### References 1. [](https://bugzilla.clamav.net/show_bug.cgi?id=12262) 2. [GLSA-201904-12](https://security.gentoo.org/glsa/201904-12)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50451, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50451 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50451 - **State**: PUBLISHED - **Published Date**: October 28, 2024 at 17:53 UTC - **Last Updated**: October 28, 2024 at 20:04 UTC - **Reserved Date**: October 24, 2024 at 07:26 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF) allows Stored XSS.This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.3.4. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **realmag777 - WordPress Meta Data and Taxonomies Filter (MDTF)** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-mdtf-meta-data-and-taxonomies-filter-plugin-1-3-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37995, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37995 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37995 - **State**: PUBLISHED - **Published Date**: September 10, 2024 at 09:36 UTC - **Last Updated**: September 10, 2024 at 15:09 UTC - **Reserved Date**: June 11, 2024 at 08:32 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0) (All versions < V4.2), SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0) (All versions < V4.2), SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0) (All versions < V4.2), SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0) (All versions < V4.2), SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0) (All versions < V4.2), SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0) (All versions < V4.2), SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0) (All versions < V4.2), SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0) (All versions < V4.2), SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0) (All versions < V4.2), SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0) (All versions < V4.2), SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0) (All versions < V4.2), SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0) (All versions < V4.2), SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0) (All versions < V4.2), SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0) (All versions < V4.2), SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0) (All versions < V4.2), SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0) (All versions < V4.2), SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0) (All versions < V4.2), SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0) (All versions < V4.2), SIMATIC RF1140R (6GT2831-6CB00) (All versions < V1.1), SIMATIC RF1170R (6GT2831-6BB00) (All versions < V1.1), SIMATIC RF166C (6GT2002-0EE20) (All versions < V2.2), SIMATIC RF185C (6GT2002-0JE10) (All versions < V2.2), SIMATIC RF186C (6GT2002-0JE20) (All versions < V2.2), SIMATIC RF186CI (6GT2002-0JE50) (All versions < V2.2), SIMATIC RF188C (6GT2002-0JE40) (All versions < V2.2), SIMATIC RF188CI (6GT2002-0JE60) (All versions < V2.2), SIMATIC RF360R (6GT2801-5BA30) (All versions < V2.2). The affected application improperly handles error while a faulty certificate upload leading to crashing of application. This vulnerability could allow an attacker to disclose sensitive information. ### CVSS Metrics - **CVSS Base Score**: 2.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-703: Security Weakness ### Affected Products **Siemens - SIMATIC Reader RF610R CMIIT** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF610R ETSI** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF610R FCC** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF615R CMIIT** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF615R ETSI** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF615R FCC** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF650R ARIB** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF650R CMIIT** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF650R ETSI** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF650R FCC** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF680R ARIB** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF680R CMIIT** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF680R ETSI** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF680R FCC** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF685R ARIB** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF685R CMIIT** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF685R ETSI** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC Reader RF685R FCC** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RF1140R** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RF1170R** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RF166C** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RF185C** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RF186C** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RF186CI** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RF188C** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RF188CI** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RF360R** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-765405.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6842, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6842 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6842 - **State**: PUBLISHED - **Published Date**: March 15, 2017 at 14:00 UTC - **Last Updated**: August 05, 2024 at 15:41 UTC - **Reserved Date**: March 12, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The ColorChanger::GetColorFromStack function in colorchanger.cpp in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-colorchangergetcolorfromstack-colorchanger-cpp/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3922, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3922 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3922 - **State**: PUBLISHED - **Published Date**: October 10, 2016 at 10:00 UTC - **Last Updated**: August 06, 2024 at 00:10 UTC - **Reserved Date**: March 30, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description libril/RilSapSocket.cpp in Telephony in Android 6.x before 2016-10-01 and 7.0 before 2016-10-01 relies on variable-length arrays, which allows attackers to gain privileges via a crafted application, aka internal bug 30202619. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://android.googlesource.com/platform/hardware/ril/+/95610818918f6f11fe7d23aca1380e6c0fac2af0) 2. [](http://source.android.com/security/bulletin/2016-10-01.html) 3. [93315](http://www.securityfocus.com/bid/93315)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28699, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28699 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28699 - **State**: PUBLISHED - **Published Date**: April 22, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 00:56 UTC - **Reserved Date**: March 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A buffer overflow vulnerability in pdf2json v0.70 allows a local attacker to execute arbitrary code via the GString::copy() and ImgOutputDev::ImgOutputDev function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://pdf2json.com) 2. [](https://github.com/flexpaper/pdf2json) 3. [](https://github.com/flexpaper/pdf2json/issues/52)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20751, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20751 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20751 - **State**: PUBLISHED - **Published Date**: February 04, 2019 at 19:00 UTC - **Last Updated**: September 17, 2024 at 02:01 UTC - **Reserved Date**: February 04, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in crop_page in PoDoFo 0.9.6. For a crafted PDF document, pPage->GetObject()->GetDictionary().AddKey(PdfName("MediaBox"),var) can be problematic due to the function GetObject() being called for the pPage NULL pointer object. The value of pPage at this point is 0x0, which causes a NULL pointer dereference. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-crop_page-podofo-0-9-6/) 2. [](https://sourceforge.net/p/podofo/tickets/33/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4511, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4511 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4511 - **State**: PUBLISHED - **Published Date**: May 10, 2025 at 18:31 UTC - **Last Updated**: May 12, 2025 at 14:23 UTC - **Reserved Date**: May 09, 2025 at 14:40 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in vector4wang spring-boot-quick up to 20250422. It has been rated as critical. This issue affects the function ResponseEntity of the file /spring-boot-quick-master/quick-img2txt/src/main/java/com/quick/controller/Img2TxtController.java of the component quick-img2txt. The manipulation leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **vector4wang - spring-boot-quick** Affected versions: - 20250422 (Status: affected) ### References 1. [VDB-308231 | vector4wang spring-boot-quick quick-img2txt Img2TxtController.java ResponseEntity path traversal](https://vuldb.com/?id.308231) 2. [VDB-308231 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.308231) 3. [Submit #563538 | vector4wang spring-boot-quick master branch Path Traversal](https://vuldb.com/?submit.563538) 4. [](https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250422-01.md) ### Credits - ShenxiuSecurity (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17489, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17489 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17489 - **State**: PUBLISHED - **Published Date**: October 10, 2019 at 20:17 UTC - **Last Updated**: August 05, 2024 at 01:40 UTC - **Reserved Date**: October 10, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Jiangnan Online Judge (aka jnoj) 0.8.0 has XSS via the Problem[title] parameter to web/polygon/problem/create or web/polygon/problem/update or web/admin/problem/create. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/shi-yang/jnoj/issues/51)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0433, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0433 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0433 - **State**: PUBLISHED - **Published Date**: June 08, 2018 at 17:00 UTC - **Last Updated**: September 17, 2024 at 00:46 UTC - **Reserved Date**: January 09, 2012 at 00:00 UTC - **Assigned By**: microfocus ### Vulnerability Description The install-chef-suse.sh script shipped with crowbar before 2012-10-02 is creating files containing confidential data with insecure permissions, allowing local users to read confidential data. ### Weakness Classification (CWE) - CWE-732: Security Weakness ### Affected Products **SUSE - crowbar** Affected versions: - unspecified (Status: affected) ### References 1. [](https://bugzilla.suse.com/show_bug.cgi?id=783195) 2. [](https://www.suse.com/security/cve/CVE-2012-0433/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1100, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1100 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1100 - **State**: PUBLISHED - **Published Date**: April 11, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 03:51 UTC - **Reserved Date**: December 04, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user. ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **zsh - zsh** Affected versions: - through 5.4.2 (Status: affected) ### References 1. [](https://sourceforge.net/p/zsh/code/ci/31f72205630687c1cef89347863aab355296a27f/) 2. [USN-3764-1](https://usn.ubuntu.com/3764-1/) 3. [GLSA-201805-10](https://security.gentoo.org/glsa/201805-10) 4. [RHSA-2018:1932](https://access.redhat.com/errata/RHSA-2018:1932) 5. [](https://bugzilla.redhat.com/show_bug.cgi?id=1563395) 6. [RHSA-2018:3073](https://access.redhat.com/errata/RHSA-2018:3073) 7. [[debian-lts-announce] 20201201 [SECURITY] [DLA 2470-1] zsh security update](https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1471, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1471 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1471 - **State**: PUBLISHED - **Published Date**: February 14, 2024 at 21:39 UTC - **Last Updated**: August 01, 2024 at 18:40 UTC - **Reserved Date**: February 13, 2024 at 16:23 UTC - **Assigned By**: tenable ### Vulnerability Description An HTML injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Repository parameters, which could lead to HTML redirection attacks. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Tenable - Security Center** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.tenable.com/security/tns-2024-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5553, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5553 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5553 - **State**: PUBLISHED - **Published Date**: November 08, 2013 at 02:00 UTC - **Last Updated**: September 16, 2024 at 17:52 UTC - **Reserved Date**: August 22, 2013 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple memory leaks in Cisco IOS 15.1 before 15.1(4)M7 allow remote attackers to cause a denial of service (memory consumption or device reload) by sending a crafted SIP message over (1) IPv4 or (2) IPv6, aka Bug IDs CSCuc42558 and CSCug25383. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20131106 Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131106-sip)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19715, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19715 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19715 - **State**: PUBLISHED - **Published Date**: January 18, 2019 at 17:00 UTC - **Last Updated**: August 05, 2024 at 11:44 UTC - **Reserved Date**: November 29, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [106164](http://www.securityfocus.com/bid/106164) 2. [](https://helpx.adobe.com/security/products/acrobat/apsb18-41.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5120, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5120 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5120 - **State**: PUBLISHED - **Published Date**: October 20, 2023 at 06:35 UTC - **Last Updated**: February 05, 2025 at 19:10 UTC - **Reserved Date**: September 22, 2023 at 14:13 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image file path parameter in versions up to, and including, 0.9.89 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **wpvividplugins - Migration, Backup, Staging – WPvivid** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/320f4260-20c2-4f27-91ba-d2488b417f62?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/tags/0.9.89/includes/upload-cleaner/class-wpvivid-uploads-cleaner.php#L161) ### Credits - Ivan Kuzymchak
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0325, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0325 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0325 - **State**: PUBLISHED - **Published Date**: September 29, 1999 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:34 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description vhe_u_mnt program in HP-UX allows local users to create root files through symlinks. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [HPSBUX9406-013](http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9406-013)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4162, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4162 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4162 - **State**: PUBLISHED - **Published Date**: June 02, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 06:04 UTC - **Reserved Date**: June 02, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description XML external entity (XXE) vulnerability in the management interface in PAN-OS before 5.0.16, 6.x before 6.0.8, and 6.1.x before 6.1.4 allows remote authenticated administrators to obtain sensitive information via crafted XML data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [74941](http://www.securityfocus.com/bid/74941) 2. [](https://security.paloaltonetworks.com/CVE-2015-4162)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25549, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25549 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25549 - **State**: PUBLISHED - **Published Date**: March 09, 2022 at 18:27 UTC - **Last Updated**: August 03, 2024 at 04:42 UTC - **Reserved Date**: February 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow in the function formSetSysToolDDNS. This vulnerability allows attackers to cause a Denial of Service (DoS) via the ddnsEn parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42745, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42745 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42745 - **State**: PUBLISHED - **Published Date**: August 12, 2024 at 00:00 UTC - **Last Updated**: August 13, 2024 at 14:12 UTC - **Reserved Date**: August 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setUPnPCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setUPnPCfg/setUPnPCfg.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27574, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27574 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27574 - **State**: PUBLISHED - **Published Date**: April 11, 2022 at 19:37 UTC - **Last Updated**: August 03, 2024 at 05:32 UTC - **Reserved Date**: March 21, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Improper input validation vulnerability in parser_iloc and sheifd_find_itemIndexin fuctions of libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by privileged attacker. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - Q(10), R(11), S(12) (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9467, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9467 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9467 - **State**: PUBLISHED - **Published Date**: August 02, 2017 at 19:00 UTC - **Last Updated**: August 05, 2024 at 17:11 UTC - **Reserved Date**: June 06, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the GlobalProtect external interface in Palo Alto Networks PAN-OS before 6.1.18, 7.x before 7.0.16, 7.1.x before 7.1.11, and 8.x before 8.0.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [99907](http://www.securityfocus.com/bid/99907) 2. [1038975](http://www.securitytracker.com/id/1038975) 3. [](https://security.paloaltonetworks.com/CVE-2017-9467)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-40778, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-40778 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-40778 - **State**: PUBLISHED - **Published Date**: July 29, 2024 at 22:16 UTC - **Last Updated**: March 17, 2025 at 15:50 UTC - **Reserved Date**: July 10, 2024 at 17:11 UTC - **Assigned By**: apple ### Vulnerability Description An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9. Photos in the Hidden Photos Album may be viewed without authentication. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT214117) 2. [](https://support.apple.com/en-us/HT214116) 3. [](https://support.apple.com/en-us/HT214119) 4. [](http://seclists.org/fulldisclosure/2024/Jul/16) 5. [](http://seclists.org/fulldisclosure/2024/Jul/17) 6. [](http://seclists.org/fulldisclosure/2024/Jul/18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35213, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35213 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35213 - **State**: PUBLISHED - **Published Date**: August 31, 2021 at 15:58 UTC - **Last Updated**: September 16, 2024 at 20:26 UTC - **Reserved Date**: June 22, 2021 at 00:00 UTC - **Assigned By**: SolarWinds ### Vulnerability Description An Improper Access Control Privilege Escalation Vulnerability was discovered in the User Setting of Orion Platform version 2020.2.5. It allows a guest user to elevate privileges to the Administrator using this vulnerability. Authentication is required to exploit the vulnerability. ### CVSS Metrics - **CVSS Base Score**: 8.9/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **SolarWinds - Orion Platform** Affected versions: - 2020.2.5 and previous versions (Status: affected) ### References 1. [](https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm) 2. [](https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/orion_platform_2020-2-6_release_notes.htm) 3. [](https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35213) 4. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1244/) ### Credits - SolarWinds would like to thank Anonymous working with Trend Micro Zero Day Initiative for reporting on the issue in a responsible manner.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0923, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0923 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0923 - **State**: PUBLISHED - **Published Date**: March 29, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:28 UTC - **Reserved Date**: March 29, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The SmartScan feature in the Auto-Protect module for Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (CPU consumption and system crash) by renaming a file on a network share. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html) 2. [1013586](http://securitytracker.com/id?1013586) 3. [VU#713620](http://www.kb.cert.org/vuls/id/713620) 4. [1013587](http://securitytracker.com/id?1013587) 5. [12924](http://www.securityfocus.com/bid/12924) 6. [1013585](http://securitytracker.com/id?1013585) 7. [14741](http://secunia.com/advisories/14741)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43734, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43734 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43734 - **State**: PUBLISHED - **Published Date**: September 30, 2023 at 22:08 UTC - **Last Updated**: September 20, 2024 at 17:23 UTC - **Reserved Date**: September 21, 2023 at 18:57 UTC - **Assigned By**: Fluid Attacks ### Vulnerability Description Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "name" parameter, potentially leading to unauthorized execution of scripts within a user's web browser. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Os Commerce - Os Commerce** Affected versions: - 4.12.56860 (Status: affected) ### References 1. [](https://fluidattacks.com/advisories/bts/) 2. [](https://www.oscommerce.com/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24538, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24538 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24538 - **State**: PUBLISHED - **Published Date**: January 27, 2025 at 14:22 UTC - **Last Updated**: February 12, 2025 at 20:01 UTC - **Reserved Date**: January 23, 2025 at 14:50 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in slaFFik BuddyPress Groups Extras allows Cross Site Request Forgery. This issue affects BuddyPress Groups Extras: from n/a through 3.6.10. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **slaFFik - BuddyPress Groups Extras** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/buddypress-groups-extras/vulnerability/wordpress-buddypress-groups-extras-plugin-3-6-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Marek Mikita (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16537, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16537 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16537 - **State**: PUBLISHED - **Published Date**: November 04, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 20:27 UTC - **Reserved Date**: November 03, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-3617-1](https://usn.ubuntu.com/3617-1/) 2. [USN-3619-2](https://usn.ubuntu.com/3619-2/) 3. [](https://patchwork.kernel.org/patch/9994017/) 4. [](https://groups.google.com/d/msg/syzkaller/bBFN8imrjjo/-5jCl8EiCQAJ) 5. [USN-3617-3](https://usn.ubuntu.com/3617-3/) 6. [[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update](https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html) 7. [USN-3754-1](https://usn.ubuntu.com/3754-1/) 8. [USN-3617-2](https://usn.ubuntu.com/3617-2/) 9. [USN-3619-1](https://usn.ubuntu.com/3619-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42826, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42826 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42826 - **State**: PUBLISHED - **Published Date**: January 10, 2024 at 22:03 UTC - **Last Updated**: August 02, 2024 at 19:30 UTC - **Reserved Date**: September 14, 2023 at 19:05 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing a file may lead to arbitrary code execution. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213940)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1631, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1631 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1631 - **State**: PUBLISHED - **Published Date**: May 17, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:59 UTC - **Reserved Date**: May 17, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description booby.php in Booby 1.0.0 and earlier allows remote attackers to view private bookmarks by guessing item IDs. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [15305](http://secunia.com/advisories/15305) 2. [](http://sourceforge.net/project/shownotes.php?release_id=326826) 3. [13623](http://www.securityfocus.com/bid/13623) 4. [booby-bookmarks-information-disclosure(20605)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20605)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23256, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23256 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23256 - **State**: PUBLISHED - **Published Date**: March 05, 2024 at 19:24 UTC - **Last Updated**: February 13, 2025 at 17:34 UTC - **Reserved Date**: January 12, 2024 at 22:22 UTC - **Assigned By**: apple ### Vulnerability Description A logic issue was addressed with improved state management. This issue is fixed in iOS 17.4 and iPadOS 17.4. A user's locked tabs may be briefly visible while switching tab groups when Locked Private Browsing is enabled. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT214081) 2. [](http://seclists.org/fulldisclosure/2024/Mar/18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8083, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8083 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8083 - **State**: PUBLISHED - **Published Date**: August 22, 2024 at 22:00 UTC - **Last Updated**: August 23, 2024 at 14:14 UTC - **Reserved Date**: August 22, 2024 at 12:38 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this issue is some unknown functionality of the file /php-ocls/classes/Master.php?f=pay_order. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Online Computer and Laptop Store** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-275564 | SourceCodester Online Computer and Laptop Store Master.php sql injection](https://vuldb.com/?id.275564) 2. [VDB-275564 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275564) 3. [Submit #396315 | ocls 1.0 SQL Injection](https://vuldb.com/?submit.396315) 4. [](https://github.com/0xffaaa/cve/blob/main/php-ocls-Arbitrary%20Sqli.md) 5. [](https://www.sourcecodester.com/) ### Credits - fany (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3201, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3201 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3201 - **State**: PUBLISHED - **Published Date**: January 07, 2011 at 22:00 UTC - **Last Updated**: August 07, 2024 at 03:03 UTC - **Reserved Date**: August 31, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in NetWin Surgemail before 4.3g allows remote attackers to inject arbitrary web script or HTML via the username_ex parameter to the surgeweb program. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [34797](https://www.exploit-db.com/exploits/34797/) 2. [20101004 NetWin Surgemail XSS vulnerability](http://www.securityfocus.com/archive/1/514115/100/0/threaded) 3. [](http://ictsec.se/?p=108) 4. [43679](http://www.securityfocus.com/bid/43679) 5. [41685](http://secunia.com/advisories/41685)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18807, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18807 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18807 - **State**: PUBLISHED - **Published Date**: November 26, 2018 at 20:00 UTC - **Last Updated**: September 16, 2024 at 19:51 UTC - **Reserved Date**: October 29, 2018 at 00:00 UTC - **Assigned By**: tibco ### Vulnerability Description The web application of the TIBCO Statistica component of TIBCO Software Inc.'s TIBCO Statistica Server contains vulnerabilities which may allow an authenticated user to perform cross-site scripting (XSS) attacks. Affected releases are TIBCO Software Inc.'s TIBCO Statistica Server versions up to and including 13.4.0. ### Affected Products **TIBCO Software Inc. - TIBCO Statistica Server** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-26-2018-tibco-statistica-server) 2. [](http://www.tibco.com/services/support/advisories) 3. [106021](http://www.securityfocus.com/bid/106021)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3499, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3499 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3499 - **State**: PUBLISHED - **Published Date**: September 16, 2011 at 17:00 UTC - **Last Updated**: August 06, 2024 at 23:37 UTC - **Reserved Date**: September 16, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Progea Movicon / PowerHMI 11.2.1085 and earlier allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via an EIDP packet with a large size field, which writes a zero byte to an arbitrary memory location. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://aluigi.altervista.org/adv/movicon_3-adv.txt) 2. [movicon-eidp-dos(69789)](https://exchange.xforce.ibmcloud.com/vulnerabilities/69789) 3. [](http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-01.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22227, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22227 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22227 - **State**: PUBLISHED - **Published Date**: February 17, 2023 at 00:00 UTC - **Last Updated**: March 05, 2025 at 19:26 UTC - **Reserved Date**: December 19, 2022 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Adobe - Bridge** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/bridge/apsb23-09.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24593, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24593 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24593 - **State**: PUBLISHED - **Published Date**: February 06, 2024 at 14:41 UTC - **Last Updated**: August 01, 2024 at 23:28 UTC - **Reserved Date**: January 25, 2024 at 22:42 UTC - **Assigned By**: HiddenLayer ### Vulnerability Description A cross-site request forgery (CSRF) vulnerability in all versions up to 1.14.1 of the api server component of Allegro AI’s ClearML platform allows a remote attacker to impersonate a user by sending API requests via maliciously crafted html. Exploitation of the vulnerability allows an attacker to compromise confidential workspaces and files, leak sensitive information, and target instances of the ClearML platform within closed off networks. ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Allegro.AI - ClearML** Affected versions: - 0 (Status: affected) ### References 1. [](https://hiddenlayer.com/research/not-so-clear-how-mlops-solutions-can-muddy-the-waters-of-your-supply-chain/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43857, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43857 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43857 - **State**: PUBLISHED - **Published Date**: August 17, 2024 at 09:24 UTC - **Last Updated**: May 04, 2025 at 09:27 UTC - **Reserved Date**: August 17, 2024 at 09:11 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: f2fs: fix null reference error when checking end of zone This patch fixes a potentially null pointer being accessed by is_end_zone_blkaddr() that checks the last block of a zone when f2fs is mounted as a single device. ### Affected Products **Linux - Linux** Affected versions: - e067dc3c6b9c419bac43c6a0be2d85f44681f863 (Status: affected) - e067dc3c6b9c419bac43c6a0be2d85f44681f863 (Status: affected) - e067dc3c6b9c419bac43c6a0be2d85f44681f863 (Status: affected) **Linux - Linux** Affected versions: - 6.5 (Status: affected) - 0 (Status: unaffected) - 6.6.64 (Status: unaffected) - 6.10.3 (Status: unaffected) - 6.11 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/b98777309756ebe15cc9ad4e8ab64bbfaf878a3f) 2. [](https://git.kernel.org/stable/c/381cbe85592c78fbaeb3e770e3e9f3bfa3e67efb) 3. [](https://git.kernel.org/stable/c/c82bc1ab2a8a5e73d9728e80c4c2ed87e8921a38)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0988, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0988 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0988 - **State**: PUBLISHED - **Published Date**: October 03, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 04:26 UTC - **Reserved Date**: January 10, 2015 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Omron CX-One CX-Programmer before 9.6 uses a reversible format for password storage in project source-code files, which makes it easier for local users to obtain sensitive information by reading a file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-274-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21600, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21600 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21600 - **State**: PUBLISHED - **Published Date**: August 10, 2021 at 19:05 UTC - **Last Updated**: September 16, 2024 at 21:56 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell EMC NetWorker, 19.4 or older, contain an uncontrolled resource consumption flaw in its API service. An authorized API user could potentially exploit this vulnerability via the web and desktop user interfaces, leading to denial of service in the manageability path. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-772: Security Weakness ### Affected Products **Dell - NetWorker** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/000189694)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4591, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4591 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4591 - **State**: PUBLISHED - **Published Date**: November 19, 2013 at 15:00 UTC - **Last Updated**: August 06, 2024 at 16:45 UTC - **Reserved Date**: June 12, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname on an NFSv4 filesystem. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [63791](http://www.securityfocus.com/bid/63791) 2. [[oss-security] 20131118 CVE-2013-4591 -- Linux kernel: kernel: nfs: missing check for buffer length in __nfs4_get_acl_uncached](http://www.openwall.com/lists/oss-security/2013/11/18/2) 3. [RHSA-2013:1645](http://rhn.redhat.com/errata/RHSA-2013-1645.html) 4. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7d3e91a89b7adbc2831334def9e494dd9892f9af) 5. [](https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af) 6. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2) 7. [](https://bugzilla.redhat.com/show_bug.cgi?id=1031678) 8. [RHSA-2014:0284](http://rhn.redhat.com/errata/RHSA-2014-0284.html)