System stringclasses 1
value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43265
- **State**: PUBLISHED
- **Published Date**: November 15, 2022 at 00:00 UTC
- **Last Updated**: April 30, 2025 at 14:15 UTC
- **Reserved Date**: October 17, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload vulnerability in the component /pages/save_user.php of Canteen Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sourcecodester.com/php/15688/canteen-management-system-project-source-code-php.html)
2. [](https://10degres.net/cves/cve-2022-43265/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35742
- **State**: PUBLISHED
- **Published Date**: December 31, 2020 at 07:45 UTC
- **Last Updated**: September 16, 2024 at 18:03 UTC
- **Reserved Date**: December 28, 2020 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
HGiga MailSherlock contains a vulnerability of SQL Injection. Attackers can inject and launch SQL commands in a URL parameter.
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**HGiga - MailSherlock MSR45/SSR45**
Affected versions:
- unspecified (Status: affected)
**HGiga - MailSherlock MSR45/SSR45**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-4261-d5379-1.html)
### Credits
- Robin Tung, Dio Lin of CHT Security Co., Ltd. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8008
- **State**: PUBLISHED
- **Published Date**: June 05, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 16:38 UTC
- **Reserved Date**: March 09, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.
### Affected Products
**Apache Software Foundation - Apache Storm**
Affected versions:
- Apache Storm 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier (Status: affected)
### References
1. [](https://lists.apache.org/thread.html/613b2fca8bcd0a3b12c0b763ea8f7cf62e422e9f79fce6cfa5b08a58%40%3Cdev.storm.apache.org%3E)
2. [104418](http://www.securityfocus.com/bid/104418) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8579
- **State**: PUBLISHED
- **Published Date**: September 08, 2024 at 19:31 UTC
- **Last Updated**: September 09, 2024 at 13:45 UTC
- **Reserved Date**: September 07, 2024 at 17:16 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This affects the function setWiFiRepeaterCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**TOTOLINK - AC1200 T8**
Affected versions:
- 4.1.5cu.861_B20230220 (Status: affected)
### References
1. [VDB-276813 | TOTOLINK AC1200 T8 cstecgi.cgi setWiFiRepeaterCfg buffer overflow](https://vuldb.com/?id.276813)
2. [VDB-276813 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.276813)
3. [Submit #401292 | TOTOLINK AC1200 T8 V4.1.5cu.861_B20230220 Buffer Overflow](https://vuldb.com/?submit.401292)
4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setWiFiRepeaterCfg.md)
5. [](https://www.totolink.net/)
### Credits
- yhryhryhr_tu (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21859
- **State**: PUBLISHED
- **Published Date**: January 11, 2022 at 20:22 UTC
- **Last Updated**: January 02, 2025 at 18:22 UTC
- **Reserved Date**: December 14, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Accounts Control Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Accounts Control Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21859) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21791
- **State**: PUBLISHED
- **Published Date**: May 22, 2024 at 18:05 UTC
- **Last Updated**: August 01, 2024 at 22:27 UTC
- **Reserved Date**: January 11, 2024 at 12:44 UTC
- **Assigned By**: ManageEngine
### Vulnerability Description
Zoho ManageEngine ADAudit Plus versions below 7271 allows SQL Injection in lockout history option.
Note: Non-admin users cannot exploit this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**ManageEngine - ADAudit Plus**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27025
- **State**: PUBLISHED
- **Published Date**: April 02, 2023 at 00:00 UTC
- **Last Updated**: February 18, 2025 at 15:59 UTC
- **Reserved Date**: February 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file download vulnerability in the background management module of RuoYi v4.7.6 and below allows attackers to download arbitrary files in the server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitee.com/y_project/RuoYi/issues/I697Q5)
2. [](https://gitee.com/y_project/RuoYi/commit/432d5ce1be2e9384a6230d7ccd8401eef5ce02b0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1360, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1360
- **State**: PUBLISHED
- **Published Date**: January 27, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 04:40 UTC
- **Reserved Date**: January 26, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Skia, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted data that is improperly handled during text drawing, related to gpu/GrBitmapTextContext.cpp and gpu/GrDistanceFieldTextContext.cpp, a different vulnerability than CVE-2015-1205.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://codereview.chromium.org/636233008)
2. [](http://googlechromereleases.blogspot.com/2015/01/stable-update.html)
3. [GLSA-201502-13](http://security.gentoo.org/glsa/glsa-201502-13.xml)
4. [](https://code.google.com/p/chromium/issues/detail?id=416289)
5. [](https://code.google.com/p/chromium/issues/detail?id=449894) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0322
- **State**: PUBLISHED
- **Published Date**: March 15, 2023 at 11:15 UTC
- **Last Updated**: February 27, 2025 at 14:17 UTC
- **Reserved Date**: January 16, 2023 at 13:03 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Talent Software UNIS allows Reflected XSS.This issue affects UNIS: before 28376.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Talent Software - UNIS**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-23-0147)
### Credits
- Bugra TURKOGLU |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4200, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4200 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4200
- **State**: PUBLISHED
- **Published Date**: August 28, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 11:04 UTC
- **Reserved Date**: June 17, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, uses 0644 permissions for the vm-support archive, which allows local users to obtain sensitive information by extracting files from this archive.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [69410](http://www.securityfocus.com/bid/69410)
2. [20140826 VMware vm-support multiple vulnerabilities](http://seclists.org/fulldisclosure/2014/Aug/71)
3. [vmware-support-cve20144200-info-disc(95494)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95494)
4. [1030758](http://www.securitytracker.com/id/1030758) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20883, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20883 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20883
- **State**: PUBLISHED
- **Published Date**: June 04, 2024 at 06:42 UTC
- **Last Updated**: August 01, 2024 at 22:06 UTC
- **Reserved Date**: December 05, 2023 at 04:57 UTC
- **Assigned By**: SamsungMobile
### Vulnerability Description
Incorrect use of privileged API vulnerability in registerBatteryStatsCallback in BatteryStatsService prior to SMR Jun-2024 Release 1 allows local attackers to use privileged API.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR Jun-2024 Release in Android 14 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11327, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11327 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11327
- **State**: PUBLISHED
- **Published Date**: January 11, 2025 at 02:20 UTC
- **Last Updated**: January 13, 2025 at 19:53 UTC
- **Reserved Date**: November 18, 2024 at 15:11 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The ClickWhale – Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.4.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**flowdee - ClickWhale – Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/96c5836f-6d33-4a56-b30b-5e5d95b81b6b?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/clickwhale/tags/2.3.0/includes/admin/links/Clickwhale_Links_List_Table.php#L384)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3219341%40clickwhale&new=3219341%40clickwhale&sfp_email=&sfph_mail=)
### Credits
- Dale Mavers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47547
- **State**: PUBLISHED
- **Published Date**: December 06, 2024 at 18:00 UTC
- **Last Updated**: December 06, 2024 at 20:41 UTC
- **Reserved Date**: November 20, 2024 at 23:41 UTC
- **Assigned By**: icscert
### Vulnerability Description
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x contains a weak mechanism for its users to change their passwords which leaves authentication vulnerable to brute force attacks.
### CVSS Metrics
- **CVSS Base Score**: 9.4/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-640: Security Weakness
### Affected Products
**Ruijie - Reyee OS**
Affected versions:
- 2.206.x (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01)
### Credits
- Tomer Goldschmidt and Noam Moshe of Claroty Team82 reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4498, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4498 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4498
- **State**: PUBLISHED
- **Published Date**: August 29, 2015 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 10, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-3345](http://www.debian.org/security/2015/dsa-3345)
2. [SUSE-SU-2015:2081](http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html)
3. [USN-2723-1](http://www.ubuntu.com/usn/USN-2723-1)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1042699)
5. [76505](http://www.securityfocus.com/bid/76505)
6. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
7. [SUSE-SU-2015:1504](http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00013.html)
8. [1033396](http://www.securitytracker.com/id/1033396)
9. [openSUSE-SU-2015:1492](http://lists.opensuse.org/opensuse-updates/2015-09/msg00000.html)
10. [RHSA-2015:1693](http://rhn.redhat.com/errata/RHSA-2015-1693.html)
11. [](http://www.mozilla.org/security/announce/2015/mfsa2015-95.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8747
- **State**: PUBLISHED
- **Published Date**: November 12, 2020 at 18:09 UTC
- **Last Updated**: August 04, 2024 at 10:12 UTC
- **Reserved Date**: February 06, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
### Affected Products
**n/a - Intel(R) AMT**
Affected versions:
- versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391)
2. [](https://security.netapp.com/advisory/ntap-20201113-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22776
- **State**: PUBLISHED
- **Published Date**: May 18, 2022 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 19:05 UTC
- **Reserved Date**: January 07, 2022 at 00:00 UTC
- **Assigned By**: tibco
### Vulnerability Description
The Web Server component of TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management contains easily exploitable vulnerabilities that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using these vulnerabilities requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management: versions 6.1.0 and below.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Affected Products
**TIBCO Software Inc. - TIBCO BusinessConnect Trading Community Management**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.tibco.com/services/support/advisories)
2. [](https://www.tibco.com/support/advisories/2022/05/tibco-security-advisory-may-18-2022-tibco-bctcm-cve-2022-22776) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2587
- **State**: PUBLISHED
- **Published Date**: August 12, 2022 at 19:35 UTC
- **Last Updated**: August 03, 2024 at 00:39 UTC
- **Reserved Date**: July 29, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Out of bounds write in Chrome OS Audio Server in Google Chrome on Chrome OS prior to 102.0.5005.125 allowed a remote attacker to potentially exploit heap corruption via crafted audio metadata.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://crbug.com/1320917)
2. [](https://chromereleases.googleblog.com/2022/06/stable-channel-update-for-chromeos.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13735, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13735
- **State**: PUBLISHED
- **Published Date**: August 29, 2017 at 06:00 UTC
- **Last Updated**: September 16, 2024 at 23:42 UTC
- **Reserved Date**: August 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a floating point exception in the kodak_radc_load_raw function in dcraw_common.cpp in LibRaw 0.18.2. It will lead to a remote denial of service attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1483988) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46536
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 00:00 UTC
- **Last Updated**: September 11, 2024 at 15:24 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function chkRegVeriRegister.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165)
2. [](https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/5/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47446
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 14:19 UTC
- **Last Updated**: May 07, 2025 at 18:23 UTC
- **Reserved Date**: May 07, 2025 at 09:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in listamester Listamester allows Cross Site Request Forgery. This issue affects Listamester: from n/a through 2.3.6.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**listamester - Listamester**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/listamester/vulnerability/wordpress-listamester-2-3-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Nabil Irawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4194, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4194 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4194
- **State**: PUBLISHED
- **Published Date**: February 10, 2011 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: November 05, 2010 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [46335](http://www.securityfocus.com/bid/46335)
2. [VU#189929](http://www.kb.cert.org/vuls/id/189929)
3. [ADV-2011-0335](http://www.vupen.com/english/advisories/2011/0335)
4. [](http://www.adobe.com/support/security/bulletins/apsb11-01.html)
5. [1025056](http://www.securitytracker.com/id?1025056) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34951, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34951 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34951
- **State**: PUBLISHED
- **Published Date**: May 07, 2024 at 22:54 UTC
- **Last Updated**: August 04, 2024 at 00:26 UTC
- **Reserved Date**: June 17, 2021 at 19:27 UTC
- **Assigned By**: zdi
### Vulnerability Description
Foxit PDF Reader Annotation Use of Uninitialized Variable Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14395.
### Weakness Classification (CWE)
- CWE-457: Security Weakness
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 11.0.0.49893 (Status: affected)
### References
1. [ZDI-21-1182](https://www.zerodayinitiative.com/advisories/ZDI-21-1182/)
2. [vendor-provided URL](https://www.foxit.com/support/security-bulletins.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4599, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4599
- **State**: PUBLISHED
- **Published Date**: January 01, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 23:53 UTC
- **Reserved Date**: January 01, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in tiny_mce_gzip.php in TinyMCE Compressor PHP before 1.06 allows remote attackers to inject arbitrary web script or HTML via the index parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tinymce.moxiecode.com/punbb/viewtopic.php?id=2233)
2. [tinymce-compressor-xss(23906)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23906)
3. [22117](http://www.osvdb.org/22117)
4. [](http://tinymce.moxiecode.com/punbb/viewtopic.php?id=2244)
5. [18262](http://secunia.com/advisories/18262)
6. [](http://www.hardened-php.net/advisory_262005.111.html)
7. [20051229 Advisory 26/2005: TinyMCE Compressor Vulnerabilities](http://www.securityfocus.com/archive/1/420543/100/0/threaded)
8. [16083](http://www.securityfocus.com/bid/16083)
9. [1015424](http://securitytracker.com/id?1015424) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1261, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1261 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1261
- **State**: PUBLISHED
- **Published Date**: May 11, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:44 UTC
- **Reserved Date**: April 25, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Stack-based buffer overflow in the URL parsing function in Gaim before 1.3.0 allows remote attackers to execute arbitrary code via an instant message (IM) with a large URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [13590](http://www.securityfocus.com/bid/13590)
2. [FLSA:158543](http://www.securityfocus.com/archive/1/426078/100/0/threaded)
3. [ADV-2005-0519](http://www.vupen.com/english/advisories/2005/0519)
4. [](http://gaim.sourceforge.net/security/index.php?id=16)
5. [RHSA-2005:429](http://www.redhat.com/support/errata/RHSA-2005-429.html)
6. [oval:org.mitre.oval:def:10725](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10725)
7. [RHSA-2005:432](http://www.redhat.com/support/errata/RHSA-2005-432.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23606, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23606
- **State**: PUBLISHED
- **Published Date**: February 20, 2024 at 15:29 UTC
- **Last Updated**: February 13, 2025 at 17:39 UTC
- **Reserved Date**: January 23, 2024 at 19:54 UTC
- **Assigned By**: talos
### Vulnerability Description
An out-of-bounds write vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-131: Security Weakness
### Affected Products
**The Biosig Project - libbiosig**
Affected versions:
- 2.5.0 (Status: affected)
- Master Branch (ab0ee111) (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-1925](https://talosintelligence.com/vulnerability_reports/TALOS-2024-1925)
2. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/)
### Credits
- Discovered by Lilith >_> of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3651, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3651
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: September 28, 2010 at 00:00 UTC
- **Assigned By**: airbus
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29660
- **State**: PUBLISHED
- **Published Date**: April 02, 2021 at 18:42 UTC
- **Last Updated**: August 03, 2024 at 22:11 UTC
- **Reserved Date**: March 31, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Cross-Site Request Forgery (CSRF) vulnerability in en/cfg_setpwd.html in Softing AG OPC Toolbox through 4.10.1.13035 allows attackers to reset the administrative password by inducing the Administrator user to browse a URL controlled by an attacker.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.gruppotim.it/redteam) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22677
- **State**: PUBLISHED
- **Published Date**: December 29, 2023 at 08:50 UTC
- **Last Updated**: August 02, 2024 at 10:13 UTC
- **Reserved Date**: January 06, 2023 at 12:02 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Generation of Code ('Code Injection') vulnerability in BinaryStash WP Booklet.This issue affects WP Booklet: from n/a through 2.1.8.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**BinaryStash - WP Booklet**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-booklet/wordpress-wp-booklet-plugin-2-1-8-remote-code-execution-rce?_s_id=cve)
### Credits
- Le Ngoc Anh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1452, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1452 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1452
- **State**: PUBLISHED
- **Published Date**: January 21, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 09:42 UTC
- **Reserved Date**: January 14, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in lib/snmpagent.c in bsnmpd, as used in FreeBSD 8.3 through 10.0, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted GETBULK PDU request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [64967](http://www.securityfocus.com/bid/64967)
2. [FreeBSD-SA-14:01](http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc)
3. [](http://svnweb.freebsd.org/base?view=revision&%3Brevision=260636)
4. [56496](http://secunia.com/advisories/56496)
5. [1029616](http://www.securitytracker.com/id/1029616) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28972, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28972
- **State**: PUBLISHED
- **Published Date**: March 22, 2021 at 16:53 UTC
- **Last Updated**: August 03, 2024 at 21:55 UTC
- **Reserved Date**: March 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination, aka CID-cc7a0bb058b8.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678)
2. [FEDORA-2021-e636ce53df](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/)
3. [FEDORA-2021-68b0dd2373](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/)
4. [FEDORA-2021-9503fffad9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/)
5. [](https://security.netapp.com/advisory/ntap-20210430-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5570, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5570
- **State**: PUBLISHED
- **Published Date**: October 27, 2023 at 11:53 UTC
- **Last Updated**: September 09, 2024 at 15:14 UTC
- **Reserved Date**: October 13, 2023 at 08:09 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Inohom Home Manager Gateway allows Account Footprinting.This issue affects Home Manager Gateway: before v.1.27.12.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-1320: Security Weakness
### Affected Products
**Inohom - Home Manager Gateway**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-23-0609)
### Credits
- Alican OZDEMIR |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0775
- **State**: PUBLISHED
- **Published Date**: January 18, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:48 UTC
- **Reserved Date**: November 25, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the "established" keyword in an access list.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0775) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4532
- **State**: PUBLISHED
- **Published Date**: August 20, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 11, 2015 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
EMC Documentum Content Server before 6.7SP1 P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P02 does not properly check authorization and does not properly restrict object types, which allows remote authenticated users to run save RPC commands with super-user privileges, and consequently execute arbitrary code, via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2514.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150817 ESA-2015-131: EMC Documentum Content Server Multiple Vulnerabilities](http://seclists.org/bugtraq/2015/Aug/86)
2. [76414](http://www.securityfocus.com/bid/76414) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0410
- **State**: PUBLISHED
- **Published Date**: March 07, 2022 at 08:16 UTC
- **Last Updated**: August 02, 2024 at 23:25 UTC
- **Reserved Date**: January 29, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 5.6 does not sanitise and escape the id parameter before using it in a SQL statement via the refUrlDetails AJAX action, available to any authenticated user, leading to a SQL injection
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Unknown - WP Visitor Statistics (Real Time Traffic)**
Affected versions:
- 5.6 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/0d6b89f5-cf12-4ad4-831b-fed26763ba20)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20929, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20929 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20929
- **State**: PUBLISHED
- **Published Date**: February 17, 2024 at 01:50 UTC
- **Last Updated**: March 13, 2025 at 19:45 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: DB Privileges). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data as well as unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**Oracle Corporation - Application Object Library**
Affected versions:
- 12.2.3 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41359, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41359
- **State**: PUBLISHED
- **Published Date**: August 29, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 19:01 UTC
- **Reserved Date**: August 29, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in FRRouting FRR through 9.0. There is an out-of-bounds read in bgp_attr_aigp_valid in bgpd/bgp_attr.c because there is no check for the availability of two bytes during AIGP validation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FRRouting/frr/pull/14232)
2. [FEDORA-2023-514db5339e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/)
3. [FEDORA-2023-ce436d56f8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/)
4. [FEDORA-2023-61abba57d8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19345
- **State**: PUBLISHED
- **Published Date**: November 17, 2018 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 02:31 UTC
- **Reserved Date**: November 17, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Read Access Violation near NULL starting at U3DBrowser!PlugInMain+0x0000000000053f8b" issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Yan-1-20/Yan-1-20.github.io/blob/master/2018/11/10/2018/11/2018-11-10/index.html)
2. [](https://yan-1-20.github.io/2018/11/10/2018/11/2018-11-10/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2943, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2943 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2943
- **State**: PUBLISHED
- **Published Date**: September 30, 2010 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 02:55 UTC
- **Reserved Date**: August 04, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The xfs implementation in the Linux kernel before 2.6.35 does not look up inode allocation btrees before reading inode buffers, which allows remote authenticated users to read unlinked files, or read or overwrite disk blocks that are currently assigned to an active file but were previously assigned to an unlinked file, by accessing a stale NFS filehandle.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[linux-xfs] 20100620 [PATCH 2/4] xfs: validate untrusted inode numbers during lookup](http://article.gmane.org/gmane.comp.file-systems.xfs.general/33771)
2. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7124fe0a5b619d65b739477b3b55a20bf805b06d)
3. [42527](http://www.securityfocus.com/bid/42527)
4. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7b6259e7a83647948fa33a736cc832310c8d85aa)
5. [RHSA-2010:0723](http://www.redhat.com/support/errata/RHSA-2010-0723.html)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=624923)
7. [20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console](http://www.securityfocus.com/archive/1/520102/100/0/threaded)
8. [[linux-xfs] 20100620 [PATCH 3/4] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED](http://article.gmane.org/gmane.comp.file-systems.xfs.general/33768)
9. [46397](http://secunia.com/advisories/46397)
10. [[linux-xfs] 20100620 [PATCH 4/4] xfs: remove block number from inode lookup code](http://article.gmane.org/gmane.comp.file-systems.xfs.general/33769)
11. [[oss-security] 20100818 CVE request - kernel: xfs: stale data exposure](http://www.openwall.com/lists/oss-security/2010/08/18/2)
12. [[linux-xfs] 20100620 [PATCH 0/4, V2] xfs: validate inode numbers in file handles correctly](http://article.gmane.org/gmane.comp.file-systems.xfs.general/33767)
13. [[xfs] 20100617 [PATCH] xfsqa: test open_by_handle() on unlinked and freed inode clusters V2](http://oss.sgi.com/archives/xfs/2010-06/msg00191.html)
14. [USN-1041-1](http://www.ubuntu.com/usn/USN-1041-1)
15. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35)
16. [[xfs] 20100618 Re: [PATCH] xfsqa: test open_by_handle() on unlinked and freed inode clusters V2](http://oss.sgi.com/archives/xfs/2010-06/msg00198.html)
17. [ADV-2011-0280](http://www.vupen.com/english/advisories/2011/0280)
18. [](http://www.vmware.com/security/advisories/VMSA-2011-0012.html)
19. [42758](http://secunia.com/advisories/42758)
20. [](http://support.avaya.com/css/P8/documents/100113326)
21. [USN-1057-1](http://www.ubuntu.com/usn/USN-1057-1)
22. [[oss-security] 20100819 Re: CVE request - kernel: xfs: stale data exposure](http://www.openwall.com/lists/oss-security/2010/08/19/5)
23. [ADV-2011-0070](http://www.vupen.com/english/advisories/2011/0070)
24. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1920779e67cbf5ea8afef317777c5bf2b8096188)
25. [43161](http://secunia.com/advisories/43161) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42315, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42315
- **State**: PUBLISHED
- **Published Date**: August 17, 2024 at 09:09 UTC
- **Last Updated**: May 04, 2025 at 09:26 UTC
- **Reserved Date**: July 30, 2024 at 07:40 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
exfat: fix potential deadlock on __exfat_get_dentry_set
When accessing a file with more entries than ES_MAX_ENTRY_NUM, the bh-array
is allocated in __exfat_get_entry_set. The problem is that the bh-array is
allocated with GFP_KERNEL. It does not make sense. In the following cases,
a deadlock for sbi->s_lock between the two processes may occur.
CPU0 CPU1
---- ----
kswapd
balance_pgdat
lock(fs_reclaim)
exfat_iterate
lock(&sbi->s_lock)
exfat_readdir
exfat_get_uniname_from_ext_entry
exfat_get_dentry_set
__exfat_get_dentry_set
kmalloc_array
...
lock(fs_reclaim)
...
evict
exfat_evict_inode
lock(&sbi->s_lock)
To fix this, let's allocate bh-array with GFP_NOFS.
### Affected Products
**Linux - Linux**
Affected versions:
- bd3bdb9e0d656f760b11d0c638d35d7f7068144d (Status: affected)
- 92dcd7d6c6068bf4fd35a6f64d606e27d634807e (Status: affected)
- d8fe01ad2d8ab33aaf8f2efad9e8f1dae11c4b0c (Status: affected)
- a3ff29a95fde16906304455aa8c0bd84eb770258 (Status: affected)
- a3ff29a95fde16906304455aa8c0bd84eb770258 (Status: affected)
- a3ff29a95fde16906304455aa8c0bd84eb770258 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.2 (Status: affected)
- 0 (Status: unaffected)
- 5.10.232 (Status: unaffected)
- 5.15.175 (Status: unaffected)
- 6.6.44 (Status: unaffected)
- 6.10.3 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/632fb232b6bbf8277edcbe9ecd4b4d98ecb122eb)
2. [](https://git.kernel.org/stable/c/c052f775ee6ccacd3c97e4cf41a2a657e63d4259)
3. [](https://git.kernel.org/stable/c/cd1c7858641384191ff7033fb1fc65dfcd559c6f)
4. [](https://git.kernel.org/stable/c/a7ac198f8dba791e3144c4da48a5a9b95773ee4b)
5. [](https://git.kernel.org/stable/c/1d1970493c289e3f44b9ec847ed26a5dbdf56a62)
6. [](https://git.kernel.org/stable/c/89fc548767a2155231128cb98726d6d2ea1256c9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39191
- **State**: PUBLISHED
- **Published Date**: October 04, 2023 at 18:03 UTC
- **Last Updated**: February 27, 2025 at 20:46 UTC
- **Reserved Date**: July 25, 2023 at 16:01 UTC
- **Assigned By**: redhat
### Vulnerability Description
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:5.14.0-362.8.1.el9_3 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:5.14.0-362.8.1.el9_3 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
Affected versions:
- 0:5.14.0-284.48.1.el9_2 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
Affected versions:
- 0:5.14.0-284.48.1.rt14.333.el9_2 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 9**
### References
1. [RHSA-2023:6583](https://access.redhat.com/errata/RHSA-2023:6583)
2. [RHSA-2024:0381](https://access.redhat.com/errata/RHSA-2024:0381)
3. [RHSA-2024:0439](https://access.redhat.com/errata/RHSA-2024:0439)
4. [RHSA-2024:0448](https://access.redhat.com/errata/RHSA-2024:0448)
5. [](https://access.redhat.com/security/cve/CVE-2023-39191)
6. [RHBZ#2226783](https://bugzilla.redhat.com/show_bug.cgi?id=2226783)
7. [](https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/)
### Credits
- Red Hat would like to thank Zero Day Initiative (ZDI) for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0288, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0288
- **State**: PUBLISHED
- **Published Date**: January 13, 2023 at 00:00 UTC
- **Last Updated**: April 07, 2025 at 15:36 UTC
- **Reserved Date**: January 13, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1189.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**vim - vim/vim**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/550a0852-9be0-4abe-906c-f803b34e41d3)
2. [](https://github.com/vim/vim/commit/232bdaaca98c34a99ffadf27bf6ee08be6cc8f6a)
3. [FEDORA-2023-340f1d6ab9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYC22GGZ6QA66HLNLHCTAJU265TT3O33/)
4. [](https://support.apple.com/kb/HT213670)
5. [20230327 APPLE-SA-2023-03-27-3 macOS Ventura 13.3](http://seclists.org/fulldisclosure/2023/Mar/17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9037, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9037
- **State**: PUBLISHED
- **Published Date**: May 25, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 16:55 UTC
- **Reserved Date**: May 17, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T117117, (9) T118, (10) T_action_fail, (11) T_ptn_update, (12) textarea, (13) textfield5, or (14) tmLastConfigFileModifiedDate parameter to notification.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1038548](http://www.securitytracker.com/id/1038548)
2. [](https://success.trendmicro.com/solution/1117411)
3. [](https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities)
4. [20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities](http://seclists.org/fulldisclosure/2017/May/91)
5. [](http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40328
- **State**: PUBLISHED
- **Published Date**: July 10, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:33 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/memberOnline_deal.php?mudi=del&dataType=&dataID=6
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Tank992/cms/blob/main/70/csrf.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35643, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35643
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 10:51 UTC
- **Last Updated**: September 25, 2024 at 19:21 UTC
- **Reserved Date**: June 28, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.26 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
2. [](https://security.netapp.com/advisory/ntap-20211022-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21690, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21690
- **State**: PUBLISHED
- **Published Date**: February 10, 2025 at 15:58 UTC
- **Last Updated**: May 04, 2025 at 07:19 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
If there's a persistent error in the hypervisor, the SCSI warning for
failed I/O can flood the kernel log and max out CPU utilization,
preventing troubleshooting from the VM side. Ratelimit the warning so
it doesn't DoS the VM.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15.178 (Status: unaffected)
- 6.1.128 (Status: unaffected)
- 6.6.75 (Status: unaffected)
- 6.12.12 (Status: unaffected)
- 6.13.1 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/81d4dd05c412ba04f9f6b85b718e6da833be290c)
2. [](https://git.kernel.org/stable/c/182a4b7c731e95c08cb47f14b87a272b6ab2b2da)
3. [](https://git.kernel.org/stable/c/088bde862f8d3d0fc52e40e66a0484a246837087)
4. [](https://git.kernel.org/stable/c/01d1ebdab9ccb73c952e1666a8a80abd194dbc55)
5. [](https://git.kernel.org/stable/c/d0f0af1bafef33b3e2aa8c3a4ef44db48df9b0ea)
6. [](https://git.kernel.org/stable/c/d2138eab8cde61e0e6f62d0713e45202e8457d6d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27124
- **State**: PUBLISHED
- **Published Date**: April 05, 2022 at 19:03 UTC
- **Last Updated**: August 03, 2024 at 05:18 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Insurance Management System 1.0 was discovered to contain a SQL injection vulnerability via the username parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/itsourcecode.com/Insurance-Management-System) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16167
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 16:33 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
yyooopack is a simple file server. yyooopack is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**HackerOne - yyooopack node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/400)
2. [](https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yyooopack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22914, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22914
- **State**: PUBLISHED
- **Published Date**: January 19, 2024 at 00:00 UTC
- **Last Updated**: September 12, 2024 at 17:43 UTC
- **Reserved Date**: January 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A heap-use-after-free was found in SWFTools v0.9.2, in the function input at lex.swf5.c:2620. It allows an attacker to cause denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/matthiaskramm/swftools/issues/214) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43364, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43364 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43364
- **State**: PUBLISHED
- **Published Date**: December 12, 2023 at 00:00 UTC
- **Last Updated**: October 09, 2024 at 13:30 UTC
- **Reserved Date**: September 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ArjunSharda/Searchor/pull/130)
2. [](https://github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit-)
3. [](https://github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection)
4. [](https://github.com/advisories/GHSA-66m2-493m-crh2)
5. [](https://github.com/ArjunSharda/Searchor/commit/16016506f7bf92b0f21f51841d599126d6fcd15b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4567
- **State**: PUBLISHED
- **Published Date**: May 22, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 07, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in flash/FlashMediaElement.as in MediaElement.js before 2.21.0, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via an obfuscated form of the jsinitfunction parameter, as demonstrated by "jsinitfunctio%gn."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/johndyer/mediaelement/blob/master/changelog.md)
2. [[oss-security] 20160507 CVE Request: wordpress and mediaelement](http://www.openwall.com/lists/oss-security/2016/05/07/2)
3. [](https://codex.wordpress.org/Version_4.5.2)
4. [1035818](http://www.securitytracker.com/id/1035818)
5. [](https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c)
6. [](https://github.com/johndyer/mediaelement/commit/34834eef8ac830b9145df169ec22016a4350f06e)
7. [](https://wpvulndb.com/vulnerabilities/8488)
8. [](https://wordpress.org/news/2016/05/wordpress-4-5-2/)
9. [](https://core.trac.wordpress.org/changeset/37371) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0445
- **State**: PUBLISHED
- **Published Date**: April 13, 2021 at 18:20 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In start of WelcomeActivity.java, there is a possible residual profile due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9Android ID: A-172322502
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-04-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1407
- **State**: PUBLISHED
- **Published Date**: September 27, 2017 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 03:13 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Identity Manager Virtual Appliance 6.0 and 7.0 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 127394.
### Affected Products
**IBM - Security Identity Manager**
Affected versions:
- 6.0 (Status: affected)
- 7.0 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg22007377)
2. [101015](http://www.securityfocus.com/bid/101015)
3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/127394) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0539, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0539 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0539
- **State**: PUBLISHED
- **Published Date**: February 01, 2008 at 19:41 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: February 01, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in dms/policy/rep_request.php in F5 BIG-IP Application Security Manager (ASM) 9.4.3 allows remote attackers to inject arbitrary web script or HTML via the report_type parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27462](http://www.securityfocus.com/bid/27462)
2. [1019276](http://www.securitytracker.com/id?1019276)
3. [20080126 F5 BIG-IP Web Management ASM Security Report XSS](http://www.securityfocus.com/archive/1/487118/100/0/threaded)
4. [f5bigipwebmgmt-reprequest-xss(39979)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39979)
5. [28655](http://secunia.com/advisories/28655)
6. [ADV-2008-0301](http://www.vupen.com/english/advisories/2008/0301)
7. [20080308 F5 BIG-IP Web Management Console XSS](http://www.securityfocus.com/archive/1/489290/100/0/threaded)
8. [3602](http://securityreason.com/securityalert/3602)
9. [28151](http://www.securityfocus.com/bid/28151) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5525
- **State**: PUBLISHED
- **Published Date**: February 21, 2020 at 09:15 UTC
- **Last Updated**: August 04, 2024 at 08:30 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen.
### Affected Products
**NEC Corporation - Aterm series**
Affected versions:
- Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier (Status: affected)
### References
1. [](https://jvn.jp/en/jp/JVN49410695/index.html)
2. [](https://jpn.nec.com/security-info/secinfo/nv20-003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6834, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6834 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6834
- **State**: PUBLISHED
- **Published Date**: July 17, 2024 at 14:44 UTC
- **Last Updated**: August 13, 2024 at 21:00 UTC
- **Reserved Date**: July 17, 2024 at 14:44 UTC
- **Assigned By**: Zowe
### Vulnerability Description
A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe's client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials.
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:T/RC:C/CR:H/IR:H/AR:M/MAV:N/MAC:L/MPR:N/MUI:N/MS:C/MC:H/MI:H/MA:H`
### Affected Products
**Open Mainframe Project - Zowe**
Affected versions:
- 2.4.0 (Status: affected)
### References
1. [](https://github.com/zowe/api-layer)
### Credits
- Pavel Jares
- Andrej Chmelo |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2916, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2916
- **State**: PUBLISHED
- **Published Date**: October 02, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 15:52 UTC
- **Reserved Date**: April 11, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code, in conjunction with a delay in notifying the user of an attempted spoof.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html)
2. [openSUSE-SU-2014:0065](http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html)
3. [DSA-2785](http://www.debian.org/security/2013/dsa-2785)
4. [](https://code.google.com/p/chromium/issues/detail?id=281256)
5. [openSUSE-SU-2013:1556](http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00002.html)
6. [oval:org.mitre.oval:def:18968](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18968)
7. [](https://src.chromium.org/viewvc/blink?revision=157196&view=revision)
8. [openSUSE-SU-2013:1861](http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3954, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3954
- **State**: PUBLISHED
- **Published Date**: April 26, 2025 at 21:31 UTC
- **Last Updated**: April 28, 2025 at 21:57 UTC
- **Reserved Date**: April 26, 2025 at 06:47 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in ChurchCRM 5.16.0. Affected by this issue is some unknown functionality of the component Referer Handler. The manipulation leads to server-side request forgery. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**n/a - ChurchCRM**
Affected versions:
- 5.16.0 (Status: affected)
### References
1. [VDB-306290 | ChurchCRM Referer server-side request forgery](https://vuldb.com/?id.306290)
2. [VDB-306290 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.306290)
3. [Submit #555938 | ChurchCRM 5.16.0 Server-Side Request Forgery](https://vuldb.com/?submit.555938)
4. [](https://everydaysparkling.com/ssrf-via-referrer-field-in-churchcrm-v5-16-0/)
### Credits
- Jelle Janssens (VulDB User)
- Jelle Janssens (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35228, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35228 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35228
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 18:44 UTC
- **Last Updated**: August 02, 2024 at 03:07 UTC
- **Reserved Date**: May 14, 2024 at 15:39 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Wagtail is an open source content management system built on Django. Due to an improperly applied permission check in the `wagtail.contrib.settings` module, a user with access to the Wagtail admin and knowledge of the URL of the edit view for a settings model can access and update that setting, even when they have not been granted permission over the model. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. Patched versions have been released as Wagtail 6.0.5 and 6.1.2. Wagtail releases prior to 6.0 are unaffected. Users are advised to upgrade. Site owners who are unable to upgrade to a patched version can avoid the vulnerability in `ModelViewSet` by registering the model as a snippet instead. No workaround is available for `wagtail.contrib.settings`.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-280: Security Weakness
### Affected Products
**wagtail - wagtail**
Affected versions:
- >= 6.0.0, < 6.0.5 (Status: affected)
- >= 6.1.0, < 6.1.2 (Status: affected)
### References
1. [https://github.com/wagtail/wagtail/security/advisories/GHSA-xxfm-vmcf-g33f](https://github.com/wagtail/wagtail/security/advisories/GHSA-xxfm-vmcf-g33f)
2. [https://github.com/wagtail/wagtail/commit/284f75a6f91f7ab18cc304d7d34f33b559ae37b1](https://github.com/wagtail/wagtail/commit/284f75a6f91f7ab18cc304d7d34f33b559ae37b1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13748
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for CarToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/CarToken) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24503, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24503 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24503
- **State**: PUBLISHED
- **Published Date**: February 17, 2021 at 13:38 UTC
- **Last Updated**: August 04, 2024 at 15:12 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux before version 1.0.4 may allow an authenticated user to potentially enable information disclosure via local access.
### Affected Products
**n/a - Intel(R) Ethernet E810 Adapter drivers for Linux**
Affected versions:
- before version 1.0.4 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47086
- **State**: PUBLISHED
- **Published Date**: March 04, 2024 at 18:06 UTC
- **Last Updated**: May 21, 2025 at 08:31 UTC
- **Reserved Date**: February 29, 2024 at 22:33 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
phonet/pep: refuse to enable an unbound pipe
This ioctl() implicitly assumed that the socket was already bound to
a valid local socket name, i.e. Phonet object. If the socket was not
bound, two separate problems would occur:
1) We'd send an pipe enablement request with an invalid source object.
2) Later socket calls could BUG on the socket unexpectedly being
connected yet not bound to a valid object.
### Affected Products
**Linux - Linux**
Affected versions:
- bdb6e697b2a76c541960b86ab8fda88f3de1adf2 (Status: affected)
- bdb6e697b2a76c541960b86ab8fda88f3de1adf2 (Status: affected)
- bdb6e697b2a76c541960b86ab8fda88f3de1adf2 (Status: affected)
- bdb6e697b2a76c541960b86ab8fda88f3de1adf2 (Status: affected)
- bdb6e697b2a76c541960b86ab8fda88f3de1adf2 (Status: affected)
- bdb6e697b2a76c541960b86ab8fda88f3de1adf2 (Status: affected)
- bdb6e697b2a76c541960b86ab8fda88f3de1adf2 (Status: affected)
- bdb6e697b2a76c541960b86ab8fda88f3de1adf2 (Status: affected)
**Linux - Linux**
Affected versions:
- 3.3 (Status: affected)
- 0 (Status: unaffected)
- 4.4.297 (Status: unaffected)
- 4.9.295 (Status: unaffected)
- 4.14.260 (Status: unaffected)
- 4.19.223 (Status: unaffected)
- 5.4.169 (Status: unaffected)
- 5.10.89 (Status: unaffected)
- 5.15.12 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/0bbdd62ce9d44f3a22059b3d20a0df977d9f6d59)
2. [](https://git.kernel.org/stable/c/b10c7d745615a092a50c2e03ce70446d2bec2aca)
3. [](https://git.kernel.org/stable/c/311601f114859d586d5ef8833d60d3aa23282161)
4. [](https://git.kernel.org/stable/c/982b6ba1ce626ef87e5c29f26f2401897554f235)
5. [](https://git.kernel.org/stable/c/48c76fc53582e7f13c1e0b11c916e503256c4d0b)
6. [](https://git.kernel.org/stable/c/52ad5da8e316fa11e3a50b3f089aa63e4089bf52)
7. [](https://git.kernel.org/stable/c/53ccdc73eedaf0e922c45b569b797d2796fbaafa)
8. [](https://git.kernel.org/stable/c/75a2f31520095600f650597c0ac41f48b5ba0068) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34259
- **State**: PUBLISHED
- **Published Date**: November 03, 2023 at 00:00 UTC
- **Last Updated**: September 06, 2024 at 13:41 UTC
- **Reserved Date**: May 31, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow /wlmdeu%2f%2e%2e%2f%2e%2e directory traversal to read arbitrary files on the filesystem, even files that require root privileges. NOTE: this issue exists because of an incomplete fix for CVE-2020-23575.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sec-consult.com/vulnerability-lab/)
2. [](https://seclists.org/fulldisclosure/2023/Jul/15) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49769
- **State**: PUBLISHED
- **Published Date**: December 17, 2023 at 09:58 UTC
- **Last Updated**: August 02, 2024 at 22:01 UTC
- **Reserved Date**: November 30, 2023 at 13:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in SoftLab Integrate Google Drive.This issue affects Integrate Google Drive: from n/a through 1.3.4.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**SoftLab - Integrate Google Drive**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/integrate-google-drive/wordpress-integrate-google-drive-plugin-1-3-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11775
- **State**: PUBLISHED
- **Published Date**: September 10, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 16:23 UTC
- **Reserved Date**: June 05, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.
### Affected Products
**Apache Software Foundation - Apache ActiveMQ**
Affected versions:
- 5.0.0 - 5.15.5 (Status: affected)
### References
1. [1041618](http://www.securitytracker.com/id/1041618)
2. [105335](http://www.securityfocus.com/bid/105335)
3. [[activemq-commits] 20190327 [CONF] Apache ActiveMQ > Security Advisories](https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc%40%3Ccommits.activemq.apache.org%3E)
4. [[activemq-dev] 20190327 Re: Website](https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b%40%3Cdev.activemq.apache.org%3E)
5. [[activemq-commits] 20190327 svn commit: r1042639 - in /websites/production/activemq/content/activemq-website: ./ projects/artemis/download/ projects/classic/download/ projects/cms/download/ security-advisories.data/](https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E)
6. [[activemq-dev] 20190328 Re: Website](https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1%40%3Cdev.activemq.apache.org%3E)
7. [RHSA-2019:3892](https://access.redhat.com/errata/RHSA-2019:3892)
8. [[activemq-commits] 20200514 [activemq-website] branch master updated: Publish CVE-2020-1941 security advisory](https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d%40%3Ccommits.activemq.apache.org%3E)
9. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
10. [](https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html)
11. [](https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html)
12. [](https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html)
13. [](https://www.oracle.com/security-alerts/cpujan2021.html)
14. [](http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt)
15. [[debian-lts-announce] 20210305 [SECURITY] [DLA 2583-1] activemq security update](https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2478
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 10:49 UTC
- **Last Updated**: September 25, 2024 at 19:39 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.26 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
2. [](https://security.netapp.com/advisory/ntap-20211022-0003/)
3. [FEDORA-2021-70dd0b9f5d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/)
4. [FEDORA-2021-46dc82116b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/)
5. [FEDORA-2021-f74148c6d4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12962, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12962 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12962
- **State**: PUBLISHED
- **Published Date**: November 15, 2021 at 19:42 UTC
- **Last Updated**: September 16, 2024 at 22:09 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.
### Affected Products
**AMD - AMD Radeon Software**
Affected versions:
- Radeon Software (Status: affected)
- Radeon Pro Software for Enterprise (Status: affected)
### References
1. [](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7518, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7518 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7518
- **State**: PUBLISHED
- **Published Date**: July 23, 2020 at 20:51 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-20: Improper input validation vulnerability exists in Easergy Builder (Version 1.4.7.2 and older) which could allow an attacker to modify project configuration files.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - Easergy Builder (Version 1.4.7.2 and older)**
Affected versions:
- Easergy Builder (Version 1.4.7.2 and older) (Status: affected)
### References
1. [](https://www.se.com/ww/en/download/document/SEVD-2020-161-05) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2504, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2504 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2504
- **State**: PUBLISHED
- **Published Date**: May 29, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: May 29, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Simpel Side Netbutik 1 through 4 allow remote attackers to execute arbitrary SQL commands via the (1) cat parameter to netbutik.php and the (2) id parameter to product.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [netbutik-netbutik-product-sql-injection(42572)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42572)
2. [ADV-2008-1658](http://www.vupen.com/english/advisories/2008/1658)
3. [29333](http://www.securityfocus.com/bid/29333)
4. [5665](https://www.exploit-db.com/exploits/5665) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4809, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4809 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4809
- **State**: PUBLISHED
- **Published Date**: May 13, 2024 at 00:31 UTC
- **Last Updated**: August 01, 2024 at 20:55 UTC
- **Reserved Date**: May 12, 2024 at 05:39 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in SourceCodester Open Source Clinic Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file setting.php. The manipulation of the argument logo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263929 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**SourceCodester - Open Source Clinic Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-263929 | SourceCodester Open Source Clinic Management System setting.php unrestricted upload](https://vuldb.com/?id.263929)
2. [VDB-263929 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263929)
3. [Submit #332581 | SourceCodester Open Source Clinic Management System in PHP with Full Source Code V1.0 Unrestricted Upload](https://vuldb.com/?submit.332581)
4. [](https://github.com/CveSecLook/cve/issues/26)
### Credits
- Cece Chen from Wuhan University (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37215, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37215 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37215
- **State**: PUBLISHED
- **Published Date**: July 22, 2024 at 09:28 UTC
- **Last Updated**: August 02, 2024 at 03:50 UTC
- **Reserved Date**: June 04, 2024 at 16:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in creativeinteractivemedia Transition Slider – Responsive Image Slider and Gallery allows Stored XSS.This issue affects Transition Slider – Responsive Image Slider and Gallery: from n/a through 2.20.3.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**creativeinteractivemedia - Transition Slider – Responsive Image Slider and Gallery**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/transition-slider-lite/wordpress-transition-slider-responsive-image-slider-and-gallery-plugin-2-20-3-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Steven Julian (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1969, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1969
- **State**: PUBLISHED
- **Published Date**: March 04, 2025 at 18:49 UTC
- **Last Updated**: March 04, 2025 at 19:05 UTC
- **Reserved Date**: March 04, 2025 at 18:30 UTC
- **Assigned By**: AMZN
### Vulnerability Description
Improper request input validation in Temporary Elevated Access Management (TEAM) for AWS IAM Identity Center allows a user to modify a valid request and spoof an approval in TEAM.
Upgrade TEAM to the latest release v.1.2.2. Follow instructions in updating TEAM documentation for updating process
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-346: Security Weakness
### Affected Products
**AWS - Temporary Elevated Access Management (TEAM) for AWS IAM Identity Center**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/aws-samples/iam-identity-center-team/security/advisories/GHSA-x9xv-r58p-qh86)
2. [](https://aws.amazon.com/security/security-bulletins/AWS-2025-004/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10867
- **State**: PUBLISHED
- **Published Date**: May 26, 2021 at 18:03 UTC
- **Last Updated**: August 05, 2024 at 07:46 UTC
- **Reserved Date**: May 09, 2018 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Files are accessible without restrictions from the /update/results page of redhat-certification 7 package, allowing an attacker to remove any file accessible by the apached user.
### Weakness Classification (CWE)
- CWE-552: Security Weakness
### Affected Products
**n/a - redhat-certification**
Affected versions:
- redhat-certification 7 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1593764)
2. [](https://access.redhat.com/security/cve/CVE-2018-10867) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21250, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21250
- **State**: PUBLISHED
- **Published Date**: January 15, 2021 at 20:10 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which may lead to arbitrary file read. When BuildSpec is provided in XML format, the spec is processed by XmlBuildSpecMigrator.migrate(buildSpecString); which processes the XML document without preventing the expansion of external entities. These entities can be configured to read arbitrary files from the file system and dump their contents in the final XML document to be migrated. If the files are dumped in properties included in the YAML file, it will be possible for an attacker to read them. If not, it is possible for an attacker to exfiltrate the contents of these files Out Of Band. This issue was addressed in 4.0.3 by ignoring ENTITY instructions in xml file.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-538: Security Weakness
### Affected Products
**theonedev - onedev**
Affected versions:
- < 4.0.3 (Status: affected)
### References
1. [](https://github.com/theonedev/onedev/security/advisories/GHSA-9pph-8gfc-6w2r)
2. [](https://github.com/theonedev/onedev/commit/9196fd795e87dab069b4260a3590a0ea886e770f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0592, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0592 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0592
- **State**: PUBLISHED
- **Published Date**: June 26, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 03:28 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Untrusted search path vulnerability in Microsoft OneDrive allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
### Affected Products
**Microsoft - Microsoft OneDrive**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://blogs.technet.microsoft.com/srd/2018/04/04/triaging-a-dll-planting-vulnerability/)
2. [JVN#91151862](http://jvn.jp/en/jp/JVN91151862/index.html)
3. [104563](http://www.securityfocus.com/bid/104563) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5183
- **State**: PUBLISHED
- **Published Date**: May 26, 2025 at 11:31 UTC
- **Last Updated**: May 28, 2025 at 17:35 UTC
- **Reserved Date**: May 25, 2025 at 17:27 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Summer Pearl Group Vacation Rental Management Platform up to 1.0.1 and classified as problematic. This issue affects some unknown processing of the component Header Handler. The manipulation of the argument Host leads to open redirect. The attack may be initiated remotely. Upgrading to version 1.0.2 is able to address this issue. It is recommended to upgrade the affected component.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**Summer Pearl Group - Vacation Rental Management Platform**
Affected versions:
- 1.0.0 (Status: affected)
- 1.0.1 (Status: affected)
### References
1. [VDB-310271 | Summer Pearl Group Vacation Rental Management Platform Header redirect](https://vuldb.com/?id.310271)
2. [VDB-310271 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.310271)
3. [](https://summerpearlgroup.gr/spgpm/releases) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4759
- **State**: PUBLISHED
- **Published Date**: September 06, 2012 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 02:15 UTC
- **Reserved Date**: September 06, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in facebook_plugin.fpi in the Facebook plug-in in Foxit Reader 5.3.1.0606 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .pdf file. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [50348](http://secunia.com/advisories/50348)
2. [20120823 foxit reader 5.3.1(dwmapi.dll) DLL Hijacking Exploit](http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0293.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4354
- **State**: PUBLISHED
- **Published Date**: August 15, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in fileplace in bos.perf.tools in IBM AIX 5.2 and 5.3 allows local users to gain privileges via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [IZ00149](http://www-1.ibm.com/support/docview.wss?uid=isg1IZ00149)
2. [ADV-2007-2860](http://www.vupen.com/english/advisories/2007/2860)
3. [IZ00154](http://www-1.ibm.com/support/docview.wss?uid=isg1IZ00154)
4. [](http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&heading=AIX53&path=%2F200708%2FSECURITY%2F20070810%2Fdatafile101707)
5. [26420](http://secunia.com/advisories/26420)
6. [aix-fileplace-bo(35972)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35972)
7. [25271](http://www.securityfocus.com/bid/25271)
8. [](ftp://aix.software.ibm.com/aix/efixes/security/README)
9. [1018550](http://www.securitytracker.com/id?1018550) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1639, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1639
- **State**: PUBLISHED
- **Published Date**: February 08, 2013 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 15:13 UTC
- **Reserved Date**: February 08, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Opera before 12.13 does not send CORS preflight requests in all required cases, which allows remote attackers to bypass a CSRF protection mechanism via a crafted web site that triggers a CORS request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.opera.com/docs/changelogs/unified/1213/)
2. [openSUSE-SU-2013:0289](http://lists.opensuse.org/opensuse-updates/2013-02/msg00038.html)
3. [](http://www.opera.com/support/kb/view/1045/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1234, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1234
- **State**: PUBLISHED
- **Published Date**: March 14, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 14, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in DSCounter 1.2, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For field (HTTP_X_FORWARDED_FOR environment variable) in an HTTP header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23882](http://www.osvdb.org/23882)
2. [20060325 [eVuln] DSCounter 'X-Forwarded-For' SQL Injection Vulnerability](http://www.securityfocus.com/archive/1/428807/100/0/threaded)
3. [1015756](http://securitytracker.com/id?1015756)
4. [19206](http://secunia.com/advisories/19206)
5. [627](http://securityreason.com/securityalert/627)
6. [dscounter-index-sql-injection(25190)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25190)
7. [ADV-2006-0933](http://www.vupen.com/english/advisories/2006/0933)
8. [](http://evuln.com/vulns/98/summary.html)
9. [17112](http://www.securityfocus.com/bid/17112) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13670
- **State**: PUBLISHED
- **Published Date**: February 11, 2022 at 15:45 UTC
- **Last Updated**: August 04, 2024 at 12:25 UTC
- **Reserved Date**: May 28, 2020 at 00:00 UTC
- **Assigned By**: drupal
### Vulnerability Description
Information Disclosure vulnerability in file module of Drupal Core allows an attacker to gain access to the file metadata of a permanent private file that they do not have access to by guessing the ID of the file. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6.
### Affected Products
**Drupal - Core**
Affected versions:
- 8.8.x (Status: affected)
- 8.9.x (Status: affected)
- 9.0.x (Status: affected)
### References
1. [](https://www.drupal.org/sa-core-2020-011) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6369, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6369
- **State**: PUBLISHED
- **Published Date**: December 15, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in resize.php in the PictPress 0.91 and earlier plugin for WordPress allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) size or (2) path parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4695](https://www.exploit-db.com/exploits/4695) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41851, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41851 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41851
- **State**: REJECTED
- **Last Updated**: February 13, 2025 at 16:28 UTC
- **Reserved Date**: October 01, 2021 at 20:51 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2646
- **State**: PUBLISHED
- **Published Date**: March 23, 2025 at 09:31 UTC
- **Last Updated**: March 24, 2025 at 12:46 UTC
- **Reserved Date**: March 22, 2025 at 07:34 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Art Gallery Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/admin-profile.php. The manipulation of the argument contactnumber leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Art Gallery Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-300661 | PHPGurukul Art Gallery Management System admin-profile.php sql injection](https://vuldb.com/?id.300661)
2. [VDB-300661 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.300661)
3. [Submit #519776 | PHPGurukul Art Gallery Management System V1.0 XSS Vulnerability](https://vuldb.com/?submit.519776)
4. [](https://github.com/liuhao2638/cve/issues/9)
5. [](https://phpgurukul.com/)
### Credits
- liuhao7328 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3604, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3604 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3604
- **State**: PUBLISHED
- **Published Date**: September 06, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 20:47 UTC
- **Reserved Date**: May 21, 2013 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Coursemill Learning Management System (LMS) 6.6 allow remote attackers to inject arbitrary web script or HTML via crafted input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#960908](http://www.kb.cert.org/vuls/id/960908) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2337, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2337
- **State**: PUBLISHED
- **Published Date**: December 12, 2019 at 08:30 UTC
- **Last Updated**: August 04, 2024 at 18:49 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
While Skipping unknown IES, EMM is reading the buffer even if the no of bytes to read are more than message length which may cause device to shutdown in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8053, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, Snapdragon_High_Med_2016, SXR1130, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables**
Affected versions:
- APQ8053, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, Snapdragon_High_Med_2016, SXR1130, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26595, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26595
- **State**: PUBLISHED
- **Published Date**: February 23, 2021 at 19:00 UTC
- **Last Updated**: November 19, 2024 at 15:33 UTC
- **Reserved Date**: February 02, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Directus 8.x through 8.8.1, an attacker can learn sensitive information such as the version of the CMS, the PHP version used by the site, and the name of the DBMS, simply by view the result of the api-aa, called automatically upon a connection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sgranel/directusv8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3209, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3209
- **State**: PUBLISHED
- **Published Date**: June 24, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: June 23, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Task scheduler (at.exe) on Microsoft Windows XP spawns each scheduled process with SYSTEM permissions, which allows local users to gain privileges. NOTE: this issue has been disputed by third parties, who state that the Task scheduler is limited to the Administrators group by default upon installation
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060612 Windows XP Task Scheduler Local Privilege Escalation (Advisory)](http://www.securityfocus.com/archive/1/436810/100/200/threaded)
2. [20060612 Re: Windows XP Task Scheduler Local Privilege Escalation (Advisory)](http://www.securityfocus.com/archive/1/436884/100/200/threaded)
3. [1137](http://securityreason.com/securityalert/1137) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7726, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7726 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7726
- **State**: PUBLISHED
- **Published Date**: December 20, 2024 at 11:02 UTC
- **Last Updated**: December 20, 2024 at 15:51 UTC
- **Reserved Date**: August 12, 2024 at 21:49 UTC
- **Assigned By**: Google
### Vulnerability Description
There exists an unauthenticated accessible JTAG port on the Kioxia PM6, PM7 and CM6 devices - On the Kioxia CM6, PM6 and PM7 disk drives it was discovered that the 2 main CPU cores of the SoC can be accessed via an open JTAG debug port that is exposed on the drive’s circuit board. Due to the wide cutout of the enclosures, the JTAG port can be accessed without having to open the disk enclosure. Utilizing the JTAG debug port, an attacker with (temporary) physical access can get full access to the firmware and memory on the 2 main CPU cores within the drive including the execution of arbitrary code, the modification of firmware execution flow and data or bypassing the firmware signature verification during boot-up.
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**Kioxia - CM6**
Affected versions:
- 0 (Status: affected)
**Kioxia - PM7**
Affected versions:
- 0 (Status: affected)
**Kioxia - PM6**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/google/security-research/security/advisories/GHSA-3hh8-94j4-62rh) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32546, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32546 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32546
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:47 UTC
- **Last Updated**: April 17, 2025 at 18:27 UTC
- **Reserved Date**: April 09, 2025 at 11:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in gtlwpdev All push notification for WP allows Reflected XSS. This issue affects All push notification for WP: from n/a through 1.5.3.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**gtlwpdev - All push notification for WP**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/all-push-notification/vulnerability/wordpress-all-push-notification-for-wp-plugin-1-5-3-csrf-to-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- 0xd4rk5id3 (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0980
- **State**: PUBLISHED
- **Published Date**: December 11, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:12 UTC
- **Reserved Date**: December 10, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in FreeScripts VisitorBook LE (visitorbook.pl) allows remote attackers to inject arbitrary HTML or web script via (1) the "do" parameter, (2) via the "user" parameter from a host with a malicious reverse DNS name, (3) via quote marks or ampersands in other parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.westpoint.ltd.uk/advisories/wp-03-0001.txt)
2. [20031210 Visitorbook LE Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=107107840622493&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56706, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56706 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56706
- **State**: PUBLISHED
- **Published Date**: December 28, 2024 at 09:46 UTC
- **Last Updated**: May 04, 2025 at 10:02 UTC
- **Reserved Date**: December 27, 2024 at 15:00 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
s390/cpum_sf: Fix and protect memory allocation of SDBs with mutex
Reservation of the PMU hardware is done at first event creation
and is protected by a pair of mutex_lock() and mutex_unlock().
After reservation of the PMU hardware the memory
required for the PMUs the event is to be installed on is
allocated by allocate_buffers() and alloc_sampling_buffer().
This done outside of the mutex protection.
Without mutex protection two or more concurrent invocations of
perf_event_init() may run in parallel.
This can lead to allocation of Sample Data Blocks (SDBs)
multiple times for the same PMU.
Prevent this and protect memory allocation of SDBs by
mutex.
### Affected Products
**Linux - Linux**
Affected versions:
- 8a6fe8f21ec4f049a7b1fe120ad50a5065a9c7a8 (Status: affected)
- 8a6fe8f21ec4f049a7b1fe120ad50a5065a9c7a8 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.12 (Status: affected)
- 0 (Status: unaffected)
- 6.12.2 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/4b3bdfa89635db6a53e02955548bd07bebcae233)
2. [](https://git.kernel.org/stable/c/f55bd479d8663a4a4e403b3d308d3d1aa33d92df) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14026, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14026 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14026
- **State**: PUBLISHED
- **Published Date**: March 05, 2020 at 08:56 UTC
- **Last Updated**: August 05, 2024 at 00:05 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible buffer overflow in WLAN WMI handler due to lack of ssid length check when copying data in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, IPQ6018, IPQ8074, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8996AU, MSM8998, Nicobar, QCA6174A, QCA6574, QCA6574AU, QCA6584AU, QCA8081, QCA9377, QCA9379, QCA9886, QCN7605, QCS404, QCS405, QCS605, Rennell, SA6155P, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, IPQ6018, IPQ8074, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8996AU, MSM8998, Nicobar, QCA6174A, QCA6574, QCA6574AU, QCA6584AU, QCA8081, QCA9377, QCA9379, QCA9886, QCN7605, QCS404, QCS405, QCS605, Rennell, SA6155P, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3491, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3491
- **State**: PUBLISHED
- **Published Date**: June 29, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:21 UTC
- **Reserved Date**: June 29, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in _mprosrv in Progress Software OpenEdge before 9.1E0422, and 10.x before 10.1B01, allows remote attackers to have an unknown impact via a malformed TCP/IP message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070627 Openedge _mprosrv buffer overflow](http://www.securityfocus.com/archive/1/472349/100/0/threaded)
2. [25865](http://secunia.com/advisories/25865)
3. [2851](http://securityreason.com/securityalert/2851)
4. [](http://www.psdn.com/library/servlet/KbServlet/download/2629-102-4821/README_101B_01.pdf)
5. [37747](http://osvdb.org/37747)
6. [openedge-mprosrv-bo(35104)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35104) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5790, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5790
- **State**: PUBLISHED
- **Published Date**: February 05, 2018 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 05:47 UTC
- **Reserved Date**: January 19, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Extreme Networks ExtremeWireless WiNG 5.x before 5.8.6.9 and 5.9.x before 5.9.1.3. There is Remote, Unauthenticated "Global" Denial of Service in the RIM (Radio Interface Module) over the MINT (Media Independent Tunnel) Protocol on the WiNG Access Point via crafted packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13219
- **State**: PUBLISHED
- **Published Date**: August 15, 2019 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 23:41 UTC
- **Reserved Date**: July 03, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://nothings.org/stb_vorbis/)
2. [](https://github.com/nothings/stb/commits/master/stb_vorbis.c)
3. [](https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6)
4. [[debian-lts-announce] 20230131 [SECURITY] [DLA 3305-1] libstb security update](https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51539, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51539 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51539
- **State**: PUBLISHED
- **Published Date**: February 25, 2025 at 13:45 UTC
- **Last Updated**: February 25, 2025 at 14:13 UTC
- **Reserved Date**: October 29, 2024 at 05:03 UTC
- **Assigned By**: dell
### Vulnerability Description
The Dell Secure Connect Gateway (SCG) Application and Appliance, versions prior to 5.28, contains a SQL injection vulnerability due to improper neutralization of special elements used in an SQL command. This vulnerability can only be exploited locally on the affected system. A high-privilege attacker with access to the system could potentially exploit this vulnerability, leading to the disclosure of non-sensitive information that does not include any customer data.
### CVSS Metrics
- **CVSS Base Score**: 2.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Dell - Secure Connect Gateway - Application**
Affected versions:
- N/A (Status: affected)
**Dell - Secure Connect Gateway - Appliance**
Affected versions:
- N/A (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000289550/dsa-2024-464-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerability)
### Credits
- CVE-2024-51539: Dell would like to thank saltedfish for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36735, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36735
- **State**: PUBLISHED
- **Published Date**: August 30, 2022 at 20:43 UTC
- **Last Updated**: August 03, 2024 at 10:14 UTC
- **Reserved Date**: July 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the bookId parameter at /admin/delete.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/kingbhob02/library-management-system/SQLi-23.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3974, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3974 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3974
- **State**: PUBLISHED
- **Published Date**: November 18, 2009 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 17:17 UTC
- **Reserved Date**: November 18, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Invision Power Board (IPB or IP.Board) 3.0.0, 3.0.1, and 3.0.2 allow remote attackers to execute arbitrary SQL commands via the (1) search_term parameter to admin/applications/core/modules_public/search/search.php and (2) aid parameter to admin/applications/core/modules_public/global/lostpass.php. NOTE: on 20090818, the vendor patched 3.0.2 without changing the version number.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://forums.invisionpower.com/topic/291103-invision-power-board-3-0-2-security-update/)
2. [ADV-2009-2413](http://www.vupen.com/english/advisories/2009/2413) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3808, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3808 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3808
- **State**: PUBLISHED
- **Published Date**: March 25, 2020 at 19:12 UTC
- **Last Updated**: August 04, 2024 at 07:44 UTC
- **Reserved Date**: December 17, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Creative Cloud Desktop Application versions 5.0 and earlier have a time-of-check to time-of-use (toctou) race condition vulnerability. Successful exploitation could lead to arbitrary file deletion.
### Affected Products
**Adobe - Creative Cloud Desktop Application**
Affected versions:
- Creative Cloud Desktop Application versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/creative-cloud/apsb20-11.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6814, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6814
- **State**: PUBLISHED
- **Published Date**: May 28, 2009 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 11:42 UTC
- **Reserved Date**: May 28, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload vulnerability in image_upload.php in the SimpleBoard (com_simpleboard) component 1.0.1 and earlier for Mambo allows remote attackers to execute arbitrary code by uploading a file with an executable extension and an image/jpeg content type, then accessing this file via a direct request to the file in components/com_simpleboard/, a different vulnerability than CVE-2006-3528.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [simpleboard-imageupload-file-upload(46223)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46223)
2. [6868](https://www.exploit-db.com/exploits/6868)
3. [31981](http://www.securityfocus.com/bid/31981) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.