System stringclasses 1
value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52575, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52575
- **State**: REJECTED
- **Published Date**: March 02, 2024 at 21:59 UTC
- **Last Updated**: April 24, 2024 at 21:51 UTC
- **Reserved Date**: March 02, 2024 at 21:55 UTC
- **Assigned By**: Linux
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5108, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5108
- **State**: PUBLISHED
- **Published Date**: December 23, 2019 at 18:55 UTC
- **Last Updated**: August 04, 2024 at 19:47 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-440: Security Weakness
### Affected Products
**n/a - Linux kernel**
Affected versions:
- Linux 4.14.98-v7+ (Status: affected)
### References
1. [USN-4285-1](https://usn.ubuntu.com/4285-1/)
2. [USN-4287-1](https://usn.ubuntu.com/4287-1/)
3. [USN-4286-2](https://usn.ubuntu.com/4286-2/)
4. [USN-4287-2](https://usn.ubuntu.com/4287-2/)
5. [USN-4286-1](https://usn.ubuntu.com/4286-1/)
6. [[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update](https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html)
7. [[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html)
8. [[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update](https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html)
9. [DSA-4698](https://www.debian.org/security/2020/dsa-4698)
10. [](https://www.oracle.com/security-alerts/cpuApr2021.html)
11. [](https://security.netapp.com/advisory/ntap-20200204-0002/)
12. [](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0900)
13. [](https://git.kernel.org/linus/3e493173b7841259a08c5c8e5cbe90adb349da7e)
14. [](http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29839, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29839
- **State**: PUBLISHED
- **Published Date**: December 09, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 19:44 UTC
- **Reserved Date**: April 27, 2022 at 00:00 UTC
- **Assigned By**: WDC PSIRT
### Vulnerability Description
Insufficiently Protected Credentials vulnerability in the remote backups application on Western Digital My Cloud devices that could allow an attacker who has gained access to a relevant endpoint to use that information to access protected data. This issue affects: Western Digital My Cloud My Cloud versions prior to 5.25.124 on Linux.
### CVSS Metrics
- **CVSS Base Score**: 4.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-522: Security Weakness
### Affected Products
**Western Digital - My Cloud**
Affected versions:
- My Cloud (Status: affected)
### References
1. [](https://www.westerndigital.com/support/product-security/wdc-22019-my-cloud-firmware-version-5-25-124) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4036
- **State**: PUBLISHED
- **Published Date**: August 09, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 18:57 UTC
- **Reserved Date**: August 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in includes/usercp_register.php in ZoneMetrics ZoneX Publishers Gold Edition 1.0.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19338](http://www.securityfocus.com/bid/19338)
2. [zonex-register-file-include(28223)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28223)
3. [21353](http://secunia.com/advisories/21353)
4. [20060830 Re: ZoneX 1.0.3 - Publishers Gold Edition Remote File Inclusion Vulnerability](http://www.securityfocus.com/archive/1/444901/100/0/threaded)
5. [ADV-2006-3156](http://www.vupen.com/english/advisories/2006/3156)
6. [1348](http://securityreason.com/securityalert/1348)
7. [20060803 ZoneX 1.0.3 - Publishers Gold Edition Remote File Inclusion Vulnerability](http://www.securityfocus.com/archive/1/442152/100/0/threaded)
8. [20060906 ZoneX 1.0.3 File Inclusion - CVE-2006-4036](http://www.attrition.org/pipermail/vim/2006-September/001017.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0519, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0519
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 21:14 UTC
- **Last Updated**: February 13, 2025 at 17:27 UTC
- **Reserved Date**: January 12, 2024 at 22:48 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 120.0.6099.224 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html)
2. [](https://crbug.com/1517354)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/)
5. [](https://www.couchbase.com/alerts/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1156
- **State**: PUBLISHED
- **Published Date**: February 27, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 12:43 UTC
- **Reserved Date**: February 27, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JBrowser allows remote attackers to bypass authentication and access certain administrative capabilities via a direct request for _admin/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1008909](http://securitytracker.com/id?1008909)
2. [20070222 JBrowser acces to admin/config files](http://www.securityfocus.com/archive/1/460923/100/0/threaded)
3. [](http://forums.avenir-geopolitique.net/viewtopic.php?t=2693)
4. [20070223 JBrowser Acces to Admin Panel Exploit](http://www.securityfocus.com/archive/1/461298/100/100/threaded)
5. [33141](http://osvdb.org/33141)
6. [9537](http://www.securityfocus.com/bid/9537)
7. [2370](http://securityreason.com/securityalert/2370) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48249, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48249 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48249
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 14:44 UTC
- **Last Updated**: May 19, 2025 at 15:19 UTC
- **Reserved Date**: May 19, 2025 at 14:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory EAN for WooCommerce allows Stored XSS. This issue affects EAN for WooCommerce: from n/a through 5.4.6.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WPFactory - EAN for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/ean-for-woocommerce/vulnerability/wordpress-ean-for-woocommerce-5-4-6-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- muhammad yudha (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1949
- **State**: PUBLISHED
- **Published Date**: June 05, 2009 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 05:27 UTC
- **Reserved Date**: June 05, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
import_wbb1.php in Unclassified NewsBoard (UNB) 1.6.4 allows remote attackers to obtain sensitive information via a direct request, which reveals the installation path in an error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [unb-importwbb1-path-disclosure(50879)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50879)
2. [35183](http://www.securityfocus.com/bid/35183)
3. [8841](https://www.exploit-db.com/exploits/8841) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0877, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0877 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0877
- **State**: PUBLISHED
- **Published Date**: May 31, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 22:30 UTC
- **Reserved Date**: December 17, 2015 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Memory leak on Moxa Secure Router EDR-G903 devices before 3.4.12 allows remote attackers to cause a denial of service (memory consumption) by executing the ping function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4829, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4829
- **State**: PUBLISHED
- **Published Date**: November 25, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 10:31 UTC
- **Reserved Date**: October 31, 2008 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Multiple buffer overflows in lib/http.c in Streamripper 1.63.5 allow remote attackers to execute arbitrary code via (1) a long "Zwitterion v" HTTP header, related to the http_parse_sc_header function; (2) a crafted pls playlist with a long entry, related to the http_get_pls function; or (3) a crafted m3u playlist with a long File entry, related to the http_get_m3u function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [49997](http://www.osvdb.org/49997)
2. [32562](http://secunia.com/advisories/32562)
3. [ADV-2008-3207](http://www.vupen.com/english/advisories/2008/3207)
4. [33052](http://secunia.com/advisories/33052)
5. [20081119 Secunia Research: Streamripper Multiple Buffer Overflows](http://www.securityfocus.com/archive/1/498486/100/0/threaded)
6. [DSA-1683](http://www.debian.org/security/2008/dsa-1683)
7. [](http://secunia.com/secunia_research/2008-50/)
8. [33061](http://secunia.com/advisories/33061)
9. [32356](http://www.securityfocus.com/bid/32356)
10. [4647](http://securityreason.com/securityalert/4647) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1835, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1835 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1835
- **State**: PUBLISHED
- **Published Date**: June 18, 2020 at 13:51 UTC
- **Last Updated**: August 04, 2024 at 06:46 UTC
- **Reserved Date**: November 29, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
HUAWEI Mate 30 with versions earlier than 10.1.0.126(C00E125R5P3) have an information disclosure vulnerability. A logic judgment error occurs when the system handling Bluetooth connections, an attacker could craft as an authenticated Bluetooth peer to launch the attack. Successful exploit could cause information disclosure.
### Affected Products
**n/a - HUAWEI Mate 30**
Affected versions:
- Versions earlier than 10.1.0.126(C00E125R5P3) (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200617-02-smartphone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5917
- **State**: REJECTED
- **Published Date**: May 05, 2017 at 07:04 UTC
- **Last Updated**: May 05, 2017 at 07:57 UTC
- **Reserved Date**: February 07, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37744, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37744
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 12:55 UTC
- **Last Updated**: May 26, 2025 at 05:19 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix memory leak in ath12k_pci_remove()
Kmemleak reported this error:
unreferenced object 0xffff1c165cec3060 (size 32):
comm "insmod", pid 560, jiffies 4296964570 (age 235.596s)
backtrace:
[<000000005434db68>] __kmem_cache_alloc_node+0x1f4/0x2c0
[<000000001203b155>] kmalloc_trace+0x40/0x88
[<0000000028adc9c8>] _request_firmware+0xb8/0x608
[<00000000cad1aef7>] firmware_request_nowarn+0x50/0x80
[<000000005011a682>] local_pci_probe+0x48/0xd0
[<00000000077cd295>] pci_device_probe+0xb4/0x200
[<0000000087184c94>] really_probe+0x150/0x2c0
The firmware memory was allocated in ath12k_pci_probe(), but not
freed in ath12k_pci_remove() in case ATH12K_FLAG_QMI_FAIL bit is
set. So call ath12k_fw_unmap() to free the memory.
Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.2.0-02280-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1
### Affected Products
**Linux - Linux**
Affected versions:
- d889913205cf7ebda905b1e62c5867ed4e39f6c2 (Status: affected)
- d889913205cf7ebda905b1e62c5867ed4e39f6c2 (Status: affected)
- d889913205cf7ebda905b1e62c5867ed4e39f6c2 (Status: affected)
- d889913205cf7ebda905b1e62c5867ed4e39f6c2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.3 (Status: affected)
- 0 (Status: unaffected)
- 6.12.24 (Status: unaffected)
- 6.13.12 (Status: unaffected)
- 6.14.3 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/3cb47b50926a5b9eef8c06506a14cdc0f3d95c53)
2. [](https://git.kernel.org/stable/c/cb8f4c5f9c487d82a566672b5ed0c9f05e40659b)
3. [](https://git.kernel.org/stable/c/52e3132e62c31b5ade43dc4495fa81175e6e8398)
4. [](https://git.kernel.org/stable/c/1b24394ed5c8a8d8f7b9e3aa9044c31495d46f2e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23797, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23797 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23797
- **State**: PUBLISHED
- **Published Date**: December 17, 2021 at 20:05 UTC
- **Last Updated**: September 16, 2024 at 19:30 UTC
- **Reserved Date**: January 08, 2021 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
All versions of package http-server-node are vulnerable to Directory Traversal via use of --path-as-is.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**n/a - http-server-node**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-HTTPSERVERNODE-1727656)
### Credits
- Yeting Li |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6406
- **State**: REJECTED
- **Last Updated**: February 12, 2023 at 00:00 UTC
- **Reserved Date**: November 04, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7135
- **State**: PUBLISHED
- **Published Date**: May 23, 2019 at 15:44 UTC
- **Last Updated**: August 04, 2024 at 20:38 UTC
- **Reserved Date**: January 28, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Bridge CC versions 9.0.2 have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**Adobe - Adobe Bridge CC**
Affected versions:
- 9.0.2 versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/bridge/apsb19-25.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2524, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2524
- **State**: PUBLISHED
- **Published Date**: March 16, 2024 at 17:31 UTC
- **Last Updated**: August 01, 2024 at 19:18 UTC
- **Reserved Date**: March 15, 2024 at 16:27 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0. This issue affects some unknown processing of the file /admin/receipt.php. The manipulation of the argument room_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256961 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**MAGESH-K21 - Online-College-Event-Hall-Reservation-System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-256961 | MAGESH-K21 Online-College-Event-Hall-Reservation-System receipt.php sql injection](https://vuldb.com/?id.256961)
2. [VDB-256961 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.256961)
3. [](https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20receipt.php.md)
### Credits
- Joshua Lictan
- nochizplz (VulDB User)
- nochizplz (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3566
- **State**: PUBLISHED
- **Published Date**: June 14, 2012 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 20:13 UTC
- **Reserved Date**: June 14, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Opera before 12.00 Beta allows user-assisted remote attackers to cause a denial of service (application hang) via JavaScript code that changes a form before submission.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [opera-form-dos(76361)](https://exchange.xforce.ibmcloud.com/vulnerabilities/76361)
2. [](http://www.opera.com/docs/changelogs/windows/1200b/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2055, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2055 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2055
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11224
- **State**: PUBLISHED
- **Published Date**: May 15, 2019 at 17:04 UTC
- **Last Updated**: August 04, 2024 at 22:48 UTC
- **Reserved Date**: April 12, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HARMAN AMX MVP5150 v2.87.13 devices allow remote OS Command Injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.amx.com/en/softwares/modero-mvp-5150-mvp-5200i-touch-panel-firmware-v2-87-13)
2. [](https://blog.hivint.com/advisory-injection-dangerous-command-into-harman-amx-mvp5150-cve-2019-11224-55bea4a03f3e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49238, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49238 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49238
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:56 UTC
- **Last Updated**: May 04, 2025 at 08:33 UTC
- **Reserved Date**: February 26, 2025 at 01:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ath11k: free peer for station when disconnect from AP for QCA6390/WCN6855
Commit b4a0f54156ac ("ath11k: move peer delete after vdev stop of station
for QCA6390 and WCN6855") is to fix firmware crash by changing the WMI
command sequence, but actually skip all the peer delete operation, then
it lead commit 58595c9874c6 ("ath11k: Fixing dangling pointer issue upon
peer delete failure") not take effect, and then happened a use-after-free
warning from KASAN. because the peer->sta is not set to NULL and then used
later.
Change to only skip the WMI_PEER_DELETE_CMDID for QCA6390/WCN6855.
log of user-after-free:
[ 534.888665] BUG: KASAN: use-after-free in ath11k_dp_rx_update_peer_stats+0x912/0xc10 [ath11k]
[ 534.888696] Read of size 8 at addr ffff8881396bb1b8 by task rtcwake/2860
[ 534.888705] CPU: 4 PID: 2860 Comm: rtcwake Kdump: loaded Tainted: G W 5.15.0-wt-ath+ #523
[ 534.888712] Hardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 05/28/2021
[ 534.888716] Call Trace:
[ 534.888720] <IRQ>
[ 534.888726] dump_stack_lvl+0x57/0x7d
[ 534.888736] print_address_description.constprop.0+0x1f/0x170
[ 534.888745] ? ath11k_dp_rx_update_peer_stats+0x912/0xc10 [ath11k]
[ 534.888771] kasan_report.cold+0x83/0xdf
[ 534.888783] ? ath11k_dp_rx_update_peer_stats+0x912/0xc10 [ath11k]
[ 534.888810] ath11k_dp_rx_update_peer_stats+0x912/0xc10 [ath11k]
[ 534.888840] ath11k_dp_rx_process_mon_status+0x529/0xa70 [ath11k]
[ 534.888874] ? ath11k_dp_rx_mon_status_bufs_replenish+0x3f0/0x3f0 [ath11k]
[ 534.888897] ? check_prev_add+0x20f0/0x20f0
[ 534.888922] ? __lock_acquire+0xb72/0x1870
[ 534.888937] ? find_held_lock+0x33/0x110
[ 534.888954] ath11k_dp_rx_process_mon_rings+0x297/0x520 [ath11k]
[ 534.888981] ? rcu_read_unlock+0x40/0x40
[ 534.888990] ? ath11k_dp_rx_pdev_alloc+0xd90/0xd90 [ath11k]
[ 534.889026] ath11k_dp_service_mon_ring+0x67/0xe0 [ath11k]
[ 534.889053] ? ath11k_dp_rx_process_mon_rings+0x520/0x520 [ath11k]
[ 534.889075] call_timer_fn+0x167/0x4a0
[ 534.889084] ? add_timer_on+0x3b0/0x3b0
[ 534.889103] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370
[ 534.889117] __run_timers.part.0+0x539/0x8b0
[ 534.889123] ? ath11k_dp_rx_process_mon_rings+0x520/0x520 [ath11k]
[ 534.889157] ? call_timer_fn+0x4a0/0x4a0
[ 534.889164] ? mark_lock_irq+0x1c30/0x1c30
[ 534.889173] ? clockevents_program_event+0xdd/0x280
[ 534.889189] ? mark_held_locks+0xa5/0xe0
[ 534.889203] run_timer_softirq+0x97/0x180
[ 534.889213] __do_softirq+0x276/0x86a
[ 534.889230] __irq_exit_rcu+0x11c/0x180
[ 534.889238] irq_exit_rcu+0x5/0x20
[ 534.889244] sysvec_apic_timer_interrupt+0x8e/0xc0
[ 534.889251] </IRQ>
[ 534.889254] <TASK>
[ 534.889259] asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 534.889265] RIP: 0010:_raw_spin_unlock_irqrestore+0x38/0x70
[ 534.889271] Code: 74 24 10 e8 ea c2 bf fd 48 89 ef e8 12 53 c0 fd 81 e3 00 02 00 00 75 25 9c 58 f6 c4 02 75 2d 48 85 db 74 01 fb bf 01 00 00 00 <e8> 13 a7 b5 fd 65 8b 05 cc d9 9c 5e 85 c0 74 0a 5b 5d c3 e8 a0 ee
[ 534.889276] RSP: 0018:ffffc90002e5f880 EFLAGS: 00000206
[ 534.889284] RAX: 0000000000000006 RBX: 0000000000000200 RCX: ffffffff9f256f10
[ 534.889289] RDX: 0000000000000000 RSI: ffffffffa1c6e420 RDI: 0000000000000001
[ 534.889293] RBP: ffff8881095e6200 R08: 0000000000000001 R09: ffffffffa40d2b8f
[ 534.889298] R10: fffffbfff481a571 R11: 0000000000000001 R12: ffff8881095e6e68
[ 534.889302] R13: ffffc90002e5f908 R14: 0000000000000246 R15: 0000000000000000
[ 534.889316] ? mark_lock+0xd0/0x14a0
[ 534.889332] klist_next+0x1d4/0x450
[ 534.889340] ? dpm_wait_for_subordinate+0x2d0/0x2d0
[ 534.889350] device_for_each_child+0xa8/0x140
[ 534.889360] ? device_remove_class_symlinks+0x1b0/0x1b0
[ 534.889370] ? __lock_release+0x4bd/0x9f0
[ 534.889378] ? dpm_suspend+0x26b/0x3f0
[ 534.889390] dpm_wait_for_subordinate+
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- b4a0f54156ac7720de1750b6ea06657c91c52163 (Status: affected)
- b4a0f54156ac7720de1750b6ea06657c91c52163 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.17 (Status: affected)
- 0 (Status: unaffected)
- 5.17.2 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/400705c50bbf184794c885d1efad7fe9ccf1471a)
2. [](https://git.kernel.org/stable/c/212ad7cb7d7592669c067125949e0a8e31ce6a0b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6693
- **State**: PUBLISHED
- **Published Date**: January 17, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 16:18 UTC
- **Reserved Date**: January 16, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the WebCam module in Menalto Gallery before 2.2.4 has unknown impact and attack vectors related to a "proxied request."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://gallery.menalto.com/gallery_2.2.4_released)
2. [GLSA-200802-04](http://security.gentoo.org/glsa/glsa-200802-04.xml)
3. [28898](http://secunia.com/advisories/28898)
4. [](http://bugs.gentoo.org/show_bug.cgi?id=203217)
5. [41659](http://osvdb.org/41659) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53504, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53504 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53504
- **State**: PUBLISHED
- **Published Date**: November 29, 2024 at 00:00 UTC
- **Last Updated**: December 02, 2024 at 16:52 UTC
- **Reserved Date**: November 20, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection vulnerability has been identified in Siyuan 3.1.11 via the notebook parameter in /searchHistory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/siyuan-note/siyuan/issues/13058)
2. [](https://github.com/siyuan-note/siyuan/issues/13077) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34708
- **State**: PUBLISHED
- **Published Date**: August 09, 2022 at 19:54 UTC
- **Last Updated**: May 29, 2025 at 20:43 UTC
- **Reserved Date**: June 27, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Kernel Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Kernel Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34708) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28780, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28780 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28780
- **State**: PUBLISHED
- **Published Date**: November 18, 2023 at 22:45 UTC
- **Last Updated**: August 02, 2024 at 13:51 UTC
- **Reserved Date**: March 23, 2023 at 17:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Yoast Yoast Local Premium.This issue affects Yoast Local Premium: from n/a through 14.8.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Yoast - Yoast Local Premium**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wpseo-local/wordpress-yoast-seo-local-plugin-14-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-20813, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-20813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-20813
- **State**: PUBLISHED
- **Published Date**: August 22, 2023 at 00:00 UTC
- **Last Updated**: October 04, 2024 at 16:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.freebuf.com/vuls/215171.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45541
- **State**: PUBLISHED
- **Published Date**: December 26, 2021 at 00:53 UTC
- **Last Updated**: August 04, 2024 at 04:39 UTC
- **Reserved Date**: December 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7900 before 1.0.4.38, R7900P before 1.4.2.84, R8000 before 1.0.4.68, R8000P before 1.4.2.84, RAX200 before 1.0.3.106, MR60 before 1.0.6.110, RAX45 before 1.0.2.72, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000064479/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0246) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22885, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22885 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22885
- **State**: PUBLISHED
- **Published Date**: May 27, 2021 at 11:15 UTC
- **Last Updated**: August 03, 2024 at 18:58 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A possible information disclosure / unintended method execution vulnerability in Action Pack >= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input.
### Weakness Classification (CWE)
- CWE-209: Improper Input Validation
### Affected Products
**n/a - https://github.com/rails/rails**
Affected versions:
- 6.1.3.1, 6.0.3.7, 5.2.4.6, 5.2.6 (Status: affected)
### References
1. [](https://hackerone.com/reports/1106652)
2. [DSA-4929](https://www.debian.org/security/2021/dsa-4929)
3. [](https://security.netapp.com/advisory/ntap-20210805-0009/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4605
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0727, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0727 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0727
- **State**: PUBLISHED
- **Published Date**: February 11, 2020 at 21:23 UTC
- **Last Updated**: August 04, 2024 at 06:11 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when the Connected User Experiences and Telemetry Service improperly handles file operations, aka 'Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability'.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0727) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1765, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1765
- **State**: PUBLISHED
- **Published Date**: March 24, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 13, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
otool in Apple Xcode before 7.3 allows local users to gain privileges or cause a denial of service (memory corruption and application crash) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT206172)
2. [1035352](http://www.securitytracker.com/id/1035352)
3. [APPLE-SA-2016-03-21-4](http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1368, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1368 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1368
- **State**: PUBLISHED
- **Published Date**: October 17, 2007 at 01:00 UTC
- **Last Updated**: August 08, 2024 at 02:28 UTC
- **Reserved Date**: October 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the 32bit FTP client 9.49.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long FTP server banner.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32bit-ftp-banner-bo(11234)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11234)
2. [20030204 Banner Buffer Overflows found in Multible FTP Clients](http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0054.html)
3. [6764](http://www.securityfocus.com/bid/6764) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33066
- **State**: PUBLISHED
- **Published Date**: March 04, 2024 at 10:48 UTC
- **Last Updated**: August 05, 2024 at 13:34 UTC
- **Reserved Date**: May 17, 2023 at 09:28 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption in Audio while processing RT proxy port register driver.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-823: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- 315 5G IoT Modem (Status: affected)
- 9205 LTE Modem (Status: affected)
- 9206 LTE Modem (Status: affected)
- 9207 LTE Modem (Status: affected)
- APQ8017 (Status: affected)
- APQ8030 (Status: affected)
- APQ8037 (Status: affected)
- APQ8064 (Status: affected)
- APQ8064AU (Status: affected)
- APQ8076 (Status: affected)
- APQ8084 (Status: affected)
- AQT1000 (Status: affected)
- AR6003 (Status: affected)
- AR8031 (Status: affected)
- AR8035 (Status: affected)
- AR9374 (Status: affected)
- C-V2X 9150 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- CSRB31024 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Flight RB5 5G Platform (Status: affected)
- Home Hub 100 Platform (Status: affected)
- MDM8207 (Status: affected)
- MDM8215 (Status: affected)
- MDM8215M (Status: affected)
- MDM8615M (Status: affected)
- MDM9205S (Status: affected)
- MDM9215 (Status: affected)
- MDM9225 (Status: affected)
- MDM9225M (Status: affected)
- MDM9230 (Status: affected)
- MDM9235M (Status: affected)
- MDM9250 (Status: affected)
- MDM9310 (Status: affected)
- MDM9330 (Status: affected)
- MDM9615 (Status: affected)
- MDM9615M (Status: affected)
- MDM9625 (Status: affected)
- MDM9625M (Status: affected)
- MDM9628 (Status: affected)
- MDM9630 (Status: affected)
- MDM9635M (Status: affected)
- MDM9640 (Status: affected)
- MDM9650 (Status: affected)
- MPQ8064 (Status: affected)
- MSM8108 (Status: affected)
- MSM8130 (Status: affected)
- MSM8209 (Status: affected)
- MSM8227 (Status: affected)
- MSM8230 (Status: affected)
- MSM8608 (Status: affected)
- MSM8627 (Status: affected)
- MSM8630 (Status: affected)
- MSM8909W (Status: affected)
- MSM8930 (Status: affected)
- MSM8960 (Status: affected)
- MSM8960SG (Status: affected)
- MSM8996AU (Status: affected)
- PM8937 (Status: affected)
- QAM8295P (Status: affected)
- QCA4004 (Status: affected)
- QCA6174 (Status: affected)
- QCA6174A (Status: affected)
- QCA6310 (Status: affected)
- QCA6320 (Status: affected)
- QCA6335 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584 (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCA9367 (Status: affected)
- QCA9377 (Status: affected)
- QCA9379 (Status: affected)
- QCA9984 (Status: affected)
- QCC710 (Status: affected)
- QCM2290 (Status: affected)
- QCM4290 (Status: affected)
- QCM4490 (Status: affected)
- QCM6125 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN6024 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN9011 (Status: affected)
- QCN9012 (Status: affected)
- QCN9024 (Status: affected)
- QCN9074 (Status: affected)
- QCS2290 (Status: affected)
- QCS410 (Status: affected)
- QCS4290 (Status: affected)
- QCS4490 (Status: affected)
- QCS610 (Status: affected)
- QCS6125 (Status: affected)
- QCS6490 (Status: affected)
- QCS7230 (Status: affected)
- QCS8250 (Status: affected)
- QCS8550 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- QRB5165M (Status: affected)
- QRB5165N (Status: affected)
- QSC1215 (Status: affected)
- QSM8250 (Status: affected)
- QTS110 (Status: affected)
- Qualcomm 205 Mobile Platform (Status: affected)
- Qualcomm 215 Mobile Platform (Status: affected)
- Qualcomm Video Collaboration VC1 Platform (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Qualcomm Video Collaboration VC5 Platform (Status: affected)
- Robotics RB3 Platform (Status: affected)
- Robotics RB5 Platform (Status: affected)
- SA4150P (Status: affected)
- SA4155P (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8295P (Status: affected)
- SC8180X+SDX55 (Status: affected)
- SD 455 (Status: affected)
- SD 675 (Status: affected)
- SD 8CX (Status: affected)
- SD460 (Status: affected)
- SD626 (Status: affected)
- SD660 (Status: affected)
- SD662 (Status: affected)
- SD670 (Status: affected)
- SD675 (Status: affected)
- SD730 (Status: affected)
- SD820 (Status: affected)
- SD835 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD888 (Status: affected)
- SDM429W (Status: affected)
- SDX55 (Status: affected)
- SG4150P (Status: affected)
- SG8275P (Status: affected)
- SM4125 (Status: affected)
- SM6250 (Status: affected)
- SM6250P (Status: affected)
- SM7250P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- SM8550P (Status: affected)
- Smart Audio 200 Platform (Status: affected)
- Smart Audio 400 Platform (Status: affected)
- Smart Display 200 Platform (APQ5053-AA) (Status: affected)
- Snapdragon 1100 Wearable Platform (Status: affected)
- Snapdragon 1200 Wearable Platform (Status: affected)
- Snapdragon 208 Processor (Status: affected)
- Snapdragon 210 Processor (Status: affected)
- Snapdragon 212 Mobile Platform (Status: affected)
- Snapdragon 4 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 4 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 425 Mobile Platform (Status: affected)
- Snapdragon 427 Mobile Platform (Status: affected)
- Snapdragon 429 Mobile Platform (Status: affected)
- Snapdragon 430 Mobile Platform (Status: affected)
- Snapdragon 435 Mobile Platform (Status: affected)
- Snapdragon 439 Mobile Platform (Status: affected)
- Snapdragon 450 Mobile Platform (Status: affected)
- Snapdragon 460 Mobile Platform (Status: affected)
- Snapdragon 480 5G Mobile Platform (Status: affected)
- Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected)
- Snapdragon 625 Mobile Platform (Status: affected)
- Snapdragon 626 Mobile Platform (Status: affected)
- Snapdragon 630 Mobile Platform (Status: affected)
- Snapdragon 632 Mobile Platform (Status: affected)
- Snapdragon 636 Mobile Platform (Status: affected)
- Snapdragon 660 Mobile Platform (Status: affected)
- Snapdragon 662 Mobile Platform (Status: affected)
- Snapdragon 665 Mobile Platform (Status: affected)
- Snapdragon 670 Mobile Platform (Status: affected)
- Snapdragon 675 Mobile Platform (Status: affected)
- Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected)
- Snapdragon 680 4G Mobile Platform (Status: affected)
- Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected)
- Snapdragon 690 5G Mobile Platform (Status: affected)
- Snapdragon 695 5G Mobile Platform (Status: affected)
- Snapdragon 710 Mobile Platform (Status: affected)
- Snapdragon 712 Mobile Platform (Status: affected)
- Snapdragon 720G Mobile Platform (Status: affected)
- Snapdragon 730 Mobile Platform (SM7150-AA) (Status: affected)
- Snapdragon 730G Mobile Platform (SM7150-AB) (Status: affected)
- Snapdragon 732G Mobile Platform (SM7150-AC) (Status: affected)
- Snapdragon 750G 5G Mobile Platform (Status: affected)
- Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected)
- Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected)
- Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected)
- Snapdragon 778G 5G Mobile Platform (Status: affected)
- Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected)
- Snapdragon 780G 5G Mobile Platform (Status: affected)
- Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected)
- Snapdragon 7c Compute Platform (SC7180-AC) (Status: affected)
- Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro" (Status: affected)
- Snapdragon 7c+ Gen 3 Compute (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 2 Mobile Platform (Status: affected)
- Snapdragon 820 Automotive Platform (Status: affected)
- Snapdragon 820 Mobile Platform (Status: affected)
- Snapdragon 835 Mobile PC Platform (Status: affected)
- Snapdragon 845 Mobile Platform (Status: affected)
- Snapdragon 850 Mobile Compute Platform (Status: affected)
- Snapdragon 855 Mobile Platform (Status: affected)
- Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180X-AA, AB) (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB) (Status: affected)
- Snapdragon Auto 5G Modem-RF (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon Wear 1300 Platform (Status: affected)
- Snapdragon Wear 2100 Platform (Status: affected)
- Snapdragon Wear 2500 Platform (Status: affected)
- Snapdragon Wear 3100 Platform (Status: affected)
- Snapdragon Wear 4100+ Platform (Status: affected)
- Snapdragon X12 LTE Modem (Status: affected)
- Snapdragon X20 LTE Modem (Status: affected)
- Snapdragon X24 LTE Modem (Status: affected)
- Snapdragon X5 LTE Modem (Status: affected)
- Snapdragon X50 5G Modem-RF System (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X70 Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- Snapdragon XR1 Platform (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- Snapdragon XR2+ Gen 1 Platform (Status: affected)
- Snapdragon Auto 4G Modem (Status: affected)
- SXR1120 (Status: affected)
- SXR2130 (Status: affected)
- Vision Intelligence 100 Platform (APQ8053-AA) (Status: affected)
- Vision Intelligence 200 Platform (APQ8053-AC) (Status: affected)
- Vision Intelligence 300 Platform (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9306 (Status: affected)
- WCD9326 (Status: affected)
- WCD9330 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9360 (Status: affected)
- WCD9370 (Status: affected)
- WCD9371 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN2243 (Status: affected)
- WCN3610 (Status: affected)
- WCN3615 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660 (Status: affected)
- WCN3660A (Status: affected)
- WCN3660B (Status: affected)
- WCN3680 (Status: affected)
- WCN3680B (Status: affected)
- WCN3910 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN3999 (Status: affected)
- WCN6740 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2182
- **State**: PUBLISHED
- **Published Date**: April 22, 2021 at 21:53 UTC
- **Last Updated**: September 26, 2024 at 15:30 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N`
### Affected Products
**Oracle Corporation - iStore**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
- 12.2.3-12.2.10 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42284, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42284
- **State**: PUBLISHED
- **Published Date**: November 10, 2021 at 00:47 UTC
- **Last Updated**: August 04, 2024 at 03:30 UTC
- **Reserved Date**: October 12, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Hyper-V Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42284) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9300, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9300 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9300
- **State**: PUBLISHED
- **Published Date**: August 13, 2019 at 16:41 UTC
- **Last Updated**: August 06, 2024 at 08:43 UTC
- **Reserved Date**: August 12, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The events-manager plugin before 5.5.7 for WordPress has multiple XSS issues.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/events-manager/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4882, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4882 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4882
- **State**: PUBLISHED
- **Published Date**: February 27, 2018 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 05:18 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the string literal parser. A successful attack can lead to sensitive data exposure.
### Affected Products
**n/a - Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions**
Affected versions:
- Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions (Status: affected)
### References
1. [102996](http://www.securityfocus.com/bid/102996)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb18-02.html)
3. [1040364](http://www.securitytracker.com/id/1040364) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32017, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32017
- **State**: PUBLISHED
- **Published Date**: May 01, 2024 at 06:14 UTC
- **Last Updated**: February 13, 2025 at 17:52 UTC
- **Reserved Date**: April 09, 2024 at 15:29 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
RIOT is a real-time multi-threading operating system that supports a range of devices that are typically 8-bit, 16-bit and 32-bit microcontrollers. The size check in the `gcoap_dns_server_proxy_get()` function contains a small typo that may lead to a buffer overflow in the subsequent `strcpy()`. In detail, the length of the `_uri` string is checked instead of the length of the `_proxy` string. The `_gcoap_forward_proxy_copy_options()` function does not implement an explicit size check before copying data to the `cep->req_etag` buffer that is `COAP_ETAG_LENGTH_MAX` bytes long. If an attacker can craft input so that `optlen` becomes larger than `COAP_ETAG_LENGTH_MAX`, they can cause a buffer overflow. If the input above is attacker-controlled and crosses a security boundary, the impact of the buffer overflow vulnerabilities could range from denial of service to arbitrary code execution. This issue has yet to be patched. Users are advised to add manual bounds checking.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**RIOT-OS - RIOT**
Affected versions:
- <= 2023.10 (Status: affected)
### References
1. [https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-v97j-w9m6-c4h3](https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-v97j-w9m6-c4h3)
2. [https://github.com/RIOT-OS/RIOT/blob/master/sys/net/application_layer/gcoap/dns.c#L319-L325](https://github.com/RIOT-OS/RIOT/blob/master/sys/net/application_layer/gcoap/dns.c#L319-L325)
3. [https://github.com/RIOT-OS/RIOT/blob/master/sys/net/application_layer/gcoap/forward_proxy.c#L352](https://github.com/RIOT-OS/RIOT/blob/master/sys/net/application_layer/gcoap/forward_proxy.c#L352)
4. [](http://www.openwall.com/lists/oss-security/2024/05/07/3)
5. [](http://seclists.org/fulldisclosure/2024/May/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9598, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9598
- **State**: PUBLISHED
- **Published Date**: January 21, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 13:47 UTC
- **Reserved Date**: January 15, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The picture_Release function in misc/picture.c in VideoLAN VLC media player 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service (write access violation) via a crafted M2V file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.binarysniper.net/2015/01/vlc-media-player-215-memory-corruption.html)
2. [](https://trac.videolan.org/vlc/ticket/13390)
3. [20150116 VLC Media Player 2.1.5 Memory Corruption Vulnerabilities (CVE-2014-9597, CVE-2014-9597)](http://seclists.org/fulldisclosure/2015/Jan/72)
4. [GLSA-201603-08](https://security.gentoo.org/glsa/201603-08)
5. [](https://trac.videolan.org/vlc/attachment/ticket/13390/windbglog.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6638
- **State**: PUBLISHED
- **Published Date**: June 08, 2017 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 15:33 UTC
- **Reserved Date**: March 09, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in how DLL files are loaded with Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and run an executable file with privileges equivalent to the Microsoft Windows SYSTEM account. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. The attacker would need valid user credentials to exploit this vulnerability. This vulnerability affects all Cisco AnyConnect Secure Mobility Client for Windows software versions prior to 4.4.02034. Cisco Bug IDs: CSCvc97928.
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**n/a - Cisco AnyConnect Local Privilege Escalation Vulnerability**
Affected versions:
- Cisco AnyConnect Local Privilege Escalation Vulnerability (Status: affected)
### References
1. [98938](http://www.securityfocus.com/bid/98938)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-anyconnect)
3. [1038627](http://www.securitytracker.com/id/1038627) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49293, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49293
- **State**: PUBLISHED
- **Published Date**: December 04, 2023 at 23:03 UTC
- **Last Updated**: May 29, 2025 at 13:40 UTC
- **Reserved Date**: November 24, 2023 at 16:45 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Vite is a website frontend framework. When Vite's HTML transformation is invoked manually via `server.transformIndexHtml`, the original request URL is passed in unmodified, and the `html` being transformed contains inline module scripts (`<script type="module">...</script>`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in vite@5.0.5, vite@4.5.1, and vite@4.4.12. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**vitejs - vite**
Affected versions:
- >=4.4.0, < 4.4.12 (Status: affected)
- = 4.5.0 (Status: affected)
- >=5.0.0, < 5.0.5 (Status: affected)
### References
1. [https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97](https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3758, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3758 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3758
- **State**: PUBLISHED
- **Published Date**: July 11, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:03 UTC
- **Reserved Date**: March 30, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
Multiple buffer overflows in libdex/OptInvocation.cpp in DexClassLoader in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allow attackers to gain privileges via a crafted application that provides a long filename, aka internal bug 27840771.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://android.googlesource.com/platform/dalvik/+/338aeaf28e9981c15d0673b18487dba61eb5447c)
2. [](http://source.android.com/security/bulletin/2016-07-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2666, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2666 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2666
- **State**: PUBLISHED
- **Published Date**: August 07, 2009 at 18:33 UTC
- **Last Updated**: August 07, 2024 at 05:59 UTC
- **Reserved Date**: August 05, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2009:201](http://www.mandriva.com/security/advisories?name=MDVSA-2009:201)
2. [36175](http://secunia.com/advisories/36175)
3. [36236](http://secunia.com/advisories/36236)
4. [DSA-1852](http://www.debian.org/security/2009/dsa-1852)
5. [](http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt)
6. [[oss-security] 20090805 Re: CVE request: fetchmail <= 6.3.10 SSL certificate](http://marc.info/?l=oss-security&m=124949601207156&w=2)
7. [20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)](http://www.securityfocus.com/archive/1/505530/100/0/threaded)
8. [SSA:2009-218-01](http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.543463)
9. [36179](http://secunia.com/advisories/36179)
10. [1022679](http://www.securitytracker.com/id?1022679)
11. [56855](http://osvdb.org/56855)
12. [oval:org.mitre.oval:def:11059](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059)
13. [ADV-2009-3184](http://www.vupen.com/english/advisories/2009/3184)
14. [ADV-2009-2155](http://www.vupen.com/english/advisories/2009/2155)
15. [APPLE-SA-2009-11-09-1](http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html)
16. [](http://support.apple.com/kb/HT3937)
17. [35951](http://www.securityfocus.com/bid/35951) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37384, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37384 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37384
- **State**: PUBLISHED
- **Published Date**: July 17, 2023 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
RCE (Remote Code Execution) vulnerability was found in some Furukawa ONU models, this vulnerability allows remote unauthenticated users to send arbitrary commands to the device via web interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cwe.mitre.org/data/definitions/94.html)
2. [](https://owasp.org/www-community/attacks/Code_Injection)
3. [](https://gist.githubusercontent.com/LuigiPolidorio/9fe61cf2edee63152161ffc52c39f6cd/raw/529cf49103e0fdf4eeb970fa1f62fa508ebe7c3c/reference.txt)
4. [](https://www.softwall.com.br/cves/publicacao-rce-html-injection-furukawa/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42927, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42927
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 15:46 UTC
- **Reserved Date**: October 14, 2022 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A same-origin policy violation could have allowed the theft of cross-origin URL entries, leaking the result of a redirect, via `performance.getEntries()`. This vulnerability affects Firefox < 106, Firefox ESR < 102.4, and Thunderbird < 102.4.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1789128)
2. [](https://www.mozilla.org/security/advisories/mfsa2022-44/)
3. [](https://www.mozilla.org/security/advisories/mfsa2022-45/)
4. [](https://www.mozilla.org/security/advisories/mfsa2022-46/)
### Credits
- James Lee |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1730, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1730 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1730
- **State**: PUBLISHED
- **Published Date**: June 10, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 04:54 UTC
- **Reserved Date**: February 17, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS15-056](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-056)
2. [40881](https://www.exploit-db.com/exploits/40881/)
3. [](http://blog.skylined.nl/20161206001.html)
4. [20150701 Microsoft Internet Explorer "JavascriptStackWalker" Invalid Pointer Reference Vulnerability](https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1099)
5. [](http://packetstormsecurity.com/files/140050/Microsoft-Internet-Explorer-9-jscript9-JavaScriptStackWalker-Memory-Corruption.html)
6. [1032521](http://www.securitytracker.com/id/1032521) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4650
- **State**: PUBLISHED
- **Published Date**: February 20, 2020 at 16:01 UTC
- **Last Updated**: August 06, 2024 at 11:20 UTC
- **Reserved Date**: June 25, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://openwall.com/lists/oss-security/2014/06/26/3)
2. [](http://bugs.python.org/issue21766)
3. [Red Hat](https://access.redhat.com/security/cve/cve-2014-4650) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11358
- **State**: PUBLISHED
- **Published Date**: July 31, 2017 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 18:05 UTC
- **Reserved Date**: July 16, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The read_samples function in hcom.c in Sound eXchange (SoX) 14.4.2 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted hcom file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [42398](https://www.exploit-db.com/exploits/42398/)
2. [[debian-lts-announce] 20171130 [SECURITY] [DLA 1197-1] sox security update](https://lists.debian.org/debian-lts-announce/2017/11/msg00043.html)
3. [](http://seclists.org/fulldisclosure/2017/Jul/81)
4. [GLSA-201810-02](https://security.gentoo.org/glsa/201810-02)
5. [[debian-lts-announce] 20190305 [SECURITY] [DLA 1705-1] sox security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00007.html)
6. [[oss-security] 20230203 sox: patches for old vulnerabilities](http://www.openwall.com/lists/oss-security/2023/02/03/3)
7. [[oss-security] 20230204 Re: sox: patches for old vulnerabilities](http://www.openwall.com/lists/oss-security/2023/02/04/2)
8. [[oss-security] 20230205 Re: sox: patches for old vulnerabilities](http://www.openwall.com/lists/oss-security/2023/02/05/1)
9. [[oss-security] 20230206 Re: sox: patches for old vulnerabilities](http://www.openwall.com/lists/oss-security/2023/02/06/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0772, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0772
- **State**: PUBLISHED
- **Published Date**: March 13, 2023 at 16:03 UTC
- **Last Updated**: February 27, 2025 at 21:10 UTC
- **Reserved Date**: February 10, 2023 at 11:01 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Popup Builder by OptinMonster WordPress plugin before 2.12.2 does not ensure that the campaign to be loaded via some shortcodes is actually a campaign, allowing any authenticated users such as subscriber to retrieve the content of arbitrary posts, like draft, private or even password protected ones.
### Weakness Classification (CWE)
- CWE-639 Authorization Bypass Through User-Controlled Key: Security Weakness
### Affected Products
**Unknown - Popup Builder by OptinMonster**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/28754886-b7b4-44f7-9042-b81c542d3c9c)
### Credits
- Erwan LR (WPScan)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47117, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47117
- **State**: PUBLISHED
- **Published Date**: December 10, 2024 at 13:49 UTC
- **Last Updated**: December 10, 2024 at 14:48 UTC
- **Reserved Date**: September 18, 2024 at 19:27 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Carbon Design System (Carbon Charts 0.4.0 through 1.13.16) is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**IBM - Carbon Charts**
Affected versions:
- 0.4.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7178269) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11777, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11777 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11777
- **State**: PUBLISHED
- **Published Date**: January 07, 2025 at 03:21 UTC
- **Last Updated**: January 07, 2025 at 16:28 UTC
- **Reserved Date**: November 26, 2024 at 15:31 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Sell Media plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sell_media_search_form_gutenberg' shortcode in all versions up to, and including, 2.5.8.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**endortrails - Sell Media**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/8a35f0bb-691f-4acf-a30d-4ddabe3b919c?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/sell-media/trunk//gutenberg/blocks/sell-media-search-form/sell-media-search-form.php#L219)
3. [](https://wordpress.org/plugins/sell-media/)
### Credits
- Djaidja Moundjid |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3195
- **State**: PUBLISHED
- **Published Date**: October 08, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:35 UTC
- **Reserved Date**: May 03, 2014 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Google V8, as used in Google Chrome before 38.0.2125.101, does not properly track JavaScript heap-memory allocations as allocations of uninitialized memory and does not properly concatenate arrays of double-precision floating-point numbers, which allows remote attackers to obtain sensitive information via crafted JavaScript code, related to the PagedSpace::AllocateRaw and NewSpace::AllocateRaw functions in heap/spaces-inl.h, the LargeObjectSpace::AllocateRaw function in heap/spaces.cc, and the Runtime_ArrayConcat function in runtime.cc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2014:1626](http://rhn.redhat.com/errata/RHSA-2014-1626.html)
2. [](https://crbug.com/403409)
3. [](https://code.google.com/p/v8/source/detail?r=23144)
4. [](https://code.google.com/p/v8/source/detail?r=23268)
5. [70273](http://www.securityfocus.com/bid/70273)
6. [](http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22326, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22326 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22326
- **State**: PUBLISHED
- **Published Date**: July 31, 2022 at 16:05 UTC
- **Last Updated**: September 16, 2024 at 18:03 UTC
- **Reserved Date**: January 03, 2022 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Datapower Gateway 10.0.2.0 through 10.0.4.0, 10.0.1.0 through 10.0.1.5, and 2018.4.1.0 through 2018.4.1.18 could allow unauthorized viewing of logs and files due to insufficient authorization checks. IBM X-Force ID: 218856.
### Affected Products
**IBM - DataPower Gateway**
Affected versions:
- 2018.4.1.0 (Status: affected)
- 10.0.1.0 (Status: affected)
- 10.0.2.0 (Status: affected)
- 10.0.4.0 (Status: affected)
- 2018.4.1.18 (Status: affected)
- 10.1.0.5 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6560048)
2. [](https://www.ibm.com/support/pages/node/6608598)
3. [ibm-mq-cve202222326-info-disc (218856)](https://exchange.xforce.ibmcloud.com/vulnerabilities/218856) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9355, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9355
- **State**: PUBLISHED
- **Published Date**: February 13, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 16, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An issue was discovered in Becton, Dickinson and Company (BD) Alaris 8015 Point of Care (PC) unit, Version 9.5 and prior versions, and Version 9.7. An unauthorized user with physical access to an Alaris 8015 PC unit may be able to obtain unencrypted wireless network authentication credentials and other sensitive technical data by disassembling an Alaris 8015 PC unit and accessing the device's flash memory. Older software versions of the Alaris 8015 PC unit, Version 9.5 and prior versions, store wireless network authentication credentials and other sensitive technical data on the affected device's removable flash memory. Being able to remove the flash memory from the affected device reduces the risk of detection, allowing an attacker to extract stored data at the attacker's convenience.
### Affected Products
**n/a - BD Alaris 8015 Insufficiently Protected Credentials Vulnerabilities**
Affected versions:
- BD Alaris 8015 Insufficiently Protected Credentials Vulnerabilities (Status: affected)
### References
1. [96116](http://www.securityfocus.com/bid/96116)
2. [](https://ics-cert.us-cert.gov/advisories/ICSMA-17-017-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0889, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0889
- **State**: PUBLISHED
- **Published Date**: March 26, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:28 UTC
- **Reserved Date**: March 26, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in index.php for Dream4 Koobi CMS 4.2.3 allows remote attackers to inject arbitrary web script or HTML via the area parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [12895](http://www.securityfocus.com/bid/12895)
2. [1013558](http://securitytracker.com/id?1013558) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8317, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8317
- **State**: PUBLISHED
- **Published Date**: July 24, 2020 at 16:10 UTC
- **Last Updated**: September 17, 2024 at 00:10 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
A DLL search path vulnerability was reported in Lenovo Drivers Management prior to version 2.7.1128.1046 that could allow an authenticated user to execute code with elevated privileges.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-426: Security Weakness
### Affected Products
**Lenovo - Drivers Management**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://iknow.lenovo.com.cn/detail/dc_190088.html)
### Credits
- Lenovo thanks Can Huang and Xinhui Han at Wangxuan Institute of Computer Technology, Peking University for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18906
- **State**: PUBLISHED
- **Published Date**: June 30, 2021 at 08:35 UTC
- **Last Updated**: September 16, 2024 at 21:03 UTC
- **Reserved Date**: November 12, 2019 at 00:00 UTC
- **Assigned By**: suse
### Vulnerability Description
A Improper Authentication vulnerability in cryptctl of SUSE Linux Enterprise Server for SAP 12-SP5, SUSE Manager Server 4.0 allows attackers with access to the hashed password to use it without having to crack it. This issue affects: SUSE Linux Enterprise Server for SAP 12-SP5 cryptctl versions prior to 2.4. SUSE Manager Server 4.0 cryptctl versions prior to 2.4.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**SUSE - SUSE Linux Enterprise Server for SAP 12-SP5**
Affected versions:
- cryptctl (Status: affected)
**SUSE - SUSE Manager Server 4.0**
Affected versions:
- cryptctl (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=1186226)
### Credits
- Malte Kraus of SUSE |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1396, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1396 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1396
- **State**: PUBLISHED
- **Published Date**: June 11, 2010 at 17:28 UTC
- **Last Updated**: August 07, 2024 at 01:21 UTC
- **Reserved Date**: April 15, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the contentEditable attribute and removing container elements.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2011:039](http://www.mandriva.com/security/advisories?name=MDVSA-2011:039)
2. [](http://support.apple.com/kb/HT4220)
3. [ADV-2010-2722](http://www.vupen.com/english/advisories/2010/2722)
4. [43068](http://secunia.com/advisories/43068)
5. [](http://www.zerodayinitiative.com/advisories/ZDI-10-092)
6. [oval:org.mitre.oval:def:7288](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7288)
7. [USN-1006-1](http://www.ubuntu.com/usn/USN-1006-1)
8. [41856](http://secunia.com/advisories/41856)
9. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212)
10. [](http://support.apple.com/kb/HT4225)
11. [APPLE-SA-2010-06-07-1](http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html)
12. [40647](http://www.securityfocus.com/bid/40647)
13. [40196](http://secunia.com/advisories/40196)
14. [40105](http://secunia.com/advisories/40105)
15. [ADV-2010-1373](http://www.vupen.com/english/advisories/2010/1373)
16. [APPLE-SA-2010-06-16-1](http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html)
17. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html)
18. [ADV-2010-1512](http://www.vupen.com/english/advisories/2010/1512)
19. [40620](http://www.securityfocus.com/bid/40620)
20. [ADV-2011-0552](http://www.vupen.com/english/advisories/2011/0552)
21. [1024067](http://securitytracker.com/id?1024067)
22. [](http://support.apple.com/kb/HT4196)
23. [APPLE-SA-2010-06-21-1](http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12858, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12858 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12858
- **State**: REJECTED
- **Published Date**: March 13, 2025 at 16:47 UTC
- **Last Updated**: April 02, 2025 at 15:02 UTC
- **Reserved Date**: December 20, 2024 at 16:52 UTC
- **Assigned By**: icscert
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25448
- **State**: PUBLISHED
- **Published Date**: May 22, 2023 at 14:20 UTC
- **Last Updated**: January 08, 2025 at 22:06 UTC
- **Reserved Date**: February 06, 2023 at 12:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Eric Teubert Archivist – Custom Archive Templates plugin <= 1.7.4 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Eric Teubert - Archivist – Custom Archive Templates**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/archivist-custom-archive-templates/wordpress-archivist-custom-archive-templates-plugin-1-7-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- yuyudhn (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19614, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19614
- **State**: PUBLISHED
- **Published Date**: March 09, 2020 at 18:51 UTC
- **Last Updated**: August 05, 2024 at 02:25 UTC
- **Reserved Date**: December 05, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Halvotec RAQuest 10.23.10801.0. The login page is vulnerable to wildcard injection, allowing an attacker to enumerate the list of users sharing an identical password. Fixed in Release 10.24.11206.1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://excellium-services.com/cert-xlm-advisory/)
2. [](https://excellium-services.com/cert-xlm-advisory/cve-2019-19614/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41608
- **State**: PUBLISHED
- **Published Date**: May 22, 2023 at 09:55 UTC
- **Last Updated**: January 08, 2025 at 22:06 UTC
- **Reserved Date**: September 27, 2022 at 08:42 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Thomas Belser Asgaros Forum plugin <= 2.2.0 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Thomas Belser - Asgaros Forum**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/asgaros-forum/wordpress-asgaros-forum-plugin-2-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- dhakal_ananda (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1103, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1103
- **State**: PUBLISHED
- **Published Date**: December 01, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:39 UTC
- **Reserved Date**: November 30, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MailPost 5.1.1sv, and possibly earlier versions, when debug mode is enabled, allows remote attackers to gain sensitive information via the debug parameter, which reveals information such as the path to the web root and the web server version.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [mailpost-information-disclosure(17952)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17952)
2. [](http://www.procheckup.com/security_info/vuln_pr0409.html)
3. [11595](http://www.securityfocus.com/bid/11595)
4. [VU#858726](http://www.kb.cert.org/vuls/id/858726) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4063
- **State**: PUBLISHED
- **Published Date**: December 07, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:31 UTC
- **Reserved Date**: December 07, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in NetAuctionHelp 3.0 and earlier allow remote attackers to inject arbitrary HTML and web script via the (1) L, (2) sort, (3) category, (4) categoryname parameters to search.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2005-2761](http://www.vupen.com/english/advisories/2005/2761)
2. [21474](http://www.osvdb.org/21474)
3. [17902](http://secunia.com/advisories/17902)
4. [](http://pridels0.blogspot.com/2005/12/netauctionhelp-v30-xss-vuln.html)
5. [15737](http://www.securityfocus.com/bid/15737) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1860, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1860 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1860
- **State**: PUBLISHED
- **Published Date**: April 05, 2023 at 08:31 UTC
- **Last Updated**: August 02, 2024 at 06:05 UTC
- **Reserved Date**: April 05, 2023 at 06:30 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Keysight IXIA Hawkeye 3.3.16.28. It has been declared as problematic. This vulnerability affects unknown code of the file /licenses. The manipulation of the argument view with the input teste"><script>alert(%27c4ng4c3ir0%27)</script> leads to cross site scripting. The attack can be initiated remotely. VDB-224998 is the identifier assigned to this vulnerability. NOTE: Vendor did not respond if and how they may handle this issue.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Keysight - IXIA Hawkeye**
Affected versions:
- 3.3.16.28 (Status: affected)
### References
1. [](https://vuldb.com/?id.224998)
2. [](https://vuldb.com/?ctiid.224998)
### Credits
- c4ng4c3ir0 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5942
- **State**: PUBLISHED
- **Published Date**: September 18, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:03 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Baby Stomach Surgery (aka com.harriskerioe.stomachsurgery) application 1.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#111257](http://www.kb.cert.org/vuls/id/111257)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4900
- **State**: PUBLISHED
- **Published Date**: November 02, 2023 at 15:01 UTC
- **Last Updated**: February 13, 2025 at 16:34 UTC
- **Reserved Date**: January 31, 2023 at 10:50 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**n/a - php**
Affected versions:
- 8.0.22 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 9**
**Red Hat - Red Hat Enterprise Linux 9**
**Red Hat - Red Hat Software Collections**
**Fedora - Fedora**
### References
1. [](https://access.redhat.com/security/cve/CVE-2022-4900)
2. [RHBZ#2179880](https://bugzilla.redhat.com/show_bug.cgi?id=2179880)
3. [](https://security.netapp.com/advisory/ntap-20231130-0008/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0822, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0822 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0822
- **State**: PUBLISHED
- **Published Date**: February 25, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 04:26 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2015:0446](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html)
2. [SUSE-SU-2015:0447](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html)
3. [RHSA-2015:0642](http://rhn.redhat.com/errata/RHSA-2015-0642.html)
4. [openSUSE-SU-2015:0448](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html)
5. [USN-2506-1](http://www.ubuntu.com/usn/USN-2506-1)
6. [openSUSE-SU-2015:0567](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html)
7. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01)
8. [openSUSE-SU-2015:0404](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html)
9. [RHSA-2015:0265](http://rhn.redhat.com/errata/RHSA-2015-0265.html)
10. [1031792](http://www.securitytracker.com/id/1031792)
11. [DSA-3174](http://www.debian.org/security/2015/dsa-3174)
12. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html)
13. [openSUSE-SU-2015:1266](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html)
14. [DSA-3179](http://www.debian.org/security/2015/dsa-3179)
15. [RHSA-2015:0266](http://rhn.redhat.com/errata/RHSA-2015-0266.html)
16. [1031791](http://www.securitytracker.com/id/1031791)
17. [](http://www.mozilla.org/security/announce/2015/mfsa2015-24.html)
18. [72756](http://www.securityfocus.com/bid/72756)
19. [openSUSE-SU-2015:0570](http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html)
20. [USN-2505-1](http://www.ubuntu.com/usn/USN-2505-1)
21. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1110557)
22. [SUSE-SU-2015:0412](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43635, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43635
- **State**: PUBLISHED
- **Published Date**: March 29, 2023 at 00:00 UTC
- **Last Updated**: February 12, 2025 at 17:41 UTC
- **Reserved Date**: October 21, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR940N 6_211111 3.20.1(US) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the incorrect implementation of the authentication algorithm. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-17332.
### Weakness Classification (CWE)
- CWE-303: Security Weakness
### Affected Products
**TP-Link - TL-WR940N**
Affected versions:
- 6_211111 3.20.1(US) (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1615/)
### Credits
- ExLuck |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3533, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3533
- **State**: PUBLISHED
- **Published Date**: October 18, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 23:37 UTC
- **Reserved Date**: September 16, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 8.9 allows remote authenticated users to affect confidentiality and integrity, related to Job Profile Manager (JPM).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html)
2. [46505](http://secunia.com/advisories/46505)
3. [50249](http://www.securityfocus.com/bid/50249)
4. [ops-psehrms-jpm-unspecified(70806)](https://exchange.xforce.ibmcloud.com/vulnerabilities/70806) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10865, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10865
- **State**: PUBLISHED
- **Published Date**: May 14, 2025 at 14:18 UTC
- **Last Updated**: May 20, 2025 at 14:25 UTC
- **Reserved Date**: November 05, 2024 at 14:11 UTC
- **Assigned By**: OpenText
### Vulnerability Description
Improper Input validation leads to XSS or Cross-site Scripting vulnerability in OpenText Advanced Authentication. This issue affects Advanced Authentication versions before 6.5.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**OpenText - Advance Authentication**
Affected versions:
- 6.5 (Status: affected)
### References
1. [](https://www.netiq.com/documentation/advanced-authentication-65/advanced-authentication-releasenotes-6.5/data/advanced-authentication-releasenotes-6.5.html)
### Credits
- Maksymilian Kubiak and Sławomir Zakrzewski [AFINE Team] |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27475
- **State**: PUBLISHED
- **Published Date**: March 07, 2023 at 17:40 UTC
- **Last Updated**: February 25, 2025 at 15:00 UTC
- **Reserved Date**: March 01, 2023 at 19:03 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Goutil is a collection of miscellaneous functionality for the go language. In versions prior to 0.6.0 when users use fsutil.Unzip to unzip zip files from a malicious attacker, they may be vulnerable to path traversal. This vulnerability is known as a ZipSlip. This issue has been fixed in version 0.6.0, users are advised to upgrade. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**gookit - goutil**
Affected versions:
- < 0.6.0 (Status: affected)
### References
1. [https://github.com/gookit/goutil/security/advisories/GHSA-fx2v-qfhr-4chv](https://github.com/gookit/goutil/security/advisories/GHSA-fx2v-qfhr-4chv)
2. [https://github.com/gookit/goutil/commit/d7b94fede71f018f129f7d21feb58c895d28dadc](https://github.com/gookit/goutil/commit/d7b94fede71f018f129f7d21feb58c895d28dadc)
3. [](https://security.netapp.com/advisory/ntap-20230427-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8129
- **State**: PUBLISHED
- **Published Date**: August 24, 2024 at 15:31 UTC
- **Last Updated**: August 26, 2024 at 13:13 UTC
- **Reserved Date**: August 23, 2024 at 18:29 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected is the function cgi_s3_modify of the file /cgi-bin/s3.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_job_name leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**D-Link - DNS-120**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNR-202L**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-315L**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-320**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-320L**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-320LW**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-321**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNR-322L**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-323**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-325**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-326**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-327L**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNR-326**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-340L**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-343**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-345**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-726-4**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-1100-4**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-1200-05**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-1550-04**
Affected versions:
- 20240814 (Status: affected)
### References
1. [VDB-275700 | D-Link DNS-1550-04 HTTP POST Request s3.cgi cgi_s3_modify command injection](https://vuldb.com/?id.275700)
2. [VDB-275700 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275700)
3. [Submit #396290 | D-Link DNS 320/320L/321/323/325/327L Command Injection](https://vuldb.com/?submit.396290)
4. [](https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_s3_modify.md)
5. [](https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383)
6. [](https://www.dlink.com/)
### Credits
- Buaa1otTeam (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8276, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8276 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8276
- **State**: PUBLISHED
- **Published Date**: January 18, 2019 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 16:34 UTC
- **Reserved Date**: April 25, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Improper authorization involving a fuse in TrustZone in snapdragon automobile, snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM439, SDM630, SDM660, SDX24, Snapdragon_High_Med_2016.
### Affected Products
**Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- MDM9206, MDM9607, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM439, SDM630, SDM660, SDX24, Snapdragon_High_Med_2016 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins)
2. [106128](http://www.securityfocus.com/bid/106128) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34402, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34402 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34402
- **State**: PUBLISHED
- **Published Date**: January 18, 2022 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 00:12 UTC
- **Reserved Date**: June 09, 2021 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA Tegra kernel driver contains a vulnerability in NVIDIA NVDEC, where a user with high privileges might be able to read from or write to a memory location that is outside the intended boundary of the buffer, which may lead to denial of service, Information disclosure, loss of Integrity, or possible escalation of privileges.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**NVIDIA - SHIELD TV**
Affected versions:
- All versions prior to SE 9.0 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5259) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26365
- **State**: PUBLISHED
- **Published Date**: July 05, 2022 at 12:50 UTC
- **Last Updated**: August 03, 2024 at 05:03 UTC
- **Reserved Date**: March 02, 2022 at 00:00 UTC
- **Assigned By**: XEN
### Vulnerability Description
Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).
### Affected Products
**Linux - Linux**
Affected versions:
- consult Xen advisory XSA-403 (Status: unknown)
**Xen - xen**
Affected versions:
- consult Xen advisory XSA-403 (Status: unknown)
### References
1. [](https://xenbits.xenproject.org/xsa/advisory-403.txt)
2. [](http://xenbits.xen.org/xsa/advisory-403.html)
3. [[oss-security] 20220705 Xen Security Advisory 403 v3 (CVE-2022-26365,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742) - Linux disk/nic frontends data leaks](http://www.openwall.com/lists/oss-security/2022/07/05/6)
4. [FEDORA-2022-c4ec706488](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGFTRZ66KQYTSYIRT5FRHF5D6O72NWOP/)
5. [FEDORA-2022-2c9f8224f8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/)
6. [DSA-5191](https://www.debian.org/security/2022/dsa-5191)
7. [[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update](https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html)
### Credits
- {'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'The issue related to not zeroing memory areas used for shared communications\nwas discovered by Roger Pau Monné of Citrix.\n\nThe issue related to leaking contiguous data in granted pages was disclosed\npublicly.'}]}}} |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44959, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44959
- **State**: PUBLISHED
- **Published Date**: December 02, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 20:17 UTC
- **Reserved Date**: November 07, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /meetings/listmeetings.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://webtareas.com)
2. [](https://github.com/anhdq201/webtareas/issues/6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17326, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17326 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17326
- **State**: PUBLISHED
- **Published Date**: March 09, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 20:51 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei Mate 9 Pro Smartphones with software of LON-AL00BC00B139D; LON-AL00BC00B229 have an activation lock bypass vulnerability. The smartphone is supposed to be activated by the former account after reset if find my phone function is on. The software does not have a sufficient protection of activation lock. Successful exploit could allow an attacker to bypass the activation lock and activate the smartphone by a new account after a series of operation.
### Affected Products
**Huawei Technologies Co., Ltd. - Mate 9 Pro**
Affected versions:
- Mate 9 Pro LON-AL00BC00B139D (Status: affected)
- LON-AL00BC00B229 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-smartphone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25329, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25329
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 00:00 UTC
- **Last Updated**: February 28, 2025 at 15:16 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Tencent Technology (Beijing) Company Limited Tencent MicroVision iOS 8.137.0 allows attackers to access sensitive user information via supplying a crafted link.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ZhouZiyi1/Vuls/blob/main/250116-TencentMicroVision/250116-TencentMicroVision.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42125, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42125
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:13 UTC
- **Last Updated**: September 20, 2024 at 19:07 UTC
- **Reserved Date**: September 06, 2023 at 21:14 UTC
- **Assigned By**: zdi
### Vulnerability Description
Avast Premium Security Sandbox Protection Link Following Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the implementation of the sandbox feature. By creating a symbolic link, an attacker can abuse the service to create arbitrary namespace objects. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
. Was ZDI-CAN-20383.
### Weakness Classification (CWE)
- CWE-706: Security Weakness
### Affected Products
**Avast - Premium Security**
Affected versions:
- Avast Premium Security 22.12.6044 (build 22.12.7758.769) (Status: affected)
### References
1. [ZDI-23-1475](https://www.zerodayinitiative.com/advisories/ZDI-23-1475/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5773, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5773
- **State**: PUBLISHED
- **Published Date**: August 16, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 06:59 UTC
- **Reserved Date**: August 06, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
QL Office in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted office document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/kb/HT205030)
2. [1033275](http://www.securitytracker.com/id/1033275)
3. [APPLE-SA-2015-08-13-2](http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html)
4. [APPLE-SA-2015-08-13-3](http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html)
5. [](https://support.apple.com/kb/HT205031)
6. [76343](http://www.securityfocus.com/bid/76343) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1651, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1651
- **State**: PUBLISHED
- **Published Date**: July 26, 2022 at 16:37 UTC
- **Last Updated**: August 03, 2024 at 00:10 UTC
- **Reserved Date**: May 10, 2022 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.
### Weakness Classification (CWE)
- CWE-401: Security Weakness
### Affected Products
**n/a - Kernel**
Affected versions:
- Linux kernel version prior to kernel 5.18 rc1 (Status: affected)
### References
1. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b)
2. [](https://security.netapp.com/advisory/ntap-20220901-0008/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8980
- **State**: PUBLISHED
- **Published Date**: October 22, 2024 at 14:43 UTC
- **Last Updated**: October 22, 2024 at 15:08 UTC
- **Reserved Date**: September 18, 2024 at 18:04 UTC
- **Assigned By**: Liferay
### Vulnerability Description
The Script Console in Liferay Portal 7.0.0 through 7.4.3.101, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, 7.2 GA through fix pack 20, 7.1 GA through fix pack 28, 7.0 GA through fix pack 102 and 6.2 GA through fix pack 173
does not sufficiently protect against Cross-Site Request Forgery (CSRF) attacks, which allows remote attackers to execute arbitrary Groovy script via a crafted URL or a XSS vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 9.6/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Liferay - Portal**
Affected versions:
- 7.0.0 (Status: affected)
**Liferay - DXP**
Affected versions:
- 6.2.0 (Status: affected)
- 7.0.10 (Status: affected)
- 7.1.10 (Status: affected)
- 7.2.10 (Status: affected)
- 7.3.10 (Status: affected)
- 7.4.13 (Status: affected)
- 2023.Q3.1 (Status: affected)
### References
1. [](https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-8980) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0613, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0613 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0613
- **State**: PUBLISHED
- **Published Date**: January 14, 2014 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 09:20 UTC
- **Reserved Date**: December 31, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The XNM command processor in Juniper Junos 10.4 before 10.4R16, 11.4 before 11.4R10, 12.1R before 12.1R8-S2, 12.1X44 before 12.1X44-D30, 12.1X45 before 12.1X45-D20, 12.1X46 before 12.1X46-D10, 12.2 before 12.2R7, 12.3 before 12.3R5, 13.1 before 13.1R3-S1, 13.2 before 13.2R2-S2, and 13.3 before 13.3R1, when xnm-ssl or xnm-clear-text is enabled, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [101861](http://osvdb.org/101861)
2. [1029586](http://www.securitytracker.com/id/1029586)
3. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10607) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4731, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4731 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4731
- **State**: PUBLISHED
- **Published Date**: March 12, 2024 at 09:33 UTC
- **Last Updated**: August 02, 2024 at 07:37 UTC
- **Reserved Date**: September 01, 2023 at 21:45 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The LadiApp plugn for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce check on the init_endpoint() function hooked via 'init' in versions up to, and including, 4.4. This makes it possible for unauthenticated attackers to modify a variety of settings, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can directly modify the 'ladipage_key' which enables them to create new posts on the website and inject malicious web scripts,
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Affected Products
**binhnguyenplus - LadiApp: Landing Page, PopupX, Marketing Automation, Affiliate Marketing…**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1a46fd57-4cb9-4d98-89b6-926d74b2ab33?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/ladipage/trunk/ladipage.php#L153)
3. [](https://plugins.trac.wordpress.org/browser/ladipage/trunk/ladipage.php#L175)
4. [](https://plugins.trac.wordpress.org/browser/ladipage/trunk/ladipage.php#L187)
### Credits
- GiongfNef |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27314, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27314
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:47 UTC
- **Last Updated**: April 17, 2025 at 18:21 UTC
- **Reserved Date**: February 21, 2025 at 16:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kush Sharma Kush Micro News allows Stored XSS. This issue affects Kush Micro News: from n/a through 1.6.7.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Kush Sharma - Kush Micro News**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/kush-micro-news/vulnerability/wordpress-kush-micro-news-plugin-1-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- johska (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1534
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:18 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in (1) nlservd and (2) rnavc in Knox Software Arkeia backup product allows local users to obtain root access via a long HOME environmental variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [661](http://www.securityfocus.com/bid/661)
2. [19990923 Multiple vendor Knox Arkiea local root/remote DoS](http://marc.info/?l=bugtraq&m=93837184228248&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18104, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18104
- **State**: REJECTED
- **Last Updated**: February 27, 2023 at 00:00 UTC
- **Reserved Date**: October 09, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43154
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:17 UTC
- **Last Updated**: November 04, 2024 at 16:27 UTC
- **Reserved Date**: August 07, 2024 at 09:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in BracketSpace Advanced Cron Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Advanced Cron Manager – debug & control: from n/a through 2.5.9.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**BracketSpace - Advanced Cron Manager – debug & control**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/advanced-cron-manager/wordpress-advanced-cron-manager-debug-control-plugin-2-5-9-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Dhabaleshwar Das (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24358
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 19:52 UTC
- **Last Updated**: August 03, 2024 at 04:07 UTC
- **Reserved Date**: February 02, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15703.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 11.1.0.52543 (Status: affected)
### References
1. [](https://www.foxit.com/support/security-bulletins.html)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-269/)
### Credits
- Anonymous |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0486, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0486 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0486
- **State**: PUBLISHED
- **Published Date**: October 13, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:21 UTC
- **Reserved Date**: July 11, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Cisco TACACS+ tac_plus server allows remote attackers to cause a denial of service via a malformed packet with a long length field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [tacacsplus-packet-length-dos(4985)](https://exchange.xforce.ibmcloud.com/vulnerabilities/4985)
2. [1293](http://www.securityfocus.com/bid/1293)
3. [](http://archives.neohapsis.com/archives/bugtraq/2000-05/0370.html)
4. [20000530 An Analysis of the TACACS+ Protocol and its Implementations](http://archives.neohapsis.com/archives/bugtraq/2000-05/0369.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2410
- **State**: PUBLISHED
- **Published Date**: October 13, 2010 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 02:32 UTC
- **Reserved Date**: June 21, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Cabo/UIX component in Oracle Fusion Middleware 10.1.2.3 and 10.1.3.5 allows remote attackers to affect integrity via unknown vectors, a different vulnerability than CVE-2010-2395 and CVE-2010-2409.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html)
2. [TA10-287A](http://www.us-cert.gov/cas/techalerts/TA10-287A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28421
- **State**: REJECTED
- **Published Date**: April 13, 2021 at 13:44 UTC
- **Last Updated**: July 13, 2021 at 15:11 UTC
- **Reserved Date**: March 15, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5823, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5823 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5823
- **State**: PUBLISHED
- **Published Date**: November 06, 2023 at 11:21 UTC
- **Last Updated**: February 19, 2025 at 21:21 UTC
- **Reserved Date**: October 27, 2023 at 07:27 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in ThemeKraft TK Google Fonts GDPR Compliant plugin <= 2.2.11 versions.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**ThemeKraft - TK Google Fonts GDPR Compliant**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/tk-google-fonts/wordpress-tk-google-fonts-gdpr-compliant-plugin-2-2-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1901, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1901 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1901
- **State**: PUBLISHED
- **Published Date**: May 14, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 09:58 UTC
- **Reserved Date**: February 07, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Y-Cam camera models SD range YCB003, YCK003, and YCW003; S range YCB004, YCK004, YCW004; EyeBall YCEB03; Bullet VGA YCBL03 and YCBLB3; Bullet HD 720 YCBLHD5; Y-cam Classic Range YCB002, YCK002, and YCW003; and Y-cam Original Range YCB001, YCW001, running firmware 4.30 and earlier, allow remote authenticated users to cause a denial of service (reboot) via a malformed (1) path parameter to en/store_main.asp, (2) item parameter to en/account/accedit.asp, or (3) emailid parameter to en/smtpclient.asp. NOTE: this issue can be exploited without authentication by leveraging CVE-2014-1900.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2014-007/?fid=3850)
2. [](http://www.y-cam.com/y-cam-security-fix/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9692, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9692 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9692
- **State**: PUBLISHED
- **Published Date**: October 24, 2024 at 16:20 UTC
- **Last Updated**: October 24, 2024 at 19:53 UTC
- **Reserved Date**: October 09, 2024 at 14:57 UTC
- **Assigned By**: icscert
### Vulnerability Description
VIMESA VHF/FM Transmitter Blue Plus is suffering from a Denial-of-Service (DoS) vulnerability. An unauthenticated attacker can issue an unauthorized HTTP GET request to the unprotected endpoint 'doreboot' and restart the transmitter operations.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**VIMESA - VHF/FM Transmitter Blue Plus**
Affected versions:
- v9.7.1 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-298-01)
### Credits
- CISA discovered this report authored by Gjoko Krstic. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0943, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0943 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0943
- **State**: PUBLISHED
- **Published Date**: March 14, 2022 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 23:47 UTC
- **Reserved Date**: March 13, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**vim - vim/vim**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1)
2. [](https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3)
3. [FEDORA-2022-b718ebbfce](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/)
4. [FEDORA-2022-e62adccfca](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/)
5. [[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update](https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html)
6. [GLSA-202208-32](https://security.gentoo.org/glsa/202208-32)
7. [](https://support.apple.com/kb/HT213488)
8. [20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13](http://seclists.org/fulldisclosure/2022/Oct/41)
9. [20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13](http://seclists.org/fulldisclosure/2022/Oct/28)
10. [[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update](https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4861
- **State**: PUBLISHED
- **Published Date**: October 21, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 06:25 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:2244](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html)
2. [RHSA-2016:1481](http://rhn.redhat.com/errata/RHSA-2016-1481.html)
3. [1033894](http://www.securitytracker.com/id/1033894)
4. [RHSA-2016:1132](https://access.redhat.com/errata/RHSA-2016:1132)
5. [RHSA-2016:0534](http://rhn.redhat.com/errata/RHSA-2016-0534.html)
6. [USN-2781-1](http://www.ubuntu.com/usn/USN-2781-1)
7. [SUSE-SU-2016:0296](https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html)
8. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html)
9. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html)
10. [RHSA-2016:1480](http://rhn.redhat.com/errata/RHSA-2016-1480.html)
11. [openSUSE-SU-2015:2246](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html)
12. [DSA-3385](http://www.debian.org/security/2015/dsa-3385)
13. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
14. [openSUSE-SU-2016:0368](http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html)
15. [77137](http://www.securityfocus.com/bid/77137)
16. [DSA-3377](http://www.debian.org/security/2015/dsa-3377)
17. [RHSA-2016:0705](http://rhn.redhat.com/errata/RHSA-2016-0705.html)
18. [FEDORA-2016-e30164d0a2](http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1000122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1000122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1000122
- **State**: PUBLISHED
- **Published Date**: October 27, 2016 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 03:55 UTC
- **Reserved Date**: July 20, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XSS and SQLi in Huge IT Joomla Slider v1.0.9 extension
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://extensions.joomla.org/extensions/extension/photos-a-images/slider)
2. [](http://www.vapidlabs.com/advisory.php?v=168)
3. [92160](http://www.securityfocus.com/bid/92160) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-20055, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-20055 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-20055
- **State**: PUBLISHED
- **Published Date**: June 16, 2022 at 12:20 UTC
- **Last Updated**: April 15, 2025 at 14:24 UTC
- **Reserved Date**: June 13, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in BestWebSoft Contact Form Plugin 4.0.0. This affects an unknown part. The manipulation leads to basic cross site scripting (Stored). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.2 is able to address this issue. It is recommended to upgrade the affected component.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**BestWebSoft - Contact Form Plugin**
Affected versions:
- 4.0.0 (Status: affected)
### References
1. [](http://seclists.org/fulldisclosure/2017/Feb/100)
2. [](https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_contact_form_wordpress_plugin.html)
3. [](https://vuldb.com/?id.97389)
### Credits
- Julien Rentrop |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.