System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2076, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2076 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2076 - **State**: PUBLISHED - **Published Date**: May 19, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:15 UTC - **Reserved Date**: May 19, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in search.php for Jelsoft vBulletin 3.0.0 RC4 allows remote attackers to inject arbitrary web script or HTML via the query parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20040213 vBulletin PHP Forum Version](http://www.securityfocus.com/archive/1/353869) 2. [9656](http://www.securityfocus.com/bid/9656) 3. [vbulletin-search-xss(15208)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15208)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20289, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20289 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20289 - **State**: PUBLISHED - **Published Date**: August 28, 2024 at 16:31 UTC - **Last Updated**: August 28, 2024 at 17:24 UTC - **Reserved Date**: November 08, 2023 at 15:08 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to execute arbitrary commands on the underlying operating system of an affected device.  This vulnerability is due to insufficient validation of arguments for a specific CLI command. An attacker could exploit this vulnerability by including crafted input as the argument of the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N` ### Affected Products **Cisco - Cisco NX-OS Software** Affected versions: - 9.3(3) (Status: affected) - 9.3(4) (Status: affected) - 9.3(5) (Status: affected) - 9.3(6) (Status: affected) - 10.1(2) (Status: affected) - 10.1(1) (Status: affected) - 9.3(5w) (Status: affected) - 9.3(7) (Status: affected) - 9.3(7k) (Status: affected) - 10.2(1) (Status: affected) - 9.3(7a) (Status: affected) - 9.3(8) (Status: affected) - 10.2(1q) (Status: affected) - 10.2(2) (Status: affected) - 9.3(9) (Status: affected) - 10.1(2t) (Status: affected) - 10.2(3) (Status: affected) - 10.2(3t) (Status: affected) - 9.3(10) (Status: affected) - 10.2(2a) (Status: affected) - 10.3(1) (Status: affected) - 10.2(4) (Status: affected) - 10.3(2) (Status: affected) - 9.3(11) (Status: affected) - 10.3(3) (Status: affected) - 10.2(5) (Status: affected) - 9.3(12) (Status: affected) - 10.2(3v) (Status: affected) - 10.4(1) (Status: affected) - 10.3(99w) (Status: affected) - 10.2(6) (Status: affected) - 10.3(3w) (Status: affected) - 10.3(99x) (Status: affected) - 10.3(3o) (Status: affected) - 10.3(4) (Status: affected) - 10.3(3p) (Status: affected) - 10.3(4a) (Status: affected) - 10.4(2) (Status: affected) - 10.3(3q) (Status: affected) - 10.3(3x) (Status: affected) - 10.3(4g) (Status: affected) - 10.3(3r) (Status: affected) **Cisco - Cisco NX-OS System Software in ACI Mode** Affected versions: - 16.0(2h) (Status: affected) - 16.0(2j) (Status: affected) - 16.0(3d) (Status: affected) - 16.0(3e) (Status: affected) - 16.0(4c) (Status: affected) - 16.0(5h) (Status: affected) - 16.0(3g) (Status: affected) - 16.0(5j) (Status: affected) ### References 1. [cisco-sa-nxos-cmdinj-Lq6jsZhH](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmdinj-Lq6jsZhH)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9510, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9510 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9510 - **State**: PUBLISHED - **Published Date**: October 02, 2018 at 19:00 UTC - **Last Updated**: September 17, 2024 at 02:36 UTC - **Reserved Date**: April 05, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In smp_proc_enc_info of smp_act.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9.0 Android ID: A-111937065 ### Affected Products **Google Inc. - Android** Affected versions: - Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9.0 (Status: affected) ### References 1. [105482](http://www.securityfocus.com/bid/105482) 2. [](https://source.android.com/security/bulletin/2018-10-01%2C) 3. [](https://android.googlesource.com/platform/system/bt/+/6e4b8e505173f803a5fc05abc09f64eef89dc308)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47085, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47085 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47085 - **State**: PUBLISHED - **Published Date**: July 18, 2023 at 00:00 UTC - **Last Updated**: August 03, 2024 at 14:47 UTC - **Reserved Date**: December 12, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in ostree before 2022.7 allows attackers to cause a denial of service or other unspecified impacts via the print_panic function in repo_checkout_filter.rs. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ostreedev/ostree/issues/2775) 2. [](https://doc.rust-lang.org/std/macro.eprintln.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9061 - **State**: PUBLISHED - **Published Date**: October 16, 2024 at 07:31 UTC - **Last Updated**: October 16, 2024 at 18:02 UTC - **Reserved Date**: September 20, 2024 at 21:31 UTC - **Assigned By**: Wordfence ### Vulnerability Description The The WP Popup Builder – Popup Forms and Marketing Lead Generation plugin for WordPress is vulnerable to arbitrary shortcode execution via the wp_ajax_nopriv_shortcode_Api_Add AJAX action in all versions up to, and including, 1.3.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. NOTE: This vulnerability was partially fixed in version 1.3.5 with a nonce check, which effectively prevented access to the affected function. However, version 1.3.6 incorporates the correct authorization check to prevent unauthorized access. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **themehunk - WP Popup Builder – Popup Forms and Marketing Lead Generation** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0cac1dc0-87dc-43eb-9db1-638a91200b43?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3166506/wp-popup-builder) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45013, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45013 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45013 - **State**: REJECTED - **Published Date**: November 02, 2023 at 02:12 UTC - **Last Updated**: January 02, 2024 at 19:00 UTC - **Reserved Date**: October 02, 2023 at 16:00 UTC - **Assigned By**: Fluid Attacks ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38523, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38523 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38523 - **State**: PUBLISHED - **Published Date**: July 20, 2023 at 00:00 UTC - **Last Updated**: October 28, 2024 at 13:40 UTC - **Reserved Date**: July 19, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The web interface on multiple Samsung Harman AMX N-Series devices allows directory listing for the /tmp/ directory, without authentication, exposing sensitive information such as the command history and screenshot of the file being processed. This affects N-Series N1115 Wallplate Video Encoder before 1.15.61, N-Series N1x22A Video Encoder/Decoder before 1.15.61, N-Series N1x33A Video Encoder/Decoder before 1.15.61, N-Series N1x33 Video Encoder/Decoder before 1.15.61, N-Series N2x35 Video Encoder/Decoder before 1.15.61, N-Series N2x35A Video Encoder/Decoder before 1.15.61, N-Series N2xx2 Video Encoder/Decoder before 1.15.61, N-Series N2xx2A Video Encoder/Decoder before 1.15.61, N-Series N3000 Video Encoder/Decoder before 2.12.105, and N-Series N4321 Audio Transceiver before 1.00.06. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://help.harmanpro.com/n1115-svsi-firmware) 2. [](https://help.harmanpro.com/n1x22a-updater) 3. [](https://help.harmanpro.com/n1x33a-updater) 4. [](https://help.harmanpro.com/n1x33-updater) 5. [](https://help.harmanpro.com/n2x35-updater-hotfix) 6. [](https://help.harmanpro.com/n2x35a-updater-hotfix) 7. [](https://help.harmanpro.com/n2xx2-updater-hotfix) 8. [](https://help.harmanpro.com/n2xx2a-updater) 9. [](https://help.harmanpro.com/svsi-n4321-firmware) 10. [](https://help.harmanpro.com/n3k-updater-hotfix) 11. [](https://wiki.notveg.ninja/blog/CVE-2023-38523/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0678, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0678 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0678 - **State**: PUBLISHED - **Published Date**: April 11, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 04:17 UTC - **Reserved Date**: January 07, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The virtualization layer in Cisco ASA FirePOWER Software before 5.3.1.2 and 5.4.x before 5.4.0.1 and ASA Context-Aware (CX) Software before 9.3.2.1-9 allows remote attackers to cause a denial of service (device reload) by rapidly sending crafted packets to the management interface, aka Bug IDs CSCus11007 and CSCun56954. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1032046](http://www.securitytracker.com/id/1032046) 2. [20150408 Cisco ASA FirePOWER Services and Cisco ASA CX Services Crafted Packets Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-cxfp)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0275, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0275 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0275 - **State**: PUBLISHED - **Published Date**: April 26, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:14 UTC - **Reserved Date**: April 26, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CRYPTOCard CryptoAdmin for PalmOS uses weak encryption to store a user's PIN number, which allows an attacker with access to the .PDB file to generate valid PT-1 tokens after cracking the PIN. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20000410 CRYPTOAdmin 4.1 server with PalmPilot PT-1 token 1.04 PIN Extract ion](http://archives.neohapsis.com/archives/bugtraq/2000-04/0033.html) 2. [1097](http://www.securityfocus.com/bid/1097) 3. [20000410 CRYPTOCard PalmToken PIN Extraction](http://www.l0pht.com/advisories/cc-pinextract.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5718, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5718 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5718 - **State**: REJECTED - **Published Date**: September 09, 2014 at 10:00 UTC - **Last Updated**: September 22, 2014 at 08:57 UTC - **Reserved Date**: August 30, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10210 - **State**: PUBLISHED - **Published Date**: August 08, 2017 at 15:00 UTC - **Last Updated**: October 04, 2024 at 17:08 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H). ### Affected Products **Oracle Corporation - Oracle VM VirtualBox** Affected versions: - unspecified (Status: affected) ### References 1. [99640](http://www.securityfocus.com/bid/99640) 2. [1038929](http://www.securitytracker.com/id/1038929) 3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21253, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21253 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21253 - **State**: PUBLISHED - **Published Date**: January 19, 2022 at 11:22 UTC - **Last Updated**: September 24, 2024 at 20:31 UTC - **Reserved Date**: November 15, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.27 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2022.html) 2. [](https://security.netapp.com/advisory/ntap-20220121-0008/) 3. [FEDORA-2022-43217f0ba7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/) 4. [FEDORA-2022-be015e0331](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5180, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5180 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5180 - **State**: PUBLISHED - **Published Date**: June 27, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 06:41 UTC - **Reserved Date**: July 01, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceware.org/bugzilla/attachment.cgi?id=8492) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1249603) 3. [](https://sourceware.org/bugzilla/show_bug.cgi?id=18784) 4. [](https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=fc82b0a2dfe7dbd35671c10510a8da1043d746a5) 5. [USN-3239-1](http://www.ubuntu.com/usn/USN-3239-1) 6. [[libc-alpha@sourceware.org] 20170205 The GNU C Library version 2.25 is now available](https://sourceware.org/ml/libc-alpha/2017-02/msg00079.html) 7. [USN-3239-2](http://www.ubuntu.com/usn/USN-3239-2) 8. [GLSA-201706-19](https://security.gentoo.org/glsa/201706-19) 9. [99324](http://www.securityfocus.com/bid/99324) 10. [RHSA-2018:0805](https://access.redhat.com/errata/RHSA-2018:0805) 11. [](https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33534, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33534 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33534 - **State**: PUBLISHED - **Published Date**: June 25, 2021 at 18:25 UTC - **Last Updated**: September 17, 2024 at 04:20 UTC - **Reserved Date**: May 24, 2021 at 00:00 UTC - **Assigned By**: CERTVDE ### Vulnerability Description In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Weidmüller - IE-WL(T)-BL-AP-CL-XX** Affected versions: - IE-WL-BL-AP-CL-EU (2536600000) (Status: affected) - IE-WLT-BL-AP-CL-EU (2536650000) (Status: affected) - IE-WL-BL-AP-CL-US (2536660000) (Status: affected) - IE-WLT-BL-AP-CL-US (2536670000) (Status: affected) **Weidmüller - IE-WL(T)-VL-AP-CL-XX** Affected versions: - IE-WL-VL-AP-BR-CL-EU (2536680000) (Status: affected) - IE-WLT-VL-AP-BR-CL-EU (2536690000) (Status: affected) - IE-WL-VL-AP-BR-CL-US (2536700000) (Status: affected) - IE-WLT-VL-AP-BR-CL-US (2536710000) (Status: affected) ### References 1. [](https://cert.vde.com/en-us/advisories/vde-2021-026)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39552, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39552 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39552 - **State**: PUBLISHED - **Published Date**: July 11, 2024 at 16:30 UTC - **Last Updated**: August 02, 2024 at 04:26 UTC - **Reserved Date**: June 25, 2024 at 15:12 UTC - **Assigned By**: juniper ### Vulnerability Description An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause the RPD process to crash leading to a Denial of Service (DoS). When a malformed BGP UPDATE packet is received over an established BGP session, RPD crashes and restarts. Continuous receipt of the malformed BGP UPDATE messages will create a sustained Denial of Service (DoS) condition for impacted devices. This issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations. This issue requires a remote attacker to have at least one established BGP session. This issue affects: Juniper Networks Junos OS: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3; * 23.2 versions earlier than 23.2R2. Juniper Networks Junos OS Evolved: * All versions earlier than 21.2R3-S7; * 21.3-EVO versions earlier than 21.3R3-S5; * 21.4-EVO versions earlier than 21.4R3-S8; * 22.1-EVO versions earlier than 22.1R3-S4; * 22.2-EVO versions earlier than 22.2R3-S3; * 22.3-EVO versions earlier than 22.3R3-S2; * 22.4-EVO versions earlier than 22.4R3; * 23.2-EVO versions earlier than 23.2R2. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-755: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 0 (Status: affected) - 21.2 (Status: affected) - 21.3 (Status: affected) - 21.4 (Status: affected) - 22.1 (Status: affected) - 22.2 (Status: affected) - 22.3 (Status: affected) - 22.4 (Status: affected) - 23.2 (Status: affected) **Juniper Networks - Junos OS Evolved** Affected versions: - 0 (Status: affected) - 21.3-EVO (Status: affected) - 21.4-EVO (Status: affected) - 22.1-EVO (Status: affected) - 22.2-EVO (Status: affected) - 22.3-EVO (Status: affected) - 22.4-EVO (Status: affected) - 23.2-EVO (Status: affected) - 23.4-EVO (Status: affected) ### References 1. [](https://supportportal.juniper.net/JSA75726) ### Credits - Juniper SIRT would like to acknowledge and thank Matteo Memilli (mmemelli@amazon.com) from Amazon for responsibly reporting this vulnerability.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31509, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31509 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31509 - **State**: PUBLISHED - **Published Date**: June 29, 2021 at 14:33 UTC - **Last Updated**: August 03, 2024 at 23:03 UTC - **Reserved Date**: April 16, 2021 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13309. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **OpenText - Brava! Desktop** Affected versions: - 16.6.3.84 (Status: affected) ### References 1. [](https://www.zerodayinitiative.com/advisories/ZDI-21-687/) ### Credits - Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44062, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44062 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44062 - **State**: PUBLISHED - **Published Date**: September 15, 2024 at 07:58 UTC - **Last Updated**: September 15, 2024 at 19:49 UTC - **Reserved Date**: August 18, 2024 at 21:58 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hiroaki Miyashita Custom Field Template allows Stored XSS.This issue affects Custom Field Template: from n/a through 2.6.5. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Hiroaki Miyashita - Custom Field Template** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/custom-field-template/wordpress-custom-field-template-plugin-2-6-5-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Robert DeVore (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12602, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12602 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12602 - **State**: PUBLISHED - **Published Date**: February 06, 2025 at 12:27 UTC - **Last Updated**: February 12, 2025 at 18:22 UTC - **Reserved Date**: December 13, 2024 at 01:02 UTC - **Assigned By**: huawei ### Vulnerability Description Identity verification vulnerability in the ParamWatcher module Impact: Successful exploitation of this vulnerability may affect service confidentiality. ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-300: Security Weakness ### Affected Products **Huawei - HarmonyOS** Affected versions: - 5.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2025/2/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8485, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8485 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8485 - **State**: PUBLISHED - **Published Date**: June 15, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 16:34 UTC - **Reserved Date**: May 03, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8483, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297. ### Affected Products **Microsoft Corporation - Microsoft Windows** Affected versions: - Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 (Status: affected) ### References 1. [1038659](http://www.securitytracker.com/id/1038659) 2. [42228](https://www.exploit-db.com/exploits/42228/) 3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8485) 4. [98860](http://www.securityfocus.com/bid/98860)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28279, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28279 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28279 - **State**: PUBLISHED - **Published Date**: December 29, 2020 at 17:10 UTC - **Last Updated**: August 04, 2024 at 16:33 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: Mend ### Vulnerability Description Prototype pollution vulnerability in 'flattenizer' versions 0.0.5 through 1.0.5 allows an attacker to cause a denial of service and may lead to remote code execution. ### Affected Products **n/a - flattenizer** Affected versions: - 0.0.5, 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5 (Status: affected) ### References 1. [](https://github.com/sahellebusch/flattenizer/pull/13) 2. [](https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28279)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2645, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2645 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2645 - **State**: PUBLISHED - **Published Date**: July 16, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 05:24 UTC - **Reserved Date**: March 20, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Web Applications Desktop Integrator component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.3, and 12.2.4 allows remote authenticated users to affect integrity via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html) 2. [1032926](http://www.securitytracker.com/id/1032926)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41852, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41852 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41852 - **State**: REJECTED - **Published Date**: October 06, 2022 at 17:14 UTC - **Last Updated**: February 13, 2025 at 15:46 UTC - **Reserved Date**: September 30, 2022 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7725, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7725 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7725 - **State**: PUBLISHED - **Published Date**: October 21, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:56 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Rally Albania Live 2014 (aka com.wRallyAlbaniaLIVE2014) application 0.11 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#399017](http://www.kb.cert.org/vuls/id/399017) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26596, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26596 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26596 - **State**: PUBLISHED - **Published Date**: April 25, 2022 at 15:41 UTC - **Last Updated**: August 03, 2024 at 05:03 UTC - **Reserved Date**: March 07, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Journal module's web content display configuration page in Liferay Portal 7.1.0 through 7.3.3, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19, and 7.2 before fix pack 8, allows remote attackers to inject arbitrary web script or HTML via web content template names. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://liferay.com)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3607, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3607 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3607 - **State**: PUBLISHED - **Published Date**: July 10, 2023 at 21:00 UTC - **Last Updated**: August 02, 2024 at 07:01 UTC - **Reserved Date**: July 10, 2023 at 19:44 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in kodbox 1.26. It has been declared as critical. This vulnerability affects the function Execute of the file webconsole.php.txt of the component WebConsole Plug-In. The manipulation leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-233476. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **n/a - kodbox** Affected versions: - 1.26 (Status: affected) ### References 1. [](https://vuldb.com/?id.233476) 2. [](https://vuldb.com/?ctiid.233476) 3. [](https://github.com/mohdkey/cve/blob/main/kodbox.md) ### Credits - XCES (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44409, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44409 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44409 - **State**: PUBLISHED - **Published Date**: January 28, 2022 at 21:42 UTC - **Last Updated**: April 15, 2025 at 19:14 UTC - **Reserved Date**: November 29, 2021 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. TestWifi param is not object. An attacker can send an HTTP request to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31162, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31162 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31162 - **State**: PUBLISHED - **Published Date**: June 14, 2024 at 06:35 UTC - **Last Updated**: August 02, 2024 at 01:46 UTC - **Reserved Date**: March 29, 2024 at 07:18 UTC - **Assigned By**: twcert ### Vulnerability Description The specific function parameter of ASUS Download Master does not properly filter user input. An unauthenticated remote attacker with administrative privileges can exploit this vulnerability to execute arbitrary system commands on the device. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **ASUS - Download Master** Affected versions: - earlier (Status: affected) ### References 1. [](https://www.twcert.org.tw/tw/cp-132-7867-8fad9-1.html) 2. [](https://www.twcert.org.tw/en/cp-139-7868-8a760-2.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-25022, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-25022 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-25022 - **State**: PUBLISHED - **Published Date**: February 27, 2021 at 04:21 UTC - **Last Updated**: August 05, 2024 at 03:00 UTC - **Reserved Date**: February 19, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Scytl sVote 2.1. An attacker can inject code that gets executed by creating an election-event and injecting a payload over an event alias, because the application calls Runtime.getRuntime().exec() without validation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://suid.ch/research/CVE-2019-25022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39139, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39139 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39139 - **State**: PUBLISHED - **Published Date**: August 23, 2021 at 17:50 UTC - **Last Updated**: August 04, 2024 at 01:58 UTC - **Reserved Date**: August 16, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data - CWE-434: Security Weakness ### Affected Products **x-stream - xstream** Affected versions: - < 1.4.18 (Status: affected) ### References 1. [](https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44) 2. [](https://x-stream.github.io/CVE-2021-39139.html) 3. [[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update](https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html) 4. [FEDORA-2021-fbad11014a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/) 5. [FEDORA-2021-d894ca87dc](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/) 6. [FEDORA-2021-5e376c0ed9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/) 7. [DSA-5004](https://www.debian.org/security/2021/dsa-5004) 8. [](https://www.oracle.com/security-alerts/cpujan2022.html) 9. [](https://security.netapp.com/advisory/ntap-20210923-0003/) 10. [](https://www.oracle.com/security-alerts/cpuapr2022.html) 11. [](https://www.oracle.com/security-alerts/cpujul2022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4673, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4673 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4673 - **State**: PUBLISHED - **Published Date**: October 22, 2008 at 10:00 UTC - **Last Updated**: August 07, 2024 at 10:24 UTC - **Reserved Date**: October 21, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in panel/common/theme/default/header_setup.php in WebBiscuits Software Events Calendar 1.1 allows remote attackers to execute arbitrary PHP code via a URL in the (1) path[docroot] and (2) component parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-2701](http://www.vupen.com/english/advisories/2008/2701) 2. [32053](http://secunia.com/advisories/32053) 3. [eventscalendar-headersetup-file-include(45500)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45500) 4. [31471](http://www.securityfocus.com/bid/31471) 5. [6623](https://www.exploit-db.com/exploits/6623) 6. [4461](http://securityreason.com/securityalert/4461)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0220, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0220 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0220 - **State**: PUBLISHED - **Published Date**: April 29, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:43 UTC - **Reserved Date**: April 28, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the administrator authentication process for Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute arbitrary code via a handshake packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#454716](http://www.kb.cert.org/vuls/id/454716) 2. [7180](http://www.securityfocus.com/bid/7180) 3. [20030428 CORE-2003-0305-02: Vulnerabilities in Kerio Personal Firewall](http://marc.info/?l=bugtraq&m=105155734411836&w=2) 4. [](http://www.coresecurity.com/common/showdoc.php?idx=314&idxseccion=10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1713, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1713 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1713 - **State**: PUBLISHED - **Published Date**: June 10, 2009 at 17:37 UTC - **Last Updated**: August 07, 2024 at 05:20 UTC - **Reserved Date**: May 20, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The XSLT functionality in WebKit in Apple Safari before 4.0 does not properly implement the document function, which allows remote attackers to read (1) arbitrary local files and (2) files from different security zones via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [43068](http://secunia.com/advisories/43068) 2. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212) 3. [APPLE-SA-2009-06-08-1](http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html) 4. [safari-document-information-disclosure(51267)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51267) 5. [35260](http://www.securityfocus.com/bid/35260) 6. [54975](http://osvdb.org/54975) 7. [ADV-2009-1522](http://www.vupen.com/english/advisories/2009/1522) 8. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html) 9. [35379](http://secunia.com/advisories/35379) 10. [USN-857-1](http://www.ubuntu.com/usn/USN-857-1) 11. [](http://support.apple.com/kb/HT3613)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34952, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34952 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34952 - **State**: PUBLISHED - **Published Date**: August 02, 2022 at 02:54 UTC - **Last Updated**: August 03, 2024 at 09:22 UTC - **Reserved Date**: July 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Pharmacy Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at edituser.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.yuque.com/jiryu/yz4rcd/wgh7s5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4197, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4197 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4197 - **State**: PUBLISHED - **Published Date**: March 03, 2020 at 13:50 UTC - **Last Updated**: September 16, 2024 at 23:40 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 174908. ### Affected Products **IBM - Tivoli Netcool/OMNIbus** Affected versions: - 8.1.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/5690822) 2. [ibm-tivoli-cve20204197-info-disc (174908)](https://exchange.xforce.ibmcloud.com/vulnerabilities/174908)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17402, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17402 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17402 - **State**: PUBLISHED - **Published Date**: September 23, 2018 at 22:00 UTC - **Last Updated**: August 05, 2024 at 10:47 UTC - **Reserved Date**: September 23, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The PhonePe wallet (aka com.PhonePe.app) application 3.0.6 through 3.3.26 for Android might allow attackers to discover the Credit/Debit card number, expiration date, and CVV number. NOTE: the vendor says that, to exploit this, the user has to explicitly install a malicious app and provide accessibility permission to the malicious app, that the Android platform provides fair warnings to the users before turning on accessibility for any application, and that it believes it is similar to installing malicious keyboards, or malicious apps taking screenshots ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/magicj3lly/appexploits/blob/master/PhonePe%20-%20Credit%20and%20Debit%20Card%20Leak.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2897, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2897 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2897 - **State**: PUBLISHED - **Published Date**: October 16, 2019 at 17:40 UTC - **Last Updated**: October 01, 2024 at 16:32 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. While the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N). ### Affected Products **Oracle Corporation - Enterprise Manager Base Platform** Affected versions: - 13.3.0.0 (Status: affected) - 13.4.0.0 (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html) 2. [](https://www.oracle.com/security-alerts/cpuoct2020.html) 3. [](https://www.oracle.com/security-alerts/cpujul2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-22674, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-22674 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-22674 - **State**: PUBLISHED - **Published Date**: October 12, 2021 at 20:37 UTC - **Last Updated**: August 04, 2024 at 14:51 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in gpac 0.8.0. An invalid memory dereference exists in the function FixTrackID located in isom_intern.c, which allows attackers to cause a denial of service (DoS) via a crafted input. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gpac/gpac/issues/1346)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2088, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2088 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2088 - **State**: REJECTED - **Published Date**: January 05, 2018 at 14:00 UTC - **Last Updated**: January 05, 2018 at 13:57 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1994, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1994 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1994 - **State**: PUBLISHED - **Published Date**: April 25, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:35 UTC - **Reserved Date**: April 25, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in dForum 1.5 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the DFORUM_PATH parameter to (1) about.php, (2) admin.php, (3) anmelden.php, (4) losethread.php, (5) config.php, (6) delpost.php, (7) delthread.php, (8) dfcode.php, (9) download.php, (10) editanoc.php, (11) forum.php, (12) login.php, (13) makethread.php, (14) menu.php, (15) newthread.php, (16) openthread.php, (17) overview.php, (18) post.php, (19) suchen.php, (20) user.php, (21) userconfig.php, (22) userinfo.php, and (23) verwalten.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-1482](http://www.vupen.com/english/advisories/2006/1482) 2. [20060421 dForum <= 1.5 Multiple Remote File Inclusion Vulnerabilities.](http://www.securityfocus.com/archive/1/431758) 3. [19788](http://secunia.com/advisories/19788) 4. [20060421 dForum <= 1.5 Multiple Remote File Inclusion Vulnerabilities.](http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/045369.html) 5. [dforum-dforumpath-parameter-file-include(26035)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26035) 6. [](http://www.nukedx.com/?viewdoc=27) 7. [17650](http://www.securityfocus.com/bid/17650)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8248, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8248 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8248 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 19, 2015 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46434, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46434 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46434 - **State**: PUBLISHED - **Published Date**: March 28, 2022 at 11:10 UTC - **Last Updated**: August 04, 2024 at 05:02 UTC - **Reserved Date**: January 24, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description EMQ X Dashboard V3.0.0 is affected by username enumeration in the "/api /v3/auth" interface. When a user login, the application returns different results depending on whether the account is correct, that allowed an attacker to determine if a given username was valid ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/emqx/emqx/issues/6791)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29663, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29663 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29663 - **State**: PUBLISHED - **Published Date**: May 26, 2022 at 13:27 UTC - **Last Updated**: August 03, 2024 at 06:26 UTC - **Reserved Date**: April 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/type/hy. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/chshcms/cscms/issues/22#issue-1207641519)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7770, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7770 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7770 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 16:12 UTC - **Reserved Date**: April 12, 2017 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description A mechanism where when a new tab is loaded through JavaScript events, if fullscreen mode is then entered, the addressbar will not be rendered. This would allow a malicious site to displayed a spoofed addressbar, showing the location of an arbitrary website instead of the one loaded. Note: this issue only affects Firefox for Android. Desktop Firefox is unaffected. This vulnerability affects Firefox < 54. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1317242) 2. [](https://www.mozilla.org/security/advisories/mfsa2017-15/) 3. [1038689](http://www.securitytracker.com/id/1038689) 4. [99049](http://www.securityfocus.com/bid/99049)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3652, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3652 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3652 - **State**: PUBLISHED - **Published Date**: April 16, 2020 at 10:46 UTC - **Last Updated**: August 04, 2024 at 07:37 UTC - **Reserved Date**: December 17, 2019 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Possible buffer over-read issue in windows x86 wlan driver function while processing beacon or request frame due to lack of check of length of variable received. in Snapdragon Compute, Snapdragon Connectivity in MSM8998, QCA6390, SC7180, SC8180X, SDM850 ### Affected Products **Qualcomm, Inc. - Snapdragon Compute, Snapdragon Connectivity** Affected versions: - MSM8998, QCA6390, SC7180, SC8180X, SDM850 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2610, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2610 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2610 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: February 26, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12351, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12351 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12351 - **State**: PUBLISHED - **Published Date**: June 02, 2022 at 12:26 UTC - **Last Updated**: August 04, 2024 at 23:17 UTC - **Reserved Date**: May 27, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in zzcms 2019. SQL Injection exists in dl/dl_print.php via an id parameter value with a trailing comma. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/cby234/zzcms/issues/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50471, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50471 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50471 - **State**: PUBLISHED - **Published Date**: October 28, 2024 at 12:45 UTC - **Last Updated**: October 28, 2024 at 13:49 UTC - **Reserved Date**: October 24, 2024 at 07:26 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Checklist Trip Plan allows Stored XSS.This issue affects Trip Plan: from n/a through 1.0.10. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Checklist - Trip Plan** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/tripplan/wordpress-trip-plan-plugin-1-0-10-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0686, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0686 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0686 - **State**: PUBLISHED - **Published Date**: February 15, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 16:41 UTC - **Reserved Date**: February 14, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description add_user.php in Virtual Hosting Control System (VHCS) 2.4.7.1 and earlier does not check user privileges when adding a new administrative user, which allows remote attackers to gain unauthorized access. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [430](http://securityreason.com/securityalert/430) 2. [vhcs-adduser-privilege-escalation(24667)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24667) 3. [18799](http://secunia.com/advisories/18799) 4. [20060211 RS-2006-1: Multiple flaws in VHCS 2.x](http://www.securityfocus.com/archive/1/424816/100/0/threaded) 5. [](http://www.rs-labs.com/adv/RS-Labs-Advisory-2006-1.txt) 6. [16600](http://www.securityfocus.com/bid/16600) 7. [ADV-2006-0534](http://www.vupen.com/english/advisories/2006/0534)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-23966, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-23966 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-23966 - **State**: PUBLISHED - **Published Date**: May 08, 2023 at 00:00 UTC - **Last Updated**: January 29, 2025 at 15:34 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection vulnerability in victor cms 1.0 allows attackers to execute arbitrary commands via the post parameter to /post.php in a crafted GET request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/VictorAlagwu/CMSsite/issues/15) 2. [](https://github.com/VictorAlagwu/CMSsite/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-25089, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-25089 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-25089 - **State**: PUBLISHED - **Published Date**: August 28, 2023 at 12:31 UTC - **Last Updated**: September 30, 2024 at 17:50 UTC - **Reserved Date**: August 26, 2023 at 20:13 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in glb Meetup Tag Extension 0.1 on MediaWiki. It has been rated as problematic. This issue affects some unknown processing of the component Link Attribute Handler. The manipulation leads to use of web link to untrusted target with window.opener access. Upgrading to version 0.2 is able to address this issue. The identifier of the patch is 850c726d6bbfe0bf270801fbb92a30babea4155c. It is recommended to upgrade the affected component. The identifier VDB-238157 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-1022: Security Weakness ### Affected Products **glb - Meetup Tag Extension** Affected versions: - 0.1 (Status: affected) ### References 1. [](https://vuldb.com/?id.238157) 2. [](https://vuldb.com/?ctiid.238157) 3. [](https://github.com/glb/mediawiki-tag-extension-meetup/commit/850c726d6bbfe0bf270801fbb92a30babea4155c) 4. [](https://github.com/glb/mediawiki-tag-extension-meetup/releases/tag/v0.2) ### Credits - VulDB GitHub Commit Analyzer
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20771, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20771 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20771 - **State**: PUBLISHED - **Published Date**: February 10, 2019 at 17:00 UTC - **Last Updated**: September 16, 2024 at 20:17 UTC - **Reserved Date**: February 10, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, 7970i, EC7836, and EC7856 devices before R18-05 073.xxx.0487.15000. There is unauthenticated Remote Command Execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://securitydocs.business.xerox.com/wp-content/uploads/2018/07/cert_Security_Mini_Bulletin_XRX18Y_for_ConnectKey_EC78xx_v1.0.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3902, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3902 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3902 - **State**: PUBLISHED - **Published Date**: October 10, 2016 at 10:00 UTC - **Last Updated**: August 06, 2024 at 00:10 UTC - **Reserved Date**: March 30, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description drivers/platform/msm/ipa/ipa_qmi_service.c in the Qualcomm IPA driver in Android before 2016-10-05 on Nexus 5X and 6P devices allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 29953313 and Qualcomm internal bug CR 1044072. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://source.android.com/security/bulletin/2016-10-01.html) 2. [93309](http://www.securityfocus.com/bid/93309) 3. [](https://source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?id=2fca425d781572393fbe51abe2e27a932d24a768)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2940, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2940 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2940 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 13:29 UTC - **Last Updated**: September 27, 2024 at 18:48 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Financial Services Profitability Management product of Oracle Financial Services Applications (component: User Interface). Supported versions that are affected are 8.0.6 and 8.0.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Profitability Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Profitability Management accessible data as well as unauthorized read access to a subset of Oracle Financial Services Profitability Management accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N). ### Affected Products **Oracle Corporation - Financial Services Profitability Management** Affected versions: - 8.0.6 (Status: affected) - 8.0.7 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6862, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6862 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6862 - **State**: PUBLISHED - **Published Date**: May 26, 2017 at 20:00 UTC - **Last Updated**: February 07, 2025 at 13:47 UTC - **Reserved Date**: March 13, 2017 at 00:00 UTC - **Assigned By**: netgear ### Vulnerability Description NETGEAR WNR2000v3 devices before 1.1.2.14, WNR2000v4 devices before 1.0.0.66, and WNR2000v5 devices before 1.0.0.42 allow authentication bypass and remote code execution via a buffer overflow that uses a parameter in the administration webapp. The NETGEAR ID is PSV-2016-0261. ### Affected Products **n/a - NETGEAR All versions prior to WNR2000v3 1.1.2.14, WNR2000v4 1.0.0.66, WNR2000v5 1.0.0.42** Affected versions: - NETGEAR All versions prior to WNR2000v3 1.1.2.14, WNR2000v4 1.0.0.66, WNR2000v5 1.0.0.42 (Status: affected) ### References 1. [](https://kb.netgear.com/000038542/Security-Advisory-for-Unauthenticated-Remote-Code-Execution-on-Some-Routers-PSV-2016-0261) 2. [98740](http://www.securityfocus.com/bid/98740) 3. [](https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_netgear_wnr2000v5_-_cve-2017-6862.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5573, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5573 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5573 - **State**: PUBLISHED - **Published Date**: December 31, 2013 at 15:00 UTC - **Last Updated**: August 06, 2024 at 17:15 UTC - **Reserved Date**: August 23, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the default markup formatter in Jenkins 1.523 allows remote attackers to inject arbitrary web script or HTML via the Description field in the user configuration. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [64414](http://www.securityfocus.com/bid/64414) 2. [101187](http://www.osvdb.org/101187) 3. [20131217 [CVE-2013-5573] Jenkins v1.523 Default markup formatter permits offsite-bound forms](http://seclists.org/bugtraq/2013/Dec/104) 4. [20131217 [CVE-2013-5573] Jenkins v1.523 Default markup formatter permits offsite-bound forms](http://seclists.org/fulldisclosure/2013/Dec/159) 5. [30408](http://www.exploit-db.com/exploits/30408) 6. [](http://packetstormsecurity.com/files/124513) 7. [jenkins-cve20135573-xss(89872)](https://exchange.xforce.ibmcloud.com/vulnerabilities/89872)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4040, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4040 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4040 - **State**: PUBLISHED - **Published Date**: January 31, 2019 at 16:00 UTC - **Last Updated**: September 17, 2024 at 02:12 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM I 7.2 and 7.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 156164. ### Affected Products **IBM - i** Affected versions: - 7.2 (Status: affected) - 7.3 (Status: affected) ### References 1. [106811](http://www.securityfocus.com/bid/106811) 2. [](http://www.ibm.com/support/docview.wss?uid=ibm10869384) 3. [ibm-i-cve20194040-xss(156164)](https://exchange.xforce.ibmcloud.com/vulnerabilities/156164)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28971, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28971 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28971 - **State**: PUBLISHED - **Published Date**: May 06, 2022 at 13:08 UTC - **Last Updated**: August 03, 2024 at 06:10 UTC - **Reserved Date**: April 11, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the list parameter in the function fromSetIpMacBind. This vulnerability allows attackers to cause a Denial of Service (DoS). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromSetIpMacBind/readme.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1451, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1451 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1451 - **State**: PUBLISHED - **Published Date**: February 21, 2024 at 23:30 UTC - **Last Updated**: May 22, 2025 at 04:11 UTC - **Reserved Date**: February 12, 2024 at 16:02 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.9 before 16.9.1. A crafted payload added to the user profile page could lead to a stored XSS on the client side, allowing attackers to perform arbitrary actions on behalf of victims." ### CVSS Metrics - **CVSS Base Score**: 8.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **GitLab - GitLab** Affected versions: - 16.9.0 (Status: affected) ### References 1. [GitLab Issue #441457](https://gitlab.com/gitlab-org/gitlab/-/issues/441457) 2. [HackerOne Bug Bounty Report #2371126](https://hackerone.com/reports/2371126) ### Credits - Thanks [yvvdwf](https://hackerone.com/yvvdwf) for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1120, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1120 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1120 - **State**: PUBLISHED - **Published Date**: June 20, 2018 at 13:00 UTC - **Last Updated**: August 05, 2024 at 03:51 UTC - **Reserved Date**: December 04, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/<pid>/cmdline (or /proc/<pid>/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks). ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **[UNKNOWN] - kernel** Affected versions: - kernel 4.17 (Status: affected) ### References 1. [USN-3752-2](https://usn.ubuntu.com/3752-2/) 2. [RHSA-2018:3083](https://access.redhat.com/errata/RHSA-2018:3083) 3. [104229](http://www.securityfocus.com/bid/104229) 4. [USN-3752-3](https://usn.ubuntu.com/3752-3/) 5. [GLSA-201805-14](https://security.gentoo.org/glsa/201805-14) 6. [44806](https://www.exploit-db.com/exploits/44806/) 7. [USN-3910-1](https://usn.ubuntu.com/3910-1/) 8. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f7ccc2ccc2e70c6054685f5e3522efa81556830) 9. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1120) 10. [USN-3910-2](https://usn.ubuntu.com/3910-2/) 11. [[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package](https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html) 12. [RHSA-2018:2948](https://access.redhat.com/errata/RHSA-2018:2948) 13. [[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report](http://seclists.org/oss-sec/2018/q2/122) 14. [USN-3752-1](https://usn.ubuntu.com/3752-1/) 15. [RHSA-2018:3096](https://access.redhat.com/errata/RHSA-2018:3096)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-49301, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-49301 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-49301 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 12:53 UTC - **Last Updated**: June 06, 2025 at 16:05 UTC - **Reserved Date**: June 04, 2025 at 09:41 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpsoul Greenshift allows DOM-Based XSS. This issue affects Greenshift: from n/a through 11.5.5. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **wpsoul - Greenshift** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/greenshift-animation-and-page-builder-blocks/vulnerability/wordpress-greenshift-11-5-5-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Peter Thaleikis (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4531, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4531 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4531 - **State**: PUBLISHED - **Published Date**: May 11, 2025 at 05:31 UTC - **Last Updated**: May 12, 2025 at 13:50 UTC - **Reserved Date**: May 10, 2025 at 05:42 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Seeyon Zhiyuan OA Web Application System 8.1 SP2. It has been rated as critical. Affected by this issue is the function postData of the file ROOT\WEB-INF\classes\com\ours\www\ehr\salary\service\data\EhrSalaryPayrollServiceImpl.class of the component Beetl Template Handler. The manipulation of the argument payrollId leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-94: Code Injection - CWE-74: Security Weakness ### Affected Products **Seeyon - Zhiyuan OA Web Application System** Affected versions: - 8.1 SP2 (Status: affected) ### References 1. [VDB-308276 | Seeyon Zhiyuan OA Web Application System Beetl Template EhrSalaryPayrollServiceImpl.class postData code injection](https://vuldb.com/?id.308276) 2. [VDB-308276 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.308276) 3. [Submit #566097 | Seeyon Seeyon Zhiyuan OA Application V8.1 SP2 Remote Arbitrary Command Execution Vulnerability](https://vuldb.com/?submit.566097) 4. [](https://wx.mail.qq.com/s?k=iGTE4n4wT2AEdHPxOR) ### Credits - caichaoxiong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0801, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0801 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0801 - **State**: PUBLISHED - **Published Date**: March 04, 2009 at 16:00 UTC - **Last Updated**: September 17, 2024 at 03:55 UTC - **Reserved Date**: March 04, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Squid, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33858](http://www.securityfocus.com/bid/33858) 2. [VU#435052](http://www.kb.cert.org/vuls/id/435052)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5961, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5961 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5961 - **State**: PUBLISHED - **Published Date**: January 23, 2009 at 18:38 UTC - **Last Updated**: September 16, 2024 at 22:40 UTC - **Reserved Date**: January 23, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in index.php in Tribiq CMS Community 5.0.10B and 5.0.11E allows remote attackers to inject arbitrary web script or HTML via the cID parameter in a document action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [32650](http://www.securityfocus.com/bid/32650) 2. [33021](http://secunia.com/advisories/33021)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15507, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15507 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15507 - **State**: PUBLISHED - **Published Date**: July 07, 2020 at 01:42 UTC - **Last Updated**: August 04, 2024 at 13:15 UTC - **Reserved Date**: July 02, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An arbitrary file reading vulnerability in MobileIron Core versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to read files on the system via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.mobileiron.com/en/blog/mobileiron-security-updates-available) 2. [](https://www.mobileiron.com/en/blog/mobileiron-security-updates-available)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-7143, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-7143 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-7143 - **State**: PUBLISHED - **Published Date**: March 07, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 20:50 UTC - **Reserved Date**: March 07, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Call Center Software 0.93 and earlier allows remote attackers to inject arbitrary web script or HTML via the problem description field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20061012 MHL-2006-002 Public Advisory: "Call-Center-Software" Multiple Security Issues](http://www.securityfocus.com/archive/1/448423/100/0/threaded) 2. [20061011 MHL-2006-002 Public Advisory: "Call-Center-Software" Multiple Security Issues](http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0217.html) 3. [2389](http://securityreason.com/securityalert/2389) 4. [](http://www.mayhemiclabs.com/advisories/MHL-2006-002.txt) 5. [22365](http://secunia.com/advisories/22365) 6. [20474](http://www.securityfocus.com/bid/20474)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15494, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15494 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15494 - **State**: PUBLISHED - **Published Date**: August 23, 2019 at 12:44 UTC - **Last Updated**: August 05, 2024 at 00:49 UTC - **Reserved Date**: August 22, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description openITCOCKPIT before 3.7.1 allows SSRF, aka RVID 5-445b21. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/it-novum/openITCOCKPIT/releases/tag/openITCOCKPIT-3.7.1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2023, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2023 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2023 - **State**: PUBLISHED - **Published Date**: April 13, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 13:13 UTC - **Reserved Date**: April 13, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description USB20.dll in Secustick USB flash drive decouples the authorization and file access routines, which allows local users to bypass authentication requirements by altering the return value of the VerifyPassWord function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://tweakers.net/reviews/682) 2. [](http://tweakers.net/reviews/683) 3. [41592](http://osvdb.org/41592)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48370, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48370 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48370 - **State**: PUBLISHED - **Published Date**: May 09, 2023 at 01:21 UTC - **Last Updated**: January 28, 2025 at 18:06 UTC - **Reserved Date**: March 13, 2023 at 02:25 UTC - **Assigned By**: Unisoc ### Vulnerability Description In dialer service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges. ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000** Affected versions: - Android10/Android11/Android12/Android13 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35988, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35988 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35988 - **State**: PUBLISHED - **Published Date**: May 20, 2024 at 09:47 UTC - **Last Updated**: May 04, 2025 at 09:10 UTC - **Reserved Date**: May 17, 2024 at 13:50 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: riscv: Fix TASK_SIZE on 64-bit NOMMU On NOMMU, userspace memory can come from anywhere in physical RAM. The current definition of TASK_SIZE is wrong if any RAM exists above 4G, causing spurious failures in the userspace access routines. ### Affected Products **Linux - Linux** Affected versions: - 6bd33e1ece528f67646db33bf97406b747dafda0 (Status: affected) - 6bd33e1ece528f67646db33bf97406b747dafda0 (Status: affected) - 6bd33e1ece528f67646db33bf97406b747dafda0 (Status: affected) - 6bd33e1ece528f67646db33bf97406b747dafda0 (Status: affected) - 6bd33e1ece528f67646db33bf97406b747dafda0 (Status: affected) - 6bd33e1ece528f67646db33bf97406b747dafda0 (Status: affected) **Linux - Linux** Affected versions: - 5.5 (Status: affected) - 0 (Status: unaffected) - 5.10.216 (Status: unaffected) - 5.15.158 (Status: unaffected) - 6.1.90 (Status: unaffected) - 6.6.30 (Status: unaffected) - 6.8.9 (Status: unaffected) - 6.9 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/04bf2e5f95c1a52e28a7567a507f926efe31c3b6) 2. [](https://git.kernel.org/stable/c/52e8a42b11078d2aad4b9ba96503d77c7299168b) 3. [](https://git.kernel.org/stable/c/4201b8c8f2c32af321fb50867e68ac6c1cbed4be) 4. [](https://git.kernel.org/stable/c/a0f0dbbb1bc49fa0de18e92c36492ff6d804cdaa) 5. [](https://git.kernel.org/stable/c/efdcfa554b6eb228943ef1dd4d023c606be647d2) 6. [](https://git.kernel.org/stable/c/6065e736f82c817c9a597a31ee67f0ce4628e948)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-3785, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-3785 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-3785 - **State**: PUBLISHED - **Published Date**: March 13, 2019 at 22:00 UTC - **Last Updated**: September 17, 2024 at 01:56 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Cloud Foundry Cloud Controller, versions prior to 1.78.0, contain an endpoint with improper authorization. A remote authenticated malicious user with read permissions can request package information and receive a signed bit-service url that grants the user write permissions to the bit-service. ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **Cloud Foundry - CAPI** Affected versions: - All (Status: affected) ### References 1. [](https://www.cloudfoundry.org/blog/cve-2019-3785) 2. [107514](http://www.securityfocus.com/bid/107514)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6394, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6394 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6394 - **State**: PUBLISHED - **Published Date**: September 30, 2024 at 08:09 UTC - **Last Updated**: October 01, 2024 at 14:30 UTC - **Reserved Date**: June 27, 2024 at 17:33 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description A Local File Inclusion vulnerability exists in parisneo/lollms-webui versions below v9.8. The vulnerability is due to unverified path concatenation in the `serve_js` function in `app.py`, which allows attackers to perform path traversal attacks. This can lead to unauthorized access to arbitrary files on the server, potentially exposing sensitive information such as private SSH keys, configuration files, and source code. ### Weakness Classification (CWE) - CWE-29: Security Weakness ### Affected Products **parisneo - parisneo/lollms-webui** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/6df4f990-b632-4791-b3ea-f40c9ea905bf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35640 - **State**: PUBLISHED - **Published Date**: July 16, 2024 at 23:05 UTC - **Last Updated**: August 03, 2024 at 09:36 UTC - **Reserved Date**: July 11, 2022 at 18:50 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Sterling Partner Engagement Manager 6.2.2 could allow a local attacker to obtain sensitive information when a detailed technical error message is returned. IBM X-Force ID: 230933. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-209: Improper Input Validation ### Affected Products **IBM - Sterling Partner Engagement Manager** Affected versions: - 6.2.2 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7160300) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/230933)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8708, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8708 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8708 - **State**: REJECTED - **Published Date**: December 15, 2016 at 21:00 UTC - **Last Updated**: December 15, 2016 at 20:57 UTC - **Reserved Date**: October 17, 2016 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44577, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44577 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44577 - **State**: PUBLISHED - **Published Date**: September 11, 2024 at 00:00 UTC - **Last Updated**: September 11, 2024 at 19:15 UTC - **Reserved Date**: August 21, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a command injection vulnerability via the time_date function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.relyum.com/web/support/vulnerability-report/) 2. [](http://system-on-chip.com)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8190, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8190 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8190 - **State**: PUBLISHED - **Published Date**: November 22, 2017 at 19:00 UTC - **Last Updated**: September 17, 2024 at 00:36 UTC - **Reserved Date**: April 25, 2017 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description FusionSphere OpenStack V100R006C00SPC102(NFV)has an improper verification of cryptographic signature vulnerability. The software does not verify the cryptographic signature. An attacker with high privilege may exploit this vulnerability to inject malicious software. ### Affected Products **Huawei Technologies Co., Ltd. - FusionSphere OpenStack** Affected versions: - V100R006C00SPC102(NFV) (Status: affected) ### References 1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-fusionsphere-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2350, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2350 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2350 - **State**: PUBLISHED - **Published Date**: March 19, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 05:10 UTC - **Reserved Date**: March 19, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in MikroTik RouterOS 5.0 and earlier allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via a request in the status page to /cfg. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [73013](http://www.securityfocus.com/bid/73013) 2. [20150309 MikroTik RouterOS Admin Password Change CSRF](http://seclists.org/fulldisclosure/2015/Mar/49) 3. [](http://packetstormsecurity.com/files/130722/MikroTik-RouterOS-Cross-Site-Request-Forgery.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7230, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7230 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7230 - **State**: PUBLISHED - **Published Date**: October 08, 2014 at 19:00 UTC - **Last Updated**: August 06, 2024 at 12:40 UTC - **Reserved Date**: September 29, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The processutils.execute function in OpenStack oslo-incubator, Cinder, Nova, and Trove before 2013.2.4 and 2014.1 before 2014.1.3 allows local users to obtain passwords from commands that cause a ProcessExecutionError by reading the log. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20140929 Re: CVE request for vulnerability in OpenStack Cinder, Nova and Trove](http://seclists.org/oss-sec/2014/q3/853) 2. [openstack-cinder-cve20147230-info-disc(96725)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96725) 3. [70185](http://www.securityfocus.com/bid/70185) 4. [](https://bugs.launchpad.net/oslo-incubator/+bug/1343604) 5. [RHSA-2014:1939](http://rhn.redhat.com/errata/RHSA-2014-1939.html) 6. [USN-2405-1](http://www.ubuntu.com/usn/USN-2405-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12738, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12738 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12738 - **State**: PUBLISHED - **Published Date**: November 15, 2017 at 08:00 UTC - **Last Updated**: August 05, 2024 at 18:43 UTC - **Reserved Date**: August 09, 2017 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00. The integrated web server (port 80/tcp) of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into clicking on a malicious link. ### Affected Products **n/a - Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00** Affected versions: - Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00 (Status: affected) ### References 1. [](https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-164516.pdf) 2. [101884](http://www.securityfocus.com/bid/101884)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3312, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3312 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3312 - **State**: PUBLISHED - **Published Date**: June 19, 2023 at 00:00 UTC - **Last Updated**: April 23, 2025 at 16:21 UTC - **Reserved Date**: June 19, 2023 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A vulnerability was found in drivers/cpufreq/qcom-cpufreq-hw.c in cpufreq subsystem in the Linux Kernel. This flaw, during device unbind will lead to double release problem leading to denial of service. ### Weakness Classification (CWE) - CWE-415: Security Weakness ### Affected Products **n/a - Kernel** Affected versions: - Kernel version prior to 6.4-rc1 (Status: affected) ### References 1. [](https://patchwork.kernel.org/project/linux-pm/patch/20230323174026.950622-1-krzysztof.kozlowski%40linaro.org/) 2. [](https://security.netapp.com/advisory/ntap-20230731-0005/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26083, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26083 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26083 - **State**: PUBLISHED - **Published Date**: February 14, 2025 at 20:41 UTC - **Last Updated**: February 18, 2025 at 16:29 UTC - **Reserved Date**: March 02, 2022 at 00:32 UTC - **Assigned By**: intel ### Vulnerability Description Generation of weak initialization vector in an Intel(R) IPP Cryptography software library before version 2021.5 may allow an unauthenticated user to potentially enable information disclosure via local access. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-1204: Security Weakness ### Affected Products **n/a - Intel(R) IPP Cryptography software library** Affected versions: - before version 2021.5 (Status: affected) ### References 1. [https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html](https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0760, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0760 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0760 - **State**: PUBLISHED - **Published Date**: September 21, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:28 UTC - **Reserved Date**: September 19, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20000719 [LoWNOISE] Snoop Servlet (Tomcat 3.1 and 3.0)](http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26date%3D2000-07-15%26msg%3DPine.SUN.3.96.1000719235404.24004A-100000%40grex.cyberspace.org) 2. [1532](http://www.securityfocus.com/bid/1532)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21746, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21746 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21746 - **State**: PUBLISHED - **Published Date**: June 06, 2022 at 17:29 UTC - **Last Updated**: August 03, 2024 at 02:53 UTC - **Reserved Date**: November 26, 2021 at 00:00 UTC - **Assigned By**: MediaTek ### Vulnerability Description In imgsensor, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06479698; Issue ID: ALPS06479698. ### Affected Products **MediaTek, Inc. - MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6885, MT6893, MT8167, MT8167S, MT8168, MT8175, MT8362A, MT8365, MT8788** Affected versions: - Android 9.0, 10.0, 11.0, 12.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/June-2022)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5495, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5495 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5495 - **State**: PUBLISHED - **Published Date**: August 18, 2015 at 17:00 UTC - **Last Updated**: August 06, 2024 at 06:50 UTC - **Reserved Date**: July 10, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Mobile sliding menu module 7.x-2.x before 7.x-2.1 for Drupal allows remote authenticated users with the "administer menu" permission to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.drupal.org/node/2484213) 2. [](https://www.drupal.org/node/2484233) 3. [[oss-security] 20150704 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-100 to SA-CONTRIB-2015-131)](http://www.openwall.com/lists/oss-security/2015/07/04/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33021, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33021 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33021 - **State**: PUBLISHED - **Published Date**: May 16, 2022 at 17:53 UTC - **Last Updated**: April 16, 2025 at 16:21 UTC - **Reserved Date**: May 13, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description xArrow SCADA versions 7.2 and prior is vulnerable to cross-site scripting due to parameter ‘edate’ of the resource xhisalarm.htm, which may allow an unauthorized attacker to execute arbitrary code. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **xArrow - xArrow SCADA** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-229-03) ### Credits - Sharon Brizinov from Claroty, and Michael Heinzl reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23818, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23818 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23818 - **State**: PUBLISHED - **Published Date**: January 16, 2025 at 20:07 UTC - **Last Updated**: January 17, 2025 at 19:07 UTC - **Reserved Date**: January 16, 2025 at 11:30 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Peggy Kuo More Link Modifier allows Stored XSS.This issue affects More Link Modifier: from n/a through 1.0.3. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Peggy Kuo - More Link Modifier** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/more-link-modifier/vulnerability/wordpress-more-link-modifier-plugin-1-0-3-csrf-to-cross-site-scripting-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11817, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11817 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11817 - **State**: PUBLISHED - **Published Date**: October 13, 2017 at 13:00 UTC - **Last Updated**: September 16, 2024 at 23:46 UTC - **Reserved Date**: July 31, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly validates objects in memory, aka "Windows Information Disclosure Vulnerability". ### Affected Products **Microsoft Corporation - Windows Kernel** Affected versions: - Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 (Status: affected) ### References 1. [1039526](http://www.securitytracker.com/id/1039526) 2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11817) 3. [101095](http://www.securityfocus.com/bid/101095)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-42268, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-42268 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-42268 - **State**: PUBLISHED - **Published Date**: January 12, 2023 at 19:38 UTC - **Last Updated**: April 08, 2025 at 13:27 UTC - **Reserved Date**: October 03, 2022 at 14:20 UTC - **Assigned By**: nvidia ### Vulnerability Description Omniverse Kit contains a vulnerability in the reference applications Create, Audio2Face, Isaac Sim, View, Code, and Machinima. These applications allow executable Python code to be embedded in Universal Scene Description (USD) files to customize all aspects of a scene. If a user opens a USD file that contains embedded Python code in one of these applications, the embedded Python code automatically runs with the privileges of the user who opened the file. As a result, an unprivileged remote attacker could craft a USD file containing malicious Python code and persuade a local user to open the file, which may lead to information disclosure, data tampering, and denial of service. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-74: Security Weakness ### Affected Products **NVIDIA - Omniverse Audio2Face** Affected versions: - All versions prior to 2022.2 (Status: affected) **NVIDIA - Omniverse Create** Affected versions: - All versions prior to 2022.3 (Status: affected) **NVIDIA - NVIDIA Isaac Sim** Affected versions: - All versions prior to 2022.2.0 (Status: affected) **NVIDIA - Omniverse Machinima** Affected versions: - All versions prior to 2022.3 (Status: affected) **NVIDIA - Omniverse Code** Affected versions: - All versions prior to 2022.3.0 (Status: affected) **NVIDIA - Omniverse View** Affected versions: - All versions prior to 2022.2.1 (Status: affected) ### References 1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5418)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25064, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25064 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25064 - **State**: PUBLISHED - **Published Date**: March 02, 2024 at 02:56 UTC - **Last Updated**: March 19, 2025 at 15:53 UTC - **Reserved Date**: February 04, 2024 at 07:19 UTC - **Assigned By**: hikvision ### Vulnerability Description Due to insufficient server-side validation, an attacker with login privileges could access certain resources that the attacker should not have access to by changing parameter values. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **Hikvision - HikCentral Professional** Affected versions: - Versions after V2.0.0 and before V2.5.1 (Status: affected) ### References 1. [](https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-professional/) ### Credits - Abdulazeez Omar
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2563, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2563 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2563 - **State**: PUBLISHED - **Published Date**: November 22, 2005 at 02:00 UTC - **Last Updated**: August 08, 2024 at 01:29 UTC - **Reserved Date**: November 22, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Serena TeamTrack 6.1.1 allows remote attackers to obtain sensitive information such as user names, versions, and database information, and conduct cross-site scripting (XSS) attacks, via a direct request to tmtrack.dll with modified LoginPage and Template parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8185](http://www.osvdb.org/8185) 2. [teamtrack-loginpage-information-disclosure(16777)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16777) 3. [teamtrack-tmtrackdll-xss(16771)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16771) 4. [12122](http://secunia.com/advisories/12122) 5. [10770](http://www.securityfocus.com/bid/10770) 6. [8183](http://www.osvdb.org/8183) 7. [](http://www.securiteam.com/windowsntfocus/5SP0O0ADGG.html) 8. [8182](http://www.osvdb.org/8182)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9005, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9005 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9005 - **State**: PUBLISHED - **Published Date**: March 25, 2018 at 03:00 UTC - **Last Updated**: August 05, 2024 at 07:10 UTC - **Reserved Date**: March 24, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Advanced SystemCare Ultimate 11.0.1.58, the driver file (Monitor_win7_x64.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c4060d0. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c4060d0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47590, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47590 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47590 - **State**: PUBLISHED - **Published Date**: May 10, 2023 at 10:54 UTC - **Last Updated**: January 09, 2025 at 15:18 UTC - **Reserved Date**: December 20, 2022 at 08:12 UTC - **Assigned By**: Patchstack ### Vulnerability Description Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fugu Maintenance Switch plugin <= 1.5.2 versions. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Fugu - Maintenance Switch** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/maintenance-switch/wordpress-maintenance-switch-plugin-1-5-2-cross-site-scripting-xss?_s_id=cve) ### Credits - minhtuanact (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20854, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20854 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20854 - **State**: PUBLISHED - **Published Date**: November 10, 2022 at 17:31 UTC - **Last Updated**: August 03, 2024 at 02:24 UTC - **Reserved Date**: November 02, 2021 at 13:28 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the processing of SSH connections of Cisco Firepower Management Center (FMC) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a reboot on the affected device. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Cisco - Cisco Firepower Management Center** Affected versions: - N/A (Status: affected) **Cisco - Cisco Firepower Threat Defense Software** Affected versions: - N/A (Status: affected) ### References 1. [cisco-sa-fmc-dos-OwEunWJN](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-OwEunWJN)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9574, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9574 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9574 - **State**: PUBLISHED - **Published Date**: October 07, 2024 at 14:48 UTC - **Last Updated**: March 27, 2025 at 10:49 UTC - **Reserved Date**: October 07, 2024 at 07:41 UTC - **Assigned By**: INCIBE ### Vulnerability Description SQL injection vulnerability in SOPlanning <1.45, via /soplanning/www/user_groupes.php in the by parameter, which could allow a remote user to submit a specially crafted query, allowing an attacker to retrieve all the information stored in the DB. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SOPlanning - SOPlanning** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-soplanning) ### Credits - Rafael Pedrero
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8858, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8858 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8858 - **State**: PUBLISHED - **Published Date**: February 13, 2020 at 22:20 UTC - **Last Updated**: August 04, 2024 at 10:12 UTC - **Reserved Date**: February 11, 2020 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of Moxa MGate 5105-MB-EIP firmware version 4.1. Authentication is required to exploit this vulnerability. The specific flaw exists within the DestIP parameter within MainPing.asp. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9552. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Moxa - MGate 5105-MB-EIP** Affected versions: - firmware version 4.1 (Status: affected) ### References 1. [](https://www.zerodayinitiative.com/advisories/ZDI-20-214/) 2. [](https://www.moxa.com/en/support/support/security-advisory/mgate-5105-mb-eip-series-protocol-gateways-vulnerability) ### Credits - Dove Chiu, Philippe Lin, Charles Perine, Marco Balduzzi, Ryan Flores, Rainer Vosseler
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24015, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24015 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24015 - **State**: PUBLISHED - **Published Date**: August 09, 2023 at 09:05 UTC - **Last Updated**: September 20, 2024 at 12:07 UTC - **Reserved Date**: January 24, 2023 at 10:39 UTC - **Assigned By**: Nozomi ### Vulnerability Description A partial DoS vulnerability has been detected in the Reports section, exploitable by a malicious authenticated user forcing a report to be saved with its name set as null. The reports section will be partially unavailable for all later attempts to use it, with the report list seemingly stuck on loading. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-1286: Security Weakness ### Affected Products **Nozomi Networks - Guardian** Affected versions: - 0 (Status: affected) **Nozomi Networks - CMC** Affected versions: - 0 (Status: affected) ### References 1. [](https://security.nozominetworks.com/NN-2023:6-01) ### Credits - This issue was found by Stefano Libero of Nozomi Networks Product Security team during a scheduled internal VAPT testing session.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36772, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36772 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36772 - **State**: PUBLISHED - **Published Date**: January 22, 2024 at 14:11 UTC - **Last Updated**: May 30, 2025 at 14:22 UTC - **Reserved Date**: January 22, 2024 at 13:33 UTC - **Assigned By**: redhat ### Vulnerability Description CloudLinux CageFS 7.0.8-2 or below insufficiently restricts file paths supplied to the sendmail proxy command. This allows local users to read and write arbitrary files of certain file formats outside the CageFS environment. ### Weakness Classification (CWE) - CWE-73: Security Weakness ### Affected Products **Cloudlinux OS - cagefs** Affected versions: - 7.0.8-2 (Status: affected) - 7.1.1-1 (Status: unaffected) ### References 1. [](https://blog.cloudlinux.com/lve-manager-lve-stats-lve-utils-and-alt-python27-cllib-have-been-rolled-out-to-100) 2. [](http://seclists.org/fulldisclosure/2024/Jan/25) 3. [](http://packetstormsecurity.com/files/176791/CloudLinux-CageFS-7.0.8-2-Insufficiently-Restricted-Proxy-Command.html) 4. [](https://github.com/sbaresearch/advisories/tree/public/2020/SBA-ADV-20200707-02_CloudLinux_CageFS_Insufficiently_Restricted_Proxy_Commands) ### Credits - David Lisa Gnedt (SBA Research)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21825, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21825 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21825 - **State**: PUBLISHED - **Published Date**: March 06, 2025 at 16:04 UTC - **Last Updated**: May 04, 2025 at 07:21 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: bpf: Cancel the running bpf_timer through kworker for PREEMPT_RT During the update procedure, when overwrite element in a pre-allocated htab, the freeing of old_element is protected by the bucket lock. The reason why the bucket lock is necessary is that the old_element has already been stashed in htab->extra_elems after alloc_htab_elem() returns. If freeing the old_element after the bucket lock is unlocked, the stashed element may be reused by concurrent update procedure and the freeing of old_element will run concurrently with the reuse of the old_element. However, the invocation of check_and_free_fields() may acquire a spin-lock which violates the lockdep rule because its caller has already held a raw-spin-lock (bucket lock). The following warning will be reported when such race happens: BUG: scheduling while atomic: test_progs/676/0x00000003 3 locks held by test_progs/676: #0: ffffffff864b0240 (rcu_read_lock_trace){....}-{0:0}, at: bpf_prog_test_run_syscall+0x2c0/0x830 #1: ffff88810e961188 (&htab->lockdep_key){....}-{2:2}, at: htab_map_update_elem+0x306/0x1500 #2: ffff8881f4eac1b8 (&base->softirq_expiry_lock){....}-{2:2}, at: hrtimer_cancel_wait_running+0xe9/0x1b0 Modules linked in: bpf_testmod(O) Preemption disabled at: [<ffffffff817837a3>] htab_map_update_elem+0x293/0x1500 CPU: 0 UID: 0 PID: 676 Comm: test_progs Tainted: G ... 6.12.0+ #11 Tainted: [W]=WARN, [O]=OOT_MODULE Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)... Call Trace: <TASK> dump_stack_lvl+0x57/0x70 dump_stack+0x10/0x20 __schedule_bug+0x120/0x170 __schedule+0x300c/0x4800 schedule_rtlock+0x37/0x60 rtlock_slowlock_locked+0x6d9/0x54c0 rt_spin_lock+0x168/0x230 hrtimer_cancel_wait_running+0xe9/0x1b0 hrtimer_cancel+0x24/0x30 bpf_timer_delete_work+0x1d/0x40 bpf_timer_cancel_and_free+0x5e/0x80 bpf_obj_free_fields+0x262/0x4a0 check_and_free_fields+0x1d0/0x280 htab_map_update_elem+0x7fc/0x1500 bpf_prog_9f90bc20768e0cb9_overwrite_cb+0x3f/0x43 bpf_prog_ea601c4649694dbd_overwrite_timer+0x5d/0x7e bpf_prog_test_run_syscall+0x322/0x830 __sys_bpf+0x135d/0x3ca0 __x64_sys_bpf+0x75/0xb0 x64_sys_call+0x1b5/0xa10 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x4b/0x53 ... </TASK> It seems feasible to break the reuse and refill of per-cpu extra_elems into two independent parts: reuse the per-cpu extra_elems with bucket lock being held and refill the old_element as per-cpu extra_elems after the bucket lock is unlocked. However, it will make the concurrent overwrite procedures on the same CPU return unexpected -E2BIG error when the map is full. Therefore, the patch fixes the lock problem by breaking the cancelling of bpf_timer into two steps for PREEMPT_RT: 1) use hrtimer_try_to_cancel() and check its return value 2) if the timer is running, use hrtimer_cancel() through a kworker to cancel it again Considering that the current implementation of hrtimer_cancel() will try to acquire a being held softirq_expiry_lock when the current timer is running, these steps above are reasonable. However, it also has downside. When the timer is running, the cancelling of the timer is delayed when releasing the last map uref. The delay is also fixable (e.g., break the cancelling of bpf timer into two parts: one part in locked scope, another one in unlocked scope), it can be revised later if necessary. It is a bit hard to decide the right fix tag. One reason is that the problem depends on PREEMPT_RT which is enabled in v6.12. Considering the softirq_expiry_lock lock exists since v5.4 and bpf_timer is introduced in v5.15, the bpf_timer commit is used in the fixes tag and an extra depends-on tag is added to state the dependency on PREEMPT_RT. Depends-on: v6.12+ with PREEMPT_RT enabled ### Affected Products **Linux - Linux** Affected versions: - b00628b1c7d595ae5b544e059c27b1f5828314b4 (Status: affected) - b00628b1c7d595ae5b544e059c27b1f5828314b4 (Status: affected) - b00628b1c7d595ae5b544e059c27b1f5828314b4 (Status: affected) **Linux - Linux** Affected versions: - 5.15 (Status: affected) - 0 (Status: unaffected) - 6.12.13 (Status: unaffected) - 6.13.2 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/33e47d9573075342a41783a55c8c67bc71246fc1) 2. [](https://git.kernel.org/stable/c/fbeda3d939ca10063aafa7a77cc0f409d82cda88) 3. [](https://git.kernel.org/stable/c/58f038e6d209d2dd862fcf5de55407855856794d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18249, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18249 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18249 - **State**: PUBLISHED - **Published Date**: December 24, 2019 at 14:39 UTC - **Last Updated**: August 05, 2024 at 01:47 UTC - **Reserved Date**: October 22, 2019 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Reliable Controls MACH-ProWebCom/Sys, all versions prior to 2.15 (Firmware versions prior to 8.26.4), may allow attacker to execute commands on behalf of the user when an authenticated user clicks on a malicious link. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **n/a - Reliable Controls MACH-ProWebCom/Sys** Affected versions: - All versions prior to 2.15 (Firmware versions prior to 8.26.4) (Status: affected) ### References 1. [](https://www.us-cert.gov/ics/advisories/icsa-19-353-04)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27059, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27059 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27059 - **State**: PUBLISHED - **Published Date**: May 01, 2024 at 13:00 UTC - **Last Updated**: May 04, 2025 at 09:03 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command The isd200 sub-driver in usb-storage uses the HEADS and SECTORS values in the ATA ID information to calculate cylinder and head values when creating a CDB for READ or WRITE commands. The calculation involves division and modulus operations, which will cause a crash if either of these values is 0. While this never happens with a genuine device, it could happen with a flawed or subversive emulation, as reported by the syzbot fuzzer. Protect against this possibility by refusing to bind to the device if either the ATA_ID_HEADS or ATA_ID_SECTORS value in the device's ID information is 0. This requires isd200_Initialization() to return a negative error code when initialization fails; currently it always returns 0 (even when there is an error). ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 2.6.12 (Status: affected) - 0 (Status: unaffected) - 4.19.312 (Status: unaffected) - 5.4.274 (Status: unaffected) - 5.10.215 (Status: unaffected) - 5.15.154 (Status: unaffected) - 6.1.84 (Status: unaffected) - 6.6.24 (Status: unaffected) - 6.7.12 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/9968c701cba7eda42e5f0052b040349d6222ae34) 2. [](https://git.kernel.org/stable/c/eb7b01ca778170654e1c76950024270ba74b121f) 3. [](https://git.kernel.org/stable/c/284fb1003d5da111019b9e0bf99b084fd71ac133) 4. [](https://git.kernel.org/stable/c/6c1f36d92c0a8799569055012665d2bb066fb964) 5. [](https://git.kernel.org/stable/c/f42ba916689f5c7b1642092266d2f53cf527aaaa) 6. [](https://git.kernel.org/stable/c/871fd7b10b56d280990b7e754f43d888382ca325) 7. [](https://git.kernel.org/stable/c/3a67d4ab9e730361d183086dfb0ddd8c61f01636) 8. [](https://git.kernel.org/stable/c/014bcf41d946b36a8f0b8e9b5d9529efbb822f49)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0153, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0153 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0153 - **State**: PUBLISHED - **Published Date**: March 03, 2011 at 19:00 UTC - **Last Updated**: August 06, 2024 at 21:43 UTC - **Reserved Date**: December 23, 2010 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT4564) 2. [](http://support.apple.com/kb/HT4566) 3. [APPLE-SA-2011-03-02-1](http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html) 4. [APPLE-SA-2011-03-09-1](http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html) 5. [](http://support.apple.com/kb/HT4554) 6. [APPLE-SA-2011-03-09-2](http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html) 7. [oval:org.mitre.oval:def:17218](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17218)