System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26980, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26980 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26980 - **State**: PUBLISHED - **Published Date**: March 28, 2022 at 18:00 UTC - **Last Updated**: August 03, 2024 at 05:18 UTC - **Reserved Date**: March 13, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Teampass 2.1.26 allows reflected XSS via the index.php PATH_INFO. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/nilsteampassnet/TeamPass/commits/teampass_2) 2. [](https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38935, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38935 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38935 - **State**: PUBLISHED - **Published Date**: August 07, 2023 at 00:00 UTC - **Last Updated**: October 15, 2024 at 20:07 UTC - **Reserved Date**: July 25, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AC1206 V15.03.06.23, AC8 V4 V16.03.34.06, AC5 V1.0 V15.03.06.28, AC10 v4.0 V16.03.10.13 and AC9 V3.0 V15.03.06.42_multi were discovered to contain a tack overflow via the list parameter in the formSetQosBand function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/formSetQosBand/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43479, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43479 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43479 - **State**: PUBLISHED - **Published Date**: December 05, 2022 at 00:00 UTC - **Last Updated**: April 24, 2025 at 14:14 UTC - **Reserved Date**: October 20, 2022 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Open redirect vulnerability in SHIRASAGI v1.14.4 to v1.15.0 allows a remote unauthenticated attacker to redirect users to an arbitrary web site and conduct a phishing attack. ### Affected Products **SHIRASAGI Project - SHIRASAGI** Affected versions: - v1.14.4 to v1.15.0 (Status: affected) ### References 1. [](https://www.ss-proj.org/) 2. [](https://github.com/shirasagi/shirasagi) 3. [](https://www.ss-proj.org/support/928.html) 4. [](https://jvn.jp/en/jp/JVN86350682/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8365, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8365 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8365 - **State**: PUBLISHED - **Published Date**: September 02, 2024 at 01:30 UTC - **Last Updated**: September 04, 2024 at 17:18 UTC - **Reserved Date**: August 30, 2024 at 22:54 UTC - **Assigned By**: HashiCorp ### Vulnerability Description Vault Community Edition and Vault Enterprise experienced a regression where functionality that HMAC’d sensitive headers in the configured audit device, specifically client tokens and token accessors, was removed. This resulted in the plaintext values of client tokens and token accessors being stored in the audit log. This vulnerability, CVE-2024-8365, was fixed in Vault Community Edition and Vault Enterprise 1.17.5 and Vault Enterprise 1.16.9. ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **HashiCorp - Vault** Affected versions: - 1.17.3 (Status: affected) **HashiCorp - Vault Enterprise** Affected versions: - 1.16.7 (Status: affected) ### References 1. [](https://discuss.hashicorp.com/t/hcsec-2024-18-vault-leaks-client-token-and-token-accessor-in-audit-devices/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46381, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46381 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46381 - **State**: PUBLISHED - **Published Date**: December 13, 2022 at 00:00 UTC - **Last Updated**: April 22, 2025 at 14:39 UTC - **Reserved Date**: December 03, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-46381/CVE-2022-46381.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27639, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27639 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27639 - **State**: PUBLISHED - **Published Date**: June 01, 2023 at 00:00 UTC - **Last Updated**: January 09, 2025 at 19:42 UTC - **Reserved Date**: March 05, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the tshirtecommerce (aka Custom Product Designer) component 2.1.4 for PrestaShop. An HTTP request can be forged with the POST parameter file_name in the tshirtecommerce/ajax.php?type=svg endpoint, to allow a remote attacker to traverse directories on the system in order to open files (without restriction on the extension and path). Only files that can be parsed in XML can be opened. This is exploited in the wild in March 2023. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://friends-of-presta.github.io/security-advisories/module/2023/03/30/tshirtecommerce_cwe-22.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36579, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36579 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36579 - **State**: PUBLISHED - **Published Date**: August 19, 2022 at 16:58 UTC - **Last Updated**: August 03, 2024 at 10:07 UTC - **Reserved Date**: July 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Wellcms 2.2.0 is vulnerable to Cross Site Request Forgery (CSRF). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wellcms/wellcms/issues/11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1582 - **State**: PUBLISHED - **Published Date**: April 02, 2006 at 21:00 UTC - **Last Updated**: August 07, 2024 at 17:19 UTC - **Reserved Date**: April 02, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in index.php in Blank'N'Berg 0.2 allows remote attackers to inject arbitrary web script or HTML via the _path parameter. NOTE: this might be resultant from the directory traversal issue. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [24374](http://www.osvdb.org/24374) 2. [](http://www.silitix.com/bnb.php) 3. [blanknberg-index-xss(25618)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25618) 4. [1015854](http://securitytracker.com/id?1015854) 5. [19520](http://secunia.com/advisories/19520) 6. [17346](http://www.securityfocus.com/bid/17346)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-13055, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-13055 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-13055 - **State**: PUBLISHED - **Published Date**: June 29, 2019 at 19:07 UTC - **Last Updated**: August 04, 2024 at 23:41 UTC - **Reserved Date**: June 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain Logitech Unifying devices allow attackers to dump AES keys and addresses, leading to the capability of live decryption of Radio Frequency transmissions, as demonstrated by an attack against a Logitech K360 keyboard. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.youtube.com/watch?v=5z_PEZ5PyeA)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46822, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46822 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46822 - **State**: PUBLISHED - **Published Date**: June 18, 2022 at 15:27 UTC - **Last Updated**: August 04, 2024 at 05:17 UTC - **Reserved Date**: June 18, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The PPM reader in libjpeg-turbo through 2.0.90 mishandles use of tjLoadImage for loading a 16-bit binary PPM file into a grayscale buffer and loading a 16-bit binary PGM file into an RGB buffer. This is related to a heap-based buffer overflow in the get_word_rgb_row function in rdppm.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/221567)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5635, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5635 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5635 - **State**: PUBLISHED - **Published Date**: June 05, 2025 at 04:00 UTC - **Last Updated**: June 05, 2025 at 14:08 UTC - **Reserved Date**: June 04, 2025 at 11:35 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in PCMan FTP Server 2.0.7. This vulnerability affects unknown code of the component PLS Command Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-120: Security Weakness - CWE-119: Security Weakness ### Affected Products **PCMan - FTP Server** Affected versions: - 2.0.7 (Status: affected) ### References 1. [VDB-311122 | PCMan FTP Server PLS Command buffer overflow](https://vuldb.com/?id.311122) 2. [VDB-311122 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.311122) 3. [Submit #587057 | PCMan FTP Server 2.0.7 Buffer Overflow](https://vuldb.com/?submit.587057) 4. [](https://fitoxs.com/exploit/exploit-67a2e172844905e3e09735d62ac7a925e8492f78c789c2995a1f2474c539ed8f95.txt) ### Credits - Fernando Mengali (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1717, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1717 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1717 - **State**: PUBLISHED - **Published Date**: June 16, 2012 at 21:00 UTC - **Last Updated**: August 06, 2024 at 19:08 UTC - **Reserved Date**: March 16, 2012 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [53952](http://www.securityfocus.com/bid/53952) 2. [SUSE-SU-2012:1265](http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html) 3. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml) 4. [SUSE-SU-2012:1177](http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html) 5. [SUSE-SU-2012:1231](http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html) 6. [RHSA-2012:0734](http://rhn.redhat.com/errata/RHSA-2012-0734.html) 7. [](http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html) 8. [RHSA-2012:1243](http://rhn.redhat.com/errata/RHSA-2012-1243.html) 9. [[OpenJDK] 20120612 IcedTea6 1.10.8 & 1.11.3 Released](http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html) 10. [50659](http://secunia.com/advisories/50659) 11. [SUSE-SU-2012:1204](http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html) 12. [RHSA-2013:1455](http://rhn.redhat.com/errata/RHSA-2013-1455.html) 13. [MDVSA-2012:095](http://www.mandriva.com/security/advisories?name=MDVSA-2012:095) 14. [](http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html) 15. [RHSA-2013:1456](http://rhn.redhat.com/errata/RHSA-2013-1456.html) 16. [](http://www.ibm.com/support/docview.wss?uid=swg21615246) 17. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) 18. [51080](http://secunia.com/advisories/51080)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0224, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0224 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0224 - **State**: PUBLISHED - **Published Date**: March 08, 2018 at 07:00 UTC - **Last Updated**: December 02, 2024 at 20:56 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series Aggregation Services Routers could allow an authenticated, local attacker to execute arbitrary commands with root privileges on an affected operating system. The vulnerability is due to insufficient validation of user-supplied input by the affected operating system. An attacker could exploit this vulnerability by authenticating to an affected system and injecting malicious arguments into a vulnerable CLI command. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the affected system. Cisco Bug IDs: CSCvg38807. ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **n/a - Cisco StarOS** Affected versions: - Cisco StarOS (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-staros1) 2. [1040466](http://www.securitytracker.com/id/1040466) 3. [103344](http://www.securityfocus.com/bid/103344)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0755, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0755 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0755 - **State**: PUBLISHED - **Published Date**: January 23, 2024 at 13:48 UTC - **Last Updated**: May 22, 2025 at 17:36 UTC - **Reserved Date**: January 19, 2024 at 16:52 UTC - **Assigned By**: mozilla ### Vulnerability Description Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) **Mozilla - Firefox ESR** Affected versions: - unspecified (Status: affected) **Mozilla - Thunderbird** Affected versions: - unspecified (Status: affected) ### References 1. [Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7](https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701) 2. [](https://www.mozilla.org/security/advisories/mfsa2024-01/) 3. [](https://www.mozilla.org/security/advisories/mfsa2024-02/) 4. [](https://www.mozilla.org/security/advisories/mfsa2024-04/) 5. [](https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html) 6. [](https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html) ### Credits - Daniel Holbert, Andrew Osmond, and the Mozilla Fuzzing Team
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4677, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4677 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4677 - **State**: PUBLISHED - **Published Date**: August 04, 2013 at 20:00 UTC - **Last Updated**: August 06, 2024 at 16:52 UTC - **Reserved Date**: June 24, 2013 at 00:00 UTC - **Assigned By**: symantec ### Vulnerability Description Symantec Backup Exec 2010 R3 before 2010 R3 SP3 and 2012 before SP2 uses weak permissions (Everyone: Read and Everyone: Change) for backup data files, which allows local users to obtain sensitive information or modify the outcome of a restore via direct access to these files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20130801_00) 2. [95939](http://osvdb.org/95939) 3. [61487](http://www.securityfocus.com/bid/61487)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5344, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5344 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5344 - **State**: PUBLISHED - **Published Date**: June 05, 2019 at 14:14 UTC - **Last Updated**: August 04, 2024 at 19:54 UTC - **Reserved Date**: January 04, 2019 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. ### Affected Products **n/a - HPE Intelligent Management Center (IMC) PLAT** Affected versions: - 7.3 E0506P09 and earlier (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52739, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52739 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52739 - **State**: PUBLISHED - **Published Date**: May 21, 2024 at 15:23 UTC - **Last Updated**: May 04, 2025 at 12:49 UTC - **Reserved Date**: May 21, 2024 at 15:19 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: Fix page corruption caused by racy check in __free_pages When we upgraded our kernel, we started seeing some page corruption like the following consistently: BUG: Bad page state in process ganesha.nfsd pfn:1304ca page:0000000022261c55 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x1304ca flags: 0x17ffffc0000000() raw: 0017ffffc0000000 ffff8a513ffd4c98 ffffeee24b35ec08 0000000000000000 raw: 0000000000000000 0000000000000001 00000000ffffff7f 0000000000000000 page dumped because: nonzero mapcount CPU: 0 PID: 15567 Comm: ganesha.nfsd Kdump: loaded Tainted: P B O 5.10.158-1.nutanix.20221209.el7.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016 Call Trace: dump_stack+0x74/0x96 bad_page.cold+0x63/0x94 check_new_page_bad+0x6d/0x80 rmqueue+0x46e/0x970 get_page_from_freelist+0xcb/0x3f0 ? _cond_resched+0x19/0x40 __alloc_pages_nodemask+0x164/0x300 alloc_pages_current+0x87/0xf0 skb_page_frag_refill+0x84/0x110 ... Sometimes, it would also show up as corruption in the free list pointer and cause crashes. After bisecting the issue, we found the issue started from commit e320d3012d25 ("mm/page_alloc.c: fix freeing non-compound pages"): if (put_page_testzero(page)) free_the_page(page, order); else if (!PageHead(page)) while (order-- > 0) free_the_page(page + (1 << order), order); So the problem is the check PageHead is racy because at this point we already dropped our reference to the page. So even if we came in with compound page, the page can already be freed and PageHead can return false and we will end up freeing all the tail pages causing double free. ### Affected Products **Linux - Linux** Affected versions: - e320d3012d25b1fb5f3df4edb7bd44a1c362ec10 (Status: affected) - e320d3012d25b1fb5f3df4edb7bd44a1c362ec10 (Status: affected) - e320d3012d25b1fb5f3df4edb7bd44a1c362ec10 (Status: affected) - e320d3012d25b1fb5f3df4edb7bd44a1c362ec10 (Status: affected) - 830b103831a924a23af48562c4d274696e75ab4f (Status: affected) **Linux - Linux** Affected versions: - 5.10 (Status: affected) - 0 (Status: unaffected) - 5.10.168 (Status: unaffected) - 5.15.94 (Status: unaffected) - 6.1.12 (Status: unaffected) - 6.2 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/0a626e27f984dfbe96bd8e4fd08f20a2ede3ea23) 2. [](https://git.kernel.org/stable/c/3af734f3eac6f70ef8e272a80da40544b9d0f2b5) 3. [](https://git.kernel.org/stable/c/3b4c045a98f53a8890a94bb5846a390c8e39e673) 4. [](https://git.kernel.org/stable/c/462a8e08e0e6287e5ce13187257edbf24213ed03)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-33281, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-33281 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-33281 - **State**: PUBLISHED - **Published Date**: May 02, 2023 at 05:08 UTC - **Last Updated**: August 03, 2024 at 08:01 UTC - **Reserved Date**: June 14, 2022 at 10:44 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption due to improper validation of array index in computer vision while testing EVA kernel without sending any frames. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-129: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - FastConnect 6900 (Status: affected) - FastConnect 7800 (Status: affected) - Snapdragon 8 Gen 1 Mobile Platform (Status: affected) - WCD9380 (Status: affected) - WSA8830 (Status: affected) - WSA8835 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/may-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3327, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3327 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3327 - **State**: PUBLISHED - **Published Date**: June 21, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 14:14 UTC - **Reserved Date**: June 21, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description httpsv.exe in HTTP Server 1.6.2 allows remote attackers to obtain sensitive information (script source code) via a URI with a trailing %20 (encoded space). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2828](http://securityreason.com/securityalert/2828) 2. [24566](http://www.securityfocus.com/bid/24566) 3. [20070620 HTTP SERVER (httpsv1.6.2) source code disclosure](http://www.securityfocus.com/archive/1/471876/100/0/threaded) 4. [38628](http://osvdb.org/38628) 5. [http-extension-source-code-disclosure(34960)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34960)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14790, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14790 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14790 - **State**: PUBLISHED - **Published Date**: August 15, 2019 at 14:57 UTC - **Last Updated**: August 05, 2024 at 00:26 UTC - **Reserved Date**: August 09, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The limb-gallery (aka Limb Gallery) plugin 1.4.0 for WordPress has XSS via the wp-admin/admin-ajax.php?action=grsGalleryAjax&grsAction=shortcode task parameter, ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/limb-gallery/#developers) 2. [](https://www.pluginvulnerabilities.com/2019/06/26/what-would-hackers-be-interested-in-the-wordpress-plugin-limb-gallery-for/) 3. [](https://wpvulndb.com/vulnerabilities/9517)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2219, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2219 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2219 - **State**: REJECTED - **Published Date**: January 22, 2019 at 20:00 UTC - **Last Updated**: January 22, 2019 at 17:57 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2768 - **State**: PUBLISHED - **Published Date**: March 21, 2024 at 21:31 UTC - **Last Updated**: August 01, 2024 at 19:25 UTC - **Reserved Date**: March 21, 2024 at 15:33 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit-services.php. The manipulation of the argument editid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257604. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Campcodes - Complete Online Beauty Parlor Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-257604 | Campcodes Complete Online Beauty Parlor Management System edit-services.php sql injection](https://vuldb.com/?id.257604) 2. [VDB-257604 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.257604) 3. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%203.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6247 - **State**: PUBLISHED - **Published Date**: December 04, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 20:19 UTC - **Reserved Date**: December 03, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in Uapplication UPhotoGallery 1.1 allow remote attackers to execute arbitrary SQL commands via the ci parameter to (1) slideshow.asp or (2) thumbnails.asp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1950](http://securityreason.com/securityalert/1950) 2. [20070204 Uphotogallery Multiple Cross-Site Scripting Vulnerability](http://www.securityfocus.com/archive/1/459187/100/0/threaded) 3. [21319](http://www.securityfocus.com/bid/21319) 4. [uphotogallery-multiple-sql-injection(30556)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30556) 5. [20061126 uPhotoGallery (v 1.1) SQL Injection](http://www.securityfocus.com/archive/1/452827/100/0/threaded) 6. [](http://www.aria-security.com/forum/showthread.php?t=53)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50704, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50704 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50704 - **State**: PUBLISHED - **Published Date**: December 19, 2023 at 23:43 UTC - **Last Updated**: September 16, 2024 at 18:27 UTC - **Reserved Date**: December 11, 2023 at 16:37 UTC - **Assigned By**: icscert ### Vulnerability Description An attacker could construct a URL within the application that causes a redirection to an arbitrary external domain and could be leveraged to facilitate phishing attacks against application users. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **EFACEC - UC 500E** Affected versions: - version 10.1.0 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03) ### Credits - Aarón Flecha Menéndez of S21sec
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14603, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14603 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14603 - **State**: PUBLISHED - **Published Date**: July 15, 2020 at 17:34 UTC - **Last Updated**: September 27, 2024 at 18:33 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **Oracle Corporation - Financial Services Analytical Applications Infrastructure** Affected versions: - 8.0.6-8.1.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujul2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7090 - **State**: PUBLISHED - **Published Date**: August 21, 2024 at 05:30 UTC - **Last Updated**: August 21, 2024 at 13:26 UTC - **Reserved Date**: July 24, 2024 at 18:19 UTC - **Assigned By**: Wordfence ### Vulnerability Description The LH Add Media From Url plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘lh_add_media_from_url-file_url’ parameter in all versions up to, and including, 1.23 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **shawfactor - LH Add Media From Url** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b3461327-9195-48ed-b9c3-7b33198e9438?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/lh-add-media-from-url/trunk/lh-add-media-from-url.php#L173) 3. [](https://plugins.trac.wordpress.org/browser/lh-add-media-from-url/trunk/partials/upload.php#L6) ### Credits - Piotr Kuśpit
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53748, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53748 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53748 - **State**: PUBLISHED - **Published Date**: December 01, 2024 at 21:23 UTC - **Last Updated**: December 01, 2024 at 23:07 UTC - **Reserved Date**: November 22, 2024 at 13:52 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Terry Lin WP Mermaid allows Stored XSS.This issue affects WP Mermaid: from n/a through 1.0.2. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Terry Lin - WP Mermaid** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wp-mermaid/vulnerability/wordpress-wp-mermaid-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - theviper17 (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26223, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26223 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26223 - **State**: PUBLISHED - **Published Date**: July 22, 2021 at 18:34 UTC - **Last Updated**: August 03, 2024 at 20:19 UTC - **Reserved Date**: January 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in SourceCodester CASAP Automated Enrollment System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to view_pay.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BigTiger2020/CASAP-Automated-Enrollment-System/blob/main/CASAP-Automated-Enrollment-System-3.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2481 - **State**: PUBLISHED - **Published Date**: January 16, 2019 at 19:00 UTC - **Last Updated**: October 02, 2024 at 16:09 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 5.6.42 and prior (Status: affected) - 5.7.24 and prior (Status: affected) - 8.0.13 and prior (Status: affected) ### References 1. [106619](http://www.securityfocus.com/bid/106619) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html) 3. [USN-3867-1](https://usn.ubuntu.com/3867-1/) 4. [](https://security.netapp.com/advisory/ntap-20190118-0002/) 5. [RHSA-2019:2484](https://access.redhat.com/errata/RHSA-2019:2484) 6. [RHSA-2019:2511](https://access.redhat.com/errata/RHSA-2019:2511)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49074, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49074 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49074 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 01:54 UTC - **Last Updated**: May 04, 2025 at 08:29 UTC - **Reserved Date**: February 26, 2025 at 01:49 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3: Fix GICR_CTLR.RWP polling It turns out that our polling of RWP is totally wrong when checking for it in the redistributors, as we test the *distributor* bit index, whereas it is a different bit number in the RDs... Oopsie boo. This is embarassing. Not only because it is wrong, but also because it took *8 years* to notice the blunder... Just fix the damn thing. ### Affected Products **Linux - Linux** Affected versions: - 021f653791ad17e03f98aaa7fb933816ae16f161 (Status: affected) - 021f653791ad17e03f98aaa7fb933816ae16f161 (Status: affected) - 021f653791ad17e03f98aaa7fb933816ae16f161 (Status: affected) - 021f653791ad17e03f98aaa7fb933816ae16f161 (Status: affected) - 021f653791ad17e03f98aaa7fb933816ae16f161 (Status: affected) - 021f653791ad17e03f98aaa7fb933816ae16f161 (Status: affected) - 021f653791ad17e03f98aaa7fb933816ae16f161 (Status: affected) **Linux - Linux** Affected versions: - 3.17 (Status: affected) - 0 (Status: unaffected) - 4.19.238 (Status: unaffected) - 5.4.189 (Status: unaffected) - 5.10.111 (Status: unaffected) - 5.15.34 (Status: unaffected) - 5.16.20 (Status: unaffected) - 5.17.3 (Status: unaffected) - 5.18 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/c7daf1b4ad809692d5c26f33c02ed8a031066548) 2. [](https://git.kernel.org/stable/c/3c07cc242baf83f0bddbbd9d7945d0bee56d8b57) 3. [](https://git.kernel.org/stable/c/ff24114bb08d8b90edf2aff0a4fd0689523e6c17) 4. [](https://git.kernel.org/stable/c/7218a789abb3e033f5f3a85636ca50d9ae7b0fc9) 5. [](https://git.kernel.org/stable/c/60e1eb4811f53f5f60c788297d978515e7a2637a) 6. [](https://git.kernel.org/stable/c/6fef3e3179e6ed8fecdd004ede541674ffa7749d) 7. [](https://git.kernel.org/stable/c/0df6664531a12cdd8fc873f0cac0dcb40243d3e9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11068, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11068 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11068 - **State**: PUBLISHED - **Published Date**: April 10, 2019 at 19:38 UTC - **Last Updated**: August 04, 2024 at 22:40 UTC - **Reserved Date**: April 10, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6) 2. [[debian-lts-announce] 20190415 [SECURITY] [DLA 1756-1] libxslt security update](https://lists.debian.org/debian-lts-announce/2019/04/msg00016.html) 3. [USN-3947-2](https://usn.ubuntu.com/3947-2/) 4. [[oss-security] 20190422 Nokogiri security update v1.10.3](http://www.openwall.com/lists/oss-security/2019/04/22/1) 5. [USN-3947-1](https://usn.ubuntu.com/3947-1/) 6. [[oss-security] 20190423 Re: Nokogiri security update v1.10.3](http://www.openwall.com/lists/oss-security/2019/04/23/5) 7. [openSUSE-SU-2019:1433](http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00048.html) 8. [openSUSE-SU-2019:1430](http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00053.html) 9. [openSUSE-SU-2019:1428](http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00052.html) 10. [openSUSE-SU-2019:1527](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html) 11. [FEDORA-2019-e21c77ffae](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K/) 12. [FEDORA-2019-320d5295fc](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/) 13. [FEDORA-2019-e74d639587](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU/) 14. [openSUSE-SU-2019:1824](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html) 15. [](https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html) 16. [](https://security.netapp.com/advisory/ntap-20191017-0001/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1124 - **State**: PUBLISHED - **Published Date**: March 12, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:19 UTC - **Reserved Date**: March 12, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in Sun Management Center (SunMC) 2.1.1, 3.0, and 3.0 Revenue Release (RR), when installed and run by root, allows local users to create or modify arbitrary files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9073](http://secunia.com/advisories/9073) 2. [55141](http://sunsolve.sun.com/search/document.do?assetkey=1-26-55141-1) 3. [7960](http://www.securityfocus.com/bid/7960) 4. [VU#758932](http://www.kb.cert.org/vuls/id/758932) 5. [sunmc-files-writable-permissions(12343)](https://exchange.xforce.ibmcloud.com/vulnerabilities/12343)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0417, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0417 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0417 - **State**: PUBLISHED - **Published Date**: February 06, 2009 at 00:00 UTC - **Last Updated**: August 07, 2024 at 04:31 UTC - **Reserved Date**: February 03, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the AgaviWebRouting::gen(null) method in Agavi 0.11 before 0.11.6 and 1.0 before 1.0.0 beta 8 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with certain characters that are not properly handled by web browsers that do not strictly follow RFC 3986, such as Internet Explorer 6 and 7. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://blog.agavi.org/post/75829956/agavi-0-11-6-released-fixes-vulnerability) 2. [33826](http://www.securityfocus.com/bid/33826) 3. [](http://trac.agavi.org/ticket/1019) 4. [](http://blog.agavi.org/post/75830918/agavi-1-0-0-beta-8-released-fixes-vulnerability)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5577, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5577 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5577 - **State**: PUBLISHED - **Published Date**: December 15, 2008 at 17:45 UTC - **Last Updated**: August 07, 2024 at 10:56 UTC - **Reserved Date**: December 15, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in index.php in sCssBoard 1.0, 1.1, 1.11, and 1.12 allows remote attackers to execute arbitrary PHP code via a URL in the inc_function parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [5149](https://www.exploit-db.com/exploits/5149) 2. [4739](http://securityreason.com/securityalert/4739) 3. [scssboard-index-file-include(47457)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47457)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4449 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15882, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15882 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15882 - **State**: REJECTED - **Published Date**: July 14, 2020 at 17:02 UTC - **Last Updated**: July 14, 2020 at 17:02 UTC - **Reserved Date**: September 03, 2019 at 00:00 UTC - **Assigned By**: freebsd ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30266, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30266 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30266 - **State**: PUBLISHED - **Published Date**: April 04, 2024 at 15:42 UTC - **Last Updated**: August 02, 2024 at 01:32 UTC - **Reserved Date**: March 26, 2024 at 12:52 UTC - **Assigned By**: GitHub_M ### Vulnerability Description wasmtime is a runtime for WebAssembly. The 19.0.0 release of Wasmtime contains a regression introduced during its development which can lead to a guest WebAssembly module causing a panic in the host runtime. A valid WebAssembly module, when executed at runtime, may cause this panic. This vulnerability has been patched in version 19.0.1. ### CVSS Metrics - **CVSS Base Score**: 3.3/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-843: Security Weakness ### Affected Products **bytecodealliance - wasmtime** Affected versions: - = 19.0.0 (Status: affected) ### References 1. [https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-75hq-h6g9-h4q5](https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-75hq-h6g9-h4q5) 2. [https://github.com/bytecodealliance/wasmtime/issues/8281](https://github.com/bytecodealliance/wasmtime/issues/8281) 3. [https://github.com/bytecodealliance/wasmtime/pull/8018](https://github.com/bytecodealliance/wasmtime/pull/8018) 4. [https://github.com/bytecodealliance/wasmtime/pull/8283](https://github.com/bytecodealliance/wasmtime/pull/8283) 5. [https://github.com/bytecodealliance/wasmtime/commit/7f57d0bb0948fa56cc950278d0db230ed10e8664](https://github.com/bytecodealliance/wasmtime/commit/7f57d0bb0948fa56cc950278d0db230ed10e8664)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5293, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5293 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5293 - **State**: PUBLISHED - **Published Date**: April 20, 2020 at 16:55 UTC - **Last Updated**: August 04, 2024 at 08:22 UTC - **Reserved Date**: January 02, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In PrestaShop between versions 1.7.0.0 and 1.7.6.5, there are improper access controls on product page with combinations, attachments and specific prices. The problem is fixed in 1.7.6.5. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **PrestaShop - PrestaShop** Affected versions: - >= 1.7.0.0, < 1.7.6.5 (Status: affected) ### References 1. [](https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-cvjj-grfv-f56w) 2. [](https://github.com/PrestaShop/PrestaShop/commit/f9f442c87755908e23a6bcba8c443cdea1d78a7f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16706, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16706 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16706 - **State**: PUBLISHED - **Published Date**: September 14, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 10:32 UTC - **Reserved Date**: September 07, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description LG SuperSign CMS allows TVs to be rebooted remotely without authentication via a direct HTTP request to /qsr_server/device/reboot on port 9080. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://mamaquieroserpentester.blogspot.com/2018/09/multiple-vulnerabilities-in-lg.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31217, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31217 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31217 - **State**: PUBLISHED - **Published Date**: October 18, 2023 at 12:47 UTC - **Last Updated**: September 12, 2024 at 18:22 UTC - **Reserved Date**: April 25, 2023 at 12:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in MyTechTalky User Location and IP plugin <= 1.6 versions. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **MyTechTalky - User Location and IP** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/user-location-and-ip/wordpress-user-location-and-ip-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - deokhunKim (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26288, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26288 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26288 - **State**: PUBLISHED - **Published Date**: December 30, 2020 at 19:25 UTC - **Last Updated**: August 04, 2024 at 15:56 UTC - **Reserved Date**: October 01, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. It is an npm package "parse-server". In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext. This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage. ### CVSS Metrics - **CVSS Base Score**: 7.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-312: Security Weakness ### Affected Products **parse-community - parse-server** Affected versions: - < 4.5.0 (Status: affected) ### References 1. [](https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3) 2. [](https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a) 3. [](https://github.com/parse-community/parse-server/releases/tag/4.5.0) 4. [](https://www.npmjs.com/package/parse-server)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3514, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3514 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3514 - **State**: PUBLISHED - **Published Date**: July 21, 2016 at 10:00 UTC - **Last Updated**: October 11, 2024 at 20:51 UTC - **Reserved Date**: March 17, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Enterprise Communications Broker component in Oracle Communications Applications before PCz 2.0.0m4p1 allows remote authenticated users to affect confidentiality via vectors related to GUI, a different vulnerability than CVE-2016-3516. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html) 2. [1036401](http://www.securitytracker.com/id/1036401) 3. [](http://www.synacktiv.com/ressources/oracle_sbc_configuration_issues.pdf) 4. [91787](http://www.securityfocus.com/bid/91787)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2556, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2556 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2556 - **State**: PUBLISHED - **Published Date**: January 15, 2020 at 16:34 UTC - **Last Updated**: September 30, 2024 at 16:37 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Core). Supported versions that are affected are 16.2.0.0-16.2.19.0, 17.12.0.0-17.12.16.0, 18.8.0.0-18.8.16.0, 19.12.0.0 and 20.1.0.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Primavera P6 Enterprise Project Portfolio Management executes to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Primavera P6 Enterprise Project Portfolio Management. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:L). ### Affected Products **Oracle Corporation - Primavera P6 Professional Project Management** Affected versions: - 16.2.0.0-16.2.19.0 (Status: affected) - 17.12.0.0-17.12.16.0 (Status: affected) - 18.8.0.0-18.8.16.0 (Status: affected) - 19.12.0.0 (Status: affected) - 20.1.0.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6474 - **State**: PUBLISHED - **Published Date**: March 04, 2017 at 03:38 UTC - **Last Updated**: August 05, 2024 at 15:33 UTC - **Reserved Date**: March 03, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating record sizes. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13429) 2. [](https://www.wireshark.org/security/wnpa-sec-2017-07.html) 3. [DSA-3811](http://www.debian.org/security/2017/dsa-3811) 4. [96566](http://www.securityfocus.com/bid/96566) 5. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a998c9195f183d85f5b0bbeebba21a2d4d303d47)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5965, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5965 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5965 - **State**: PUBLISHED - **Published Date**: September 30, 2013 at 19:00 UTC - **Last Updated**: August 06, 2024 at 17:29 UTC - **Reserved Date**: September 30, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Node View Permissions module 7.x-1.x before 7.x-1.2 for Drupal does not properly implement the hook_query_alter function, which might allow remote attackers to obtain sensitive information by reading a node listing. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://drupal.org/node/2031621) 2. [[oss-security] 20130911 Re: CVE request for Drupal contrib modules](http://www.openwall.com/lists/oss-security/2013/09/11/9) 3. [54550](http://secunia.com/advisories/54550) 4. [20130828 Drupal Node View Permissions module and Flag module Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2013-08/0184.html) 5. [](https://drupal.org/node/2076315)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1847 - **State**: PUBLISHED - **Published Date**: February 28, 2024 at 17:34 UTC - **Last Updated**: September 02, 2024 at 08:11 UTC - **Reserved Date**: February 23, 2024 at 16:39 UTC - **Assigned By**: 3DS ### Vulnerability Description Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, IPT, JT, SAT, STL, STP, X_B or X_T file. NOTE: CVE-2024-3298 and CVE-2024-3299 were SPLIT from this ID. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-416: Use After Free - CWE-787: Out-of-bounds Write - CWE-125: Out-of-bounds Read - CWE-843: Security Weakness - CWE-908: Security Weakness - CWE-122: Heap-based Buffer Overflow - CWE-457: Security Weakness ### Affected Products **Dassault Systèmes - eDrawings** Affected versions: - Release SOLIDWORKS 2023 SP0 (Status: affected) - Release SOLIDWORKS 2024 SP0 (Status: affected) ### References 1. [](https://www.3ds.com/vulnerability/advisories) ### Credits - Mat Powell of Trend Micro Zero Day Initiative - Francis Provencher {PRL} - rgod
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0805, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0805 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0805 - **State**: PUBLISHED - **Published Date**: June 05, 2012 at 22:00 UTC - **Last Updated**: August 06, 2024 at 18:38 UTC - **Reserved Date**: January 19, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone, allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset keyword to the select function, or unspecified vectors to the (3) select.limit or (4) select.offset function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [sqlalchemy-select-sql-injection(73756)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73756) 2. [MDVSA-2012:059](http://www.mandriva.com/security/advisories?name=MDVSA-2012:059) 3. [](https://bugs.launchpad.net/keystone/+bug/918608) 4. [](http://www.sqlalchemy.org/trac/changeset/852b6a1a87e7/) 5. [DSA-2449](http://www.debian.org/security/2012/dsa-2449) 6. [](http://www.sqlalchemy.org/changelog/CHANGES_0_7_0) 7. [48771](http://secunia.com/advisories/48771) 8. [48328](http://secunia.com/advisories/48328) 9. [48327](http://secunia.com/advisories/48327) 10. [RHSA-2012:0369](http://rhn.redhat.com/errata/RHSA-2012-0369.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4927, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4927 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4927 - **State**: PUBLISHED - **Published Date**: May 19, 2025 at 10:00 UTC - **Last Updated**: May 19, 2025 at 14:19 UTC - **Reserved Date**: May 18, 2025 at 06:35 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in PHPGurukul Online Marriage Registration System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/between-dates-application-report.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **PHPGurukul - Online Marriage Registration System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-309489 | PHPGurukul Online Marriage Registration System between-dates-application-report.php sql injection](https://vuldb.com/?id.309489) 2. [VDB-309489 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309489) 3. [Submit #579300 | PHPGurukul Online Marriage Registration System using PHP and MySQL V1.0 SQL Injection](https://vuldb.com/?submit.579300) 4. [](https://github.com/sknadklasdls/CVE/issues/1) 5. [](https://phpgurukul.com/) ### Credits - zhangyijie123 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0775, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0775 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0775 - **State**: PUBLISHED - **Published Date**: February 13, 2008 at 23:00 UTC - **Last Updated**: August 07, 2024 at 07:54 UTC - **Reserved Date**: February 13, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in sboxDB.php in Simple Machines Forum (SMF) Shoutbox 1.14 through 1.16b allows remote attackers to inject arbitrary web script or HTML via strings to the shoutbox form that start with "&#", contain the desired script, and end with ";". ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [28900](http://secunia.com/advisories/28900) 2. [20080422 Re: Simple Machines Forum "SMF Shoutbox" Mod Persistent XSS](http://www.securityfocus.com/archive/1/491357/100/0/threaded) 3. [20080321 Re: Simple Machines Forum "SMF Shoutbox" Mod Persistent XSS](http://www.securityfocus.com/archive/1/489964/100/0/threaded) 4. [20080210 Simple Machines Forum "SMF Shoutbox" Mod Persistent XSS](http://www.securityfocus.com/archive/1/487912/100/0/threaded) 5. [27727](http://www.securityfocus.com/bid/27727) 6. [3651](http://securityreason.com/securityalert/3651)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5769, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5769 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5769 - **State**: PUBLISHED - **Published Date**: July 17, 2020 at 21:23 UTC - **Last Updated**: August 04, 2024 at 08:39 UTC - **Reserved Date**: January 06, 2020 at 00:00 UTC - **Assigned By**: tenable ### Vulnerability Description Insufficient output sanitization in Teltonika firmware TRB2_R_00.02.02 allows a remote, authenticated attacker to conduct persistent cross-site scripting (XSS) attacks by injecting malicious client-side code into the 'URL/ Host / Connection' form in the 'DATA TO SERVER' configuration section. ### Affected Products **n/a - Teltonika Gateway TRB245** Affected versions: - TRB2_R_00.02.02 firmware (Status: affected) ### References 1. [](https://www.tenable.com/security/research/tra-2020-43-0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13504, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13504 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13504 - **State**: PUBLISHED - **Published Date**: July 09, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 09:07 UTC - **Reserved Date**: July 08, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mintToken function of a smart contract implementation for MMCoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) 2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/MMCoin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0091 - **State**: PUBLISHED - **Published Date**: May 14, 2020 at 20:12 UTC - **Last Updated**: August 04, 2024 at 05:47 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In mnld, an incorrect configuration in driver_cfg of mnld for meta factory mode.Product: AndroidVersions: Android SoCAndroid ID: A-149808700 ### Affected Products **n/a - Android** Affected versions: - Android SoC (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2020-05-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6991, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6991 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6991 - **State**: PUBLISHED - **Published Date**: January 28, 2019 at 20:00 UTC - **Last Updated**: September 17, 2024 at 02:58 UTC - **Reserved Date**: January 28, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A classic Stack-based buffer overflow exists in the zmLoadUser() function in zm_user.cpp of the zmu binary in ZoneMinder through 1.32.3, allowing an unauthenticated attacker to execute code via a long username. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ZoneMinder/zoneminder/pull/2482) 2. [](https://github.com/ZoneMinder/zoneminder/issues/2478)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36028, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36028 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36028 - **State**: PUBLISHED - **Published Date**: November 14, 2023 at 17:57 UTC - **Last Updated**: April 29, 2025 at 23:34 UTC - **Reserved Date**: June 20, 2023 at 20:44 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) ### References 1. [Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36028)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26772, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26772 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26772 - **State**: PUBLISHED - **Published Date**: September 08, 2021 at 20:18 UTC - **Last Updated**: August 04, 2024 at 16:03 UTC - **Reserved Date**: October 07, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Command Injection in PPGo_Jobs v2.8.0 allows remote attackers to execute arbitrary code via the 'AjaxRun()' function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.csdn.net/qq_33020901/article/details/108938473) 2. [](https://github.com/george518/PPGo_Job/issues/56)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5892, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5892 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5892 - **State**: PUBLISHED - **Published Date**: November 14, 2006 at 22:00 UTC - **Last Updated**: August 07, 2024 at 20:04 UTC - **Reserved Date**: November 14, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in MoreInfo.asp in The Net Guys ASPired2Poll 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20061111 AspPired2 Poll <= 1.0 (MoreInfo.asp) Remote SQL Injection Exploit](http://www.securityfocus.com/archive/1/451320/100/0/threaded) 2. [20987](http://www.securityfocus.com/bid/20987) 3. [22796](http://secunia.com/advisories/22796) 4. [ADV-2006-4428](http://www.vupen.com/english/advisories/2006/4428) 5. [asppired2-moreinfo-sql-injection(30160)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30160) 6. [2746](https://www.exploit-db.com/exploits/2746)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34015, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34015 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34015 - **State**: PUBLISHED - **Published Date**: July 11, 2023 at 08:36 UTC - **Last Updated**: October 11, 2024 at 15:05 UTC - **Reserved Date**: May 25, 2023 at 11:26 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in PI Websolution Conditional shipping & Advanced Flat rate shipping rates / Flexible shipping for WooCommerce shipping plugin <= 1.6.4.4 versions. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **PI Websolution - Conditional shipping & Advanced Flat rate shipping rates / Flexible shipping for WooCommerce shipping** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/advanced-free-flat-shipping-woocommerce/wordpress-advanced-flat-rate-shipping-woocommerce-plugin-1-6-4-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Skalucy (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42532, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42532 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42532 - **State**: PUBLISHED - **Published Date**: May 02, 2022 at 22:24 UTC - **Last Updated**: September 17, 2024 at 02:11 UTC - **Reserved Date**: October 15, 2021 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Adobe - XMP Toolkit** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html) 2. [[debian-lts-announce] 20230925 [SECURITY] [DLA 3585-1] exempi security update](https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37059, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37059 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37059 - **State**: PUBLISHED - **Published Date**: June 04, 2024 at 12:01 UTC - **Last Updated**: August 02, 2024 at 03:43 UTC - **Reserved Date**: May 31, 2024 at 14:16 UTC - **Assigned By**: HiddenLayer ### Vulnerability Description Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.5.0 or newer, enabling a maliciously uploaded PyTorch model to run arbitrary code on an end user’s system when interacted with. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **MLflow - MLflow** Affected versions: - 0.5.0 (Status: affected) ### References 1. [](https://hiddenlayer.com/sai-security-advisory/mlflow-june2024)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7754, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7754 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7754 - **State**: PUBLISHED - **Published Date**: October 27, 2020 at 15:05 UTC - **Last Updated**: September 17, 2024 at 04:28 UTC - **Reserved Date**: January 21, 2020 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **n/a - npm-user-validate** Affected versions: - unspecified (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352) 2. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353) 3. [](https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p) 4. [](https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e) ### Credits - Yeting Li
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2748, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2748 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2748 - **State**: PUBLISHED - **Published Date**: June 18, 2008 at 19:00 UTC - **Last Updated**: August 07, 2024 at 09:14 UTC - **Reserved Date**: June 18, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Skulltag 0.97d2-RC2 and earlier allows remote attackers to cause a denial of service (daemon hang) via a series of long, malformed connect packets, related to these packets being "parsed multiple times." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [skulltag-packet-dos(43125)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43125) 2. [](http://skulltag.com/testing/public/Skulltag%20Version%20History.txt) 3. [29760](http://www.securityfocus.com/bid/29760) 4. [](http://aluigi.org/poc/skulltagloop.zip) 5. [3953](http://securityreason.com/securityalert/3953) 6. [20080616 Server freezed in Skulltag 0.97d2-RC2](http://www.securityfocus.com/archive/1/493386/100/0/threaded) 7. [30668](http://secunia.com/advisories/30668)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31825, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31825 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31825 - **State**: PUBLISHED - **Published Date**: April 03, 2025 at 13:27 UTC - **Last Updated**: April 03, 2025 at 19:04 UTC - **Reserved Date**: April 01, 2025 at 13:20 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in pixelgrade Category Icon allows Path Traversal. This issue affects Category Icon: from n/a through 1.0.0. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **pixelgrade - Category Icon** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/category-icon/vulnerability/wordpress-category-icon-plugin-1-0-0-arbitrary-file-download-vulnerability?_s_id=cve) ### Credits - minhtuanact (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6716, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6716 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6716 - **State**: PUBLISHED - **Published Date**: November 25, 2016 at 16:00 UTC - **Last Updated**: August 06, 2024 at 01:36 UTC - **Reserved Date**: August 11, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An elevation of privilege vulnerability in the AOSP Launcher in Android 7.0 before 2016-11-01 could allow a local malicious application to create shortcuts that have elevated privileges without the user's consent. This issue is rated as Moderate because it is a local bypass of user interaction requirements (access to functionality that would normally require either user initiation or user permission). Android ID: A-30778130. ### Affected Products **Google Inc. - Android** Affected versions: - Android-7.0 (Status: affected) ### References 1. [94171](http://www.securityfocus.com/bid/94171) 2. [](https://source.android.com/security/bulletin/2016-11-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16257, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16257 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16257 - **State**: PUBLISHED - **Published Date**: September 12, 2019 at 12:56 UTC - **Last Updated**: August 05, 2024 at 01:10 UTC - **Reserved Date**: September 12, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Some Motorola devices include the SIMalliance Toolbox Browser (aka S@T Browser) on the UICC, which might allow remote attackers to retrieve location and IMEI information, or retrieve other data or execute certain commands, via SIM Toolkit (STK) instructions in an SMS message, aka Simjacker. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.adaptivemobile.com/blog/simjacker-next-generation-spying-over-mobile)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4780, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4780 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4780 - **State**: PUBLISHED - **Published Date**: September 14, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 19:23 UTC - **Reserved Date**: September 13, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in includes/functions.php in phpBB XS 0.58 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060912 AzzCoder => phpBB XS 0.58 Remote File Include](http://www.securityfocus.com/archive/1/445816/100/0/threaded) 2. [21841](http://secunia.com/advisories/21841) 3. [ADV-2006-3568](http://www.vupen.com/english/advisories/2006/3568) 4. [1576](http://securityreason.com/securityalert/1576) 5. [19961](http://www.securityfocus.com/bid/19961) 6. [2349](https://www.exploit-db.com/exploits/2349) 7. [phpbbxs-functions-file-include(28879)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28879)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27860, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27860 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27860 - **State**: PUBLISHED - **Published Date**: February 11, 2021 at 23:35 UTC - **Last Updated**: August 04, 2024 at 16:25 UTC - **Reserved Date**: October 27, 2020 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.0.1.35811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XFA templates. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11727. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Foxit - Reader** Affected versions: - 10.0.1.35811 (Status: affected) ### References 1. [](https://www.foxitsoftware.com/support/security-bulletins.html) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1415/) ### Credits - Anonymous
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29047, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29047 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29047 - **State**: PUBLISHED - **Published Date**: April 09, 2024 at 17:00 UTC - **Last Updated**: May 03, 2025 at 00:39 UTC - **Reserved Date**: March 14, 2024 at 23:05 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Microsoft SQL Server 2019 (CU 25)** Affected versions: - 15.0.0 (Status: affected) **Microsoft - Microsoft SQL Server 2022 for (CU 12)** Affected versions: - 16.0.0 (Status: affected) ### References 1. [Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29047)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7804, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7804 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7804 - **State**: PUBLISHED - **Published Date**: May 22, 2017 at 16:00 UTC - **Last Updated**: August 06, 2024 at 02:04 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Untrusted search path vulnerability in 7 Zip for Windows 16.02 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory. ### Affected Products **Igor Pavlov - 7 Zip for Windows** Affected versions: - 16.02 and earlier (Status: affected) ### References 1. [JVNDB-2016-000211](http://jvndb.jvn.jp/jvndb/JVNDB-2016-000211) 2. [JVN#76780067](https://jvn.jp/en/jp/JVN76780067/index.html) 3. [](http://www.7-zip.org/history.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2964, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2964 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2964 - **State**: PUBLISHED - **Published Date**: January 11, 2017 at 04:40 UTC - **Last Updated**: August 05, 2024 at 14:09 UTC - **Reserved Date**: December 02, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to the parsing of JPEG EXIF metadata. Successful exploitation could lead to arbitrary code execution. ### Affected Products **n/a - Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier.** Affected versions: - Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. (Status: affected) ### References 1. [95345](http://www.securityfocus.com/bid/95345) 2. [1037574](http://www.securitytracker.com/id/1037574) 3. [](http://www.zerodayinitiative.com/advisories/ZDI-17-014) 4. [](https://helpx.adobe.com/security/products/acrobat/apsb17-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30737, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30737 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30737 - **State**: PUBLISHED - **Published Date**: April 15, 2025 at 20:31 UTC - **Last Updated**: April 17, 2025 at 03:55 UTC - **Reserved Date**: March 25, 2025 at 20:11 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Smart View for Office product of Oracle Hyperion (component: Core Smart View). The supported version that is affected is 24.200. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Smart View for Office. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Smart View for Office accessible data as well as unauthorized access to critical data or complete access to all Oracle Smart View for Office accessible data. CVSS 3.1 Base Score 5.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N). ### CVSS Metrics - **CVSS Base Score**: 5.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N` ### Affected Products **Oracle Corporation - Oracle Smart View for Office** Affected versions: - 24.200 (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2025.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36083, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36083 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36083 - **State**: PUBLISHED - **Published Date**: September 07, 2022 at 21:55 UTC - **Last Updated**: April 22, 2025 at 17:23 UTC - **Reserved Date**: July 15, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description JOSE is "JSON Web Almost Everything" - JWA, JWS, JWE, JWT, JWK, JWKS with no dependencies using runtime's native crypto in Node.js, Browser, Cloudflare Workers, Electron, and Deno. The PBKDF2-based JWE key management algorithms expect a JOSE Header Parameter named `p2c` PBES2 Count, which determines how many PBKDF2 iterations must be executed in order to derive a CEK wrapping key. The purpose of this parameter is to intentionally slow down the key derivation function in order to make password brute-force and dictionary attacks more expensive. This makes the PBES2 algorithms unsuitable for situations where the JWE is coming from an untrusted source: an adversary can intentionally pick an extremely high PBES2 Count value, that will initiate a CPU-bound computation that may take an unreasonable amount of time to finish. Under certain conditions, it is possible to have the user's environment consume unreasonable amount of CPU time. The impact is limited only to users utilizing the JWE decryption APIs with symmetric secrets to decrypt JWEs from untrusted parties who do not limit the accepted JWE Key Management Algorithms (`alg` Header Parameter) using the `keyManagementAlgorithms` (or `algorithms` in v1.x) decryption option or through other means. The `v1.28.2`, `v2.0.6`, `v3.20.4`, and `v4.9.2` releases limit the maximum PBKDF2 iteration count to `10000` by default. It is possible to adjust this limit with a newly introduced `maxPBES2Count` decryption option. If users are unable to upgrade their required library version, they have two options depending on whether they expect to receive JWEs using any of the three PBKDF2-based JWE key management algorithms. They can use the `keyManagementAlgorithms` decryption option to disable accepting PBKDF2 altogether, or they can inspect the JOSE Header prior to using the decryption API and limit the PBKDF2 iteration count (`p2c` Header Parameter). ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **panva - jose** Affected versions: - >= 1.0, < 1.28.2 (Status: affected) - >= 2.0, < 2.0.6 (Status: affected) - >= 3.0, < 3.20.4 (Status: affected) - >= 4.0, < 4.9.2 (Status: affected) ### References 1. [](https://github.com/panva/jose/security/advisories/GHSA-jv3g-j58f-9mq9) 2. [](https://github.com/panva/jose/commit/03d6d013bf6e070e85adfe5731f526978e3e8e4d) 3. [](https://github.com/panva/jose/releases/tag/v4.9.2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5557, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5557 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5557 - **State**: PUBLISHED - **Published Date**: June 12, 2024 at 16:28 UTC - **Last Updated**: August 01, 2024 at 21:18 UTC - **Reserved Date**: May 31, 2024 at 06:58 UTC - **Assigned By**: schneider ### Vulnerability Description CWE-532: Insertion of Sensitive Information into Log File vulnerability exists that could cause exposure of SNMP credentials when an attacker has access to the controller logs. ### CVSS Metrics - **CVSS Base Score**: 4.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **Schneider Electric - SpaceLogic AS-P** Affected versions: - V5.0.3 and prior (Status: affected) **Schneider Electric - SpaceLogic AS-B** Affected versions: - V5.0.3 and prior (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-04.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1078, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1078 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1078 - **State**: PUBLISHED - **Published Date**: March 09, 2006 at 00:00 UTC - **Last Updated**: January 16, 2025 at 20:02 UTC - **Reserved Date**: March 08, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in htpasswd, as used in Acme thttpd 2.25b, and possibly other products such as Apache, might allow local users to gain privileges via (1) a long command line argument and (2) a long line in a file. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20070102 Apache 1.3.37 htpasswd buffer overflow vulnerability](http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051562.html) 2. [20060305 htpasswd bufferoverflow and command execution in thttpd-2.25b.](http://www.securityfocus.com/archive/1/426823/100/0/threaded) 3. [[thttpd] 20060305 Re: htpasswd.c security issues](http://marc.info/?l=thttpd&m=114154083000296&w=2) 4. [20041029 Re: local buffer overflow in htpasswd for apache 1.3.31 not fixed in .33?](http://seclists.org/bugtraq/2004/Oct/0359.html) 5. [16972](http://www.securityfocus.com/bid/16972) 6. [](http://issues.apache.org/bugzilla/show_bug.cgi?id=41279) 7. [[thttpd] 20060305 htpasswd.c security issues](http://marc.info/?l=thttpd&m=114153031201867&w=2) 8. [thttpd-command-file-bo(25216)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25216) 9. [20040916 FlowSecurity.org: Local Stack Overflow on htpasswd apache 1.3.31 advsory.](http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0547.html) 10. [](http://issues.apache.org/bugzilla/show_bug.cgi?id=31975) 11. [20041029 Apache 1.3.33 local buffer overflow in apache 1.3.31 not fixed in .33?](http://www.security-express.com/archives/fulldisclosure/2004-10/1117.html) 12. [apache-htpasswd-strcpy-bo(31236)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31236) 13. [20231127 SEC Consult SA-20231122 :: Multiple Vulnerabilities in m-privacy TightGate-Pro](http://seclists.org/fulldisclosure/2023/Nov/13) 14. [](http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1475 - **State**: PUBLISHED - **Published Date**: February 02, 2013 at 00:00 UTC - **Last Updated**: August 06, 2024 at 15:04 UTC - **Reserved Date**: January 30, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "IIOP type reuse management" in ObjectStreamClass.java. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml) 2. [MDVSA-2013:095](http://www.mandriva.com/security/advisories?name=MDVSA-2013:095) 3. [SSRT101156](http://marc.info/?l=bugtraq&m=136570436423916&w=2) 4. [TA13-032A](http://www.us-cert.gov/cas/techalerts/TA13-032A.html) 5. [](https://bugzilla.redhat.com/show_bug.cgi?id=860652) 6. [RHSA-2013:0236](http://rhn.redhat.com/errata/RHSA-2013-0236.html) 7. [oval:org.mitre.oval:def:16613](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16613) 8. [VU#858729](http://www.kb.cert.org/vuls/id/858729) 9. [RHSA-2013:0237](http://rhn.redhat.com/errata/RHSA-2013-0237.html) 10. [HPSBUX02857](http://marc.info/?l=bugtraq&m=136439120408139&w=2) 11. [RHSA-2013:0247](http://rhn.redhat.com/errata/RHSA-2013-0247.html) 12. [](http://www-01.ibm.com/support/docview.wss?uid=swg21631786) 13. [HPSBMU02874](http://marc.info/?l=bugtraq&m=136733161405818&w=2) 14. [SSRT101103](http://marc.info/?l=bugtraq&m=136439120408139&w=2) 15. [openSUSE-SU-2013:0312](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html) 16. [openSUSE-SU-2013:0377](http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html) 17. [oval:org.mitre.oval:def:19593](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19593) 18. [](http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/corba/rev/127e4c348a71) 19. [57694](http://www.securityfocus.com/bid/57694) 20. [oval:org.mitre.oval:def:19238](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19238) 21. [RHSA-2013:0246](http://rhn.redhat.com/errata/RHSA-2013-0246.html) 22. [HPSBUX02864](http://marc.info/?l=bugtraq&m=136570436423916&w=2) 23. [RHSA-2013:0245](http://rhn.redhat.com/errata/RHSA-2013-0245.html) 24. [](http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html) 25. [](http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS) 26. [oval:org.mitre.oval:def:19325](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19325) 27. [SSRT101184](http://marc.info/?l=bugtraq&m=136733161405818&w=2) 28. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0146, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0146 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0146 - **State**: PUBLISHED - **Published Date**: November 14, 2019 at 18:23 UTC - **Last Updated**: August 04, 2024 at 17:44 UTC - **Reserved Date**: November 13, 2018 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Resource leak in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 2.8.43 may allow an authenticated user to potentially enable a denial of service via local access. ### Affected Products **n/a - 2019.2 IPU – Intel(R) Ethernet 700 Series Controllers** Affected versions: - See provided reference (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0437, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0437 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0437 - **State**: PUBLISHED - **Published Date**: January 15, 2025 at 10:58 UTC - **Last Updated**: February 03, 2025 at 18:36 UTC - **Reserved Date**: January 13, 2025 at 22:09 UTC - **Assigned By**: Chrome ### Vulnerability Description Out of bounds read in Metrics in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) ### Affected Products **Google - Chrome** Affected versions: - 132.0.6834.83 (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html) 2. [](https://issues.chromium.org/issues/378623799)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4118, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4118 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4118 - **State**: PUBLISHED - **Published Date**: August 01, 2007 at 16:00 UTC - **Last Updated**: August 07, 2024 at 14:46 UTC - **Reserved Date**: August 01, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in includes/functions.inc.php in phpVoter 0.6 allows remote attackers to execute arbitrary PHP code via a URL in the sitepath parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2939](http://securityreason.com/securityalert/2939) 2. [39030](http://osvdb.org/39030) 3. [phpvoter-functions-file-include(35691)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35691) 4. [20070730 phpVoter v0.6 Remote File Include Vulnerability](http://www.securityfocus.com/archive/1/475100/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4515, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4515 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4515 - **State**: PUBLISHED - **Published Date**: November 11, 2012 at 11:00 UTC - **Last Updated**: August 06, 2024 at 20:35 UTC - **Reserved Date**: August 21, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Use-after-free vulnerability in khtml/rendering/render_replaced.cpp in Konqueror in KDE 4.7.3, when the context menu is shown, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by accessing an iframe when it is being updated. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [51145](http://secunia.com/advisories/51145) 2. [](http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc) 3. [[oss-security] 20121011 Re: Pre-advisory for Konqueror 4.7.3 (other versions may be affected)](http://www.openwall.com/lists/oss-security/2012/10/11/11) 4. [20121030 Medium risk security flaws in Konqueror](http://archives.neohapsis.com/archives/bugtraq/2012-11/0005.html) 5. [](http://quickgit.kde.org/index.php?p=kdelibs.git&a=commitdiff&h=4f2eb356f1c23444fff2cfe0a7ae10efe303d6d8) 6. [[oss-security] 20121030 Medium risk security flaws in Konqueror](http://www.openwall.com/lists/oss-security/2012/10/30/6) 7. [51097](http://secunia.com/advisories/51097)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5026, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5026 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5026 - **State**: PUBLISHED - **Published Date**: July 20, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 05:26 UTC - **Reserved Date**: January 03, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. ### Affected Products **n/a - Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions** Affected versions: - Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb18-21.html) 2. [104699](http://www.securityfocus.com/bid/104699) 3. [1041250](http://www.securitytracker.com/id/1041250)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5839, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5839 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5839 - **State**: PUBLISHED - **Published Date**: June 29, 2016 at 14:00 UTC - **Last Updated**: August 06, 2024 at 01:15 UTC - **Reserved Date**: June 23, 2016 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description WordPress before 4.5.3 allows remote attackers to bypass the sanitize_file_name protection mechanism via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/news/2016/06/wordpress-4-5-3/) 2. [](https://codex.wordpress.org/Version_4.5.3) 3. [1036163](http://www.securitytracker.com/id/1036163) 4. [91364](http://www.securityfocus.com/bid/91364) 5. [DSA-3639](http://www.debian.org/security/2016/dsa-3639)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4907, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4907 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4907 - **State**: PUBLISHED - **Published Date**: June 25, 2010 at 19:00 UTC - **Last Updated**: August 07, 2024 at 07:24 UTC - **Reserved Date**: June 25, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site request forgery (CSRF) vulnerabilities in oBlog allow remote attackers to hijack the authentication of administrators for requests that (1) change the admin password, (2) force an admin logout, (3) change the visibility of posts, (4) remove links, and (5) change the name fields of a blog. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [37661](http://secunia.com/advisories/37661) 2. [](http://packetstormsecurity.org/0912-exploits/oblog-xssxsrf.txt) 3. [oblog-unspecified-csrf(54714)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54714) 4. [60907](http://osvdb.org/60907)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28036, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28036 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28036 - **State**: PUBLISHED - **Published Date**: June 23, 2023 at 10:01 UTC - **Last Updated**: November 08, 2024 at 14:08 UTC - **Reserved Date**: March 10, 2023 at 04:59 UTC - **Assigned By**: dell ### Vulnerability Description Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable. ### CVSS Metrics - **CVSS Base Score**: 5.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Dell - CPG BIOS** Affected versions: - All Versions (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11401, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11401 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11401 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:46 UTC - **Last Updated**: December 20, 2021 at 22:46 UTC - **Reserved Date**: March 31, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1867, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1867 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1867 - **State**: PUBLISHED - **Published Date**: April 17, 2008 at 17:00 UTC - **Last Updated**: August 07, 2024 at 08:40 UTC - **Reserved Date**: April 17, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in Blog Pixel Motion (aka Blog PixelMotion) allows remote attackers to execute arbitrary SQL commands via the categorie parameter to index.php, possibly related to include/requetesIndex.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [blogpixelmotion-index-sql-injection(41668)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41668) 2. [28645](http://www.securityfocus.com/bid/28645) 3. [ADV-2008-1121](http://www.vupen.com/english/advisories/2008/1121/references) 4. [5382](https://www.exploit-db.com/exploits/5382)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3045, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3045 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3045 - **State**: PUBLISHED - **Published Date**: June 16, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 18:16 UTC - **Reserved Date**: June 16, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in manage_songs.php in Foing 0.7.0e and earlier allows remote attackers to execute arbitrary PHP code via a URL in the foing_root_path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060612 Foing (manage_songs.php) Remote File Inclusion[phpBB]](http://www.securityfocus.com/archive/1/436793/100/0/threaded) 2. [foing-phpbb-managesongs-file-include(27191)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27191) 3. [18392](http://www.securityfocus.com/bid/18392)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3448, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3448 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3448 - **State**: PUBLISHED - **Published Date**: August 01, 2013 at 16:00 UTC - **Last Updated**: August 06, 2024 at 16:07 UTC - **Reserved Date**: May 06, 2013 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco WebEx Meetings Server does not check whether a user account is active, which allows remote authenticated users to bypass intended access restrictions by performing meeting operations after account deactivation, aka Bug ID CSCuh33315. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=30277) 2. [61572](http://www.securityfocus.com/bid/61572) 3. [20130731 Cisco WebEx Meetings Server Inactive User Authentication Bypass Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3448) 4. [95880](http://osvdb.org/95880)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6125 - **State**: PUBLISHED - **Published Date**: November 26, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 15:54 UTC - **Reserved Date**: November 26, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in search_form.php in Softbiz Freelancers Script 1 allows remote attackers to execute arbitrary SQL commands via the sb_protype parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4660](https://www.exploit-db.com/exploits/4660) 2. [38908](http://osvdb.org/38908) 3. [softbiz-freelancers-searchform-sql-injection(38616)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38616) 4. [26569](http://www.securityfocus.com/bid/26569) 5. [27808](http://secunia.com/advisories/27808)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-6528, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-6528 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-6528 - **State**: PUBLISHED - **Published Date**: January 31, 2013 at 02:00 UTC - **Last Updated**: August 06, 2024 at 21:28 UTC - **Reserved Date**: January 30, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in ATutor before 2.1 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) themes/default/tile_search/index.tmpl.php, (2) login.php, (3) search.php, (4) password_reminder.php, (5) login.php/jscripts/infusion, (6) login.php/mods/_standard/flowplayer, (7) browse.php/jscripts/infusion/framework/fss, (8) registration.php/themes/default/ie_styles.css, (9) about.php, or (10) themes/default/social/basic_profile.tmpl.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [51423](http://www.securityfocus.com/bid/51423) 2. [atutor-multiplescripts-xss(72412)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72412) 3. [20120115 ATutor 2.0.3 Multiple XSS vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2012-01/0094.html) 4. [](http://atutor.ca/atutor/change_log.php) 5. [](http://www.darksecurity.de/advisories/2012/SSCHADV2012-002.txt) 6. [47597](http://secunia.com/advisories/47597)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11592, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11592 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11592 - **State**: PUBLISHED - **Published Date**: April 29, 2019 at 13:47 UTC - **Last Updated**: August 04, 2024 at 22:55 UTC - **Reserved Date**: April 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description WeBid 1.2.2 has reflected XSS via the id parameter to admin/deletenews.php, admin/editbannersuser.php, admin/editfaqscategory.php, or admin/excludeuser.php, or the offset parameter to admin/edituser.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.netsparker.com/web-applications-advisories/ns-18-053-reflected-cross-site-scripting-in-webid/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2292 - **State**: PUBLISHED - **Published Date**: March 20, 2025 at 10:09 UTC - **Last Updated**: March 20, 2025 at 18:57 UTC - **Reserved Date**: March 07, 2024 at 17:28 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description Due to a lack of access control, unauthorized users are able to view and modify information pertaining to other users. ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **changeweb - changeweb/unifiedtransform** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/90a7299e-9233-43fd-b666-7375c4fdbb3c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23021, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23021 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23021 - **State**: PUBLISHED - **Published Date**: June 01, 2021 at 12:23 UTC - **Last Updated**: August 03, 2024 at 18:58 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description The Nginx Controller 3.x before 3.7.0 agent configuration file /etc/controller-agent/agent.conf is world readable with current permission bits set to 644. ### Weakness Classification (CWE) - CWE-732: Security Weakness ### Affected Products **n/a - Nginx Controller** Affected versions: - “3.x before 3.7.0” (Status: affected) ### References 1. [](https://support.f5.com/csp/article/K36926027)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31746, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31746 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31746 - **State**: PUBLISHED - **Published Date**: December 22, 2022 at 00:00 UTC - **Last Updated**: April 15, 2025 at 18:24 UTC - **Reserved Date**: May 26, 2022 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description Internal URLs are protected by a secret UUID key, which could have been leaked to web page through the Referrer header. This vulnerability affects Firefox for iOS < 102. ### Affected Products **Mozilla - Firefox for iOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2022-27/) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1654416)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6813, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6813 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6813 - **State**: PUBLISHED - **Published Date**: July 10, 2024 at 07:36 UTC - **Last Updated**: August 02, 2024 at 08:42 UTC - **Reserved Date**: December 13, 2023 at 22:11 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Login by Auth0 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘wle’ parameter in all versions up to, and including, 4.6.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **auth0 - Login by Auth0** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0c4e0d48-fde1-45dd-8e06-4582cf677579?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3114611%40auth0&new=3114611%40auth0&sfp_email=&sfph_mail=) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7851, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7851 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7851 - **State**: PUBLISHED - **Published Date**: January 28, 2020 at 16:35 UTC - **Last Updated**: August 06, 2024 at 07:59 UTC - **Reserved Date**: October 16, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP before 4.2.8p4, when used on systems that do not use '\' or '/' characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite arbitrary files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.talosintel.com/reports/TALOS-2015-0062/) 2. [](http://support.ntp.org/bin/view/Main/SecurityNotice) 3. [](http://support.ntp.org/bin/view/Main/NtpBug2918)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44646, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44646 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44646 - **State**: PUBLISHED - **Published Date**: November 03, 2022 at 00:00 UTC - **Last Updated**: May 02, 2025 at 19:33 UTC - **Reserved Date**: November 03, 2022 at 00:00 UTC - **Assigned By**: JetBrains ### Vulnerability Description In JetBrains TeamCity version before 2022.10, no audit items were added upon editing a user's settings ### CVSS Metrics - **CVSS Base Score**: 2.2/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-223: Path Traversal ### Affected Products **JetBrains - TeamCity** Affected versions: - 2022.10 (Status: affected) ### References 1. [](https://www.jetbrains.com/privacy-security/issues-fixed/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3973, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3973 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3973 - **State**: PUBLISHED - **Published Date**: November 13, 2022 at 00:00 UTC - **Last Updated**: April 14, 2025 at 15:55 UTC - **Reserved Date**: November 13, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in Pingkon HMS-PHP. Affected is an unknown function of the file /admin/admin.php of the component Data Pump Metadata. The manipulation of the argument uname/pass leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213552. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-707: Security Weakness ### Affected Products **Pingkon - HMS-PHP** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Pingkon/HMS-PHP/issues/1) 2. [](https://vuldb.com/?id.213552)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4540, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4540 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4540 - **State**: PUBLISHED - **Published Date**: December 01, 2011 at 21:00 UTC - **Last Updated**: August 07, 2024 at 00:09 UTC - **Reserved Date**: November 23, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in AtMail Open (aka AtMail Open-Source edition) 1.04 allow remote attackers to inject arbitrary web script or HTML via the func parameter to (1) ldap.php or (2) search.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [50792](http://www.securityfocus.com/bid/50792) 2. [77330](http://osvdb.org/77330) 3. [48308](http://secunia.com/advisories/48308) 4. [](https://www.dognaedis.com/vulns/DGS-SEC-1.html) 5. [50877](http://www.securityfocus.com/bid/50877) 6. [47012](http://secunia.com/advisories/47012)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39376, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39376 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39376 - **State**: PUBLISHED - **Published Date**: November 03, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 16:40 UTC - **Reserved Date**: September 02, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to inject custom fields values in `mailto` links. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds. ### CVSS Metrics - **CVSS Base Score**: 2.6/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **glpi-project - glpi** Affected versions: - >= 0.65, < 10.0.4 (Status: affected) ### References 1. [](https://github.com/glpi-project/glpi/security/advisories/GHSA-6rh5-m5g7-327w)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1420 - **State**: PUBLISHED - **Published Date**: July 21, 2011 at 23:00 UTC - **Last Updated**: September 17, 2024 at 02:42 UTC - **Reserved Date**: April 15, 2010 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Cross-site scripting (XSS) vulnerability in CFNetwork in Apple Safari before 5.0.6 allows remote attackers to inject arbitrary web script or HTML via a crafted text/plain file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT4808) 2. [APPLE-SA-2011-07-20-1](http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21477, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21477 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21477 - **State**: PUBLISHED - **Published Date**: May 06, 2024 at 14:32 UTC - **Last Updated**: August 01, 2024 at 22:20 UTC - **Reserved Date**: December 12, 2023 at 06:07 UTC - **Assigned By**: qualcomm ### Vulnerability Description Transient DOS while parsing a protected 802.11az Fine Time Measurement (FTM) frame. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-126: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - AQT1000 (Status: affected) - AR8035 (Status: affected) - CSR8811 (Status: affected) - FastConnect 6200 (Status: affected) - FastConnect 6800 (Status: affected) - FastConnect 6900 (Status: affected) - FastConnect 7800 (Status: affected) - Immersive Home 214 Platform (Status: affected) - Immersive Home 216 Platform (Status: affected) - Immersive Home 316 Platform (Status: affected) - Immersive Home 318 Platform (Status: affected) - Immersive Home 3210 Platform (Status: affected) - Immersive Home 326 Platform (Status: affected) - IPQ5010 (Status: affected) - IPQ5028 (Status: affected) - IPQ5300 (Status: affected) - IPQ5302 (Status: affected) - IPQ5312 (Status: affected) - IPQ5332 (Status: affected) - IPQ6000 (Status: affected) - IPQ6010 (Status: affected) - IPQ6018 (Status: affected) - IPQ6028 (Status: affected) - IPQ8070A (Status: affected) - IPQ8071A (Status: affected) - IPQ8072A (Status: affected) - IPQ8074A (Status: affected) - IPQ8076 (Status: affected) - IPQ8076A (Status: affected) - IPQ8078 (Status: affected) - IPQ8078A (Status: affected) - IPQ8173 (Status: affected) - IPQ8174 (Status: affected) - IPQ9008 (Status: affected) - IPQ9554 (Status: affected) - IPQ9570 (Status: affected) - IPQ9574 (Status: affected) - QAM8255P (Status: affected) - QAM8650P (Status: affected) - QAM8775P (Status: affected) - QCA0000 (Status: affected) - QCA4024 (Status: affected) - QCA6391 (Status: affected) - QCA6420 (Status: affected) - QCA6430 (Status: affected) - QCA6554A (Status: affected) - QCA6564AU (Status: affected) - QCA6574 (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6584AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6696 (Status: affected) - QCA6698AQ (Status: affected) - QCA6797AQ (Status: affected) - QCA8075 (Status: affected) - QCA8081 (Status: affected) - QCA8082 (Status: affected) - QCA8084 (Status: affected) - QCA8085 (Status: affected) - QCA8337 (Status: affected) - QCA8386 (Status: affected) - QCA9888 (Status: affected) - QCA9889 (Status: affected) - QCC2073 (Status: affected) - QCC2076 (Status: affected) - QCC710 (Status: affected) - QCF8000 (Status: affected) - QCF8001 (Status: affected) - QCM4325 (Status: affected) - QCM8550 (Status: affected) - QCN5022 (Status: affected) - QCN5024 (Status: affected) - QCN5052 (Status: affected) - QCN5122 (Status: affected) - QCN5124 (Status: affected) - QCN5152 (Status: affected) - QCN5154 (Status: affected) - QCN5164 (Status: affected) - QCN6023 (Status: affected) - QCN6024 (Status: affected) - QCN6112 (Status: affected) - QCN6122 (Status: affected) - QCN6132 (Status: affected) - QCN6224 (Status: affected) - QCN6274 (Status: affected) - QCN6402 (Status: affected) - QCN6412 (Status: affected) - QCN6422 (Status: affected) - QCN6432 (Status: affected) - QCN9000 (Status: affected) - QCN9012 (Status: affected) - QCN9013 (Status: affected) - QCN9022 (Status: affected) - QCN9024 (Status: affected) - QCN9070 (Status: affected) - QCN9072 (Status: affected) - QCN9074 (Status: affected) - QCN9100 (Status: affected) - QCN9274 (Status: affected) - QCS8550 (Status: affected) - QFW7114 (Status: affected) - QFW7124 (Status: affected) - SA7255P (Status: affected) - SC8180X+SDX55 (Status: affected) - SC8380XP (Status: affected) - SD 8 Gen1 5G (Status: affected) - SD460 (Status: affected) - SD662 (Status: affected) - SD730 (Status: affected) - SD855 (Status: affected) - SDX55 (Status: affected) - SDX65M (Status: affected) - SG4150P (Status: affected) - SG8275P (Status: affected) - SM4125 (Status: affected) - SM6250 (Status: affected) - SM6250P (Status: affected) - SM7250P (Status: affected) - SM8550P (Status: affected) - Snapdragon 460 Mobile Platform (Status: affected) - Snapdragon 662 Mobile Platform (Status: affected) - Snapdragon 675 Mobile Platform (Status: affected) - Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected) - Snapdragon 680 4G Mobile Platform (Status: affected) - Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected) - Snapdragon 720G Mobile Platform (Status: affected) - Snapdragon 730 Mobile Platform (SM7150-AA) (Status: affected) - Snapdragon 730G Mobile Platform (SM7150-AB) (Status: affected) - Snapdragon 732G Mobile Platform (SM7150-AC) (Status: affected) - Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected) - Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected) - Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected) - Snapdragon 7c Compute Platform (SC7180-AC) (Status: affected) - Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro" (Status: affected) - Snapdragon 8 Gen 1 Mobile Platform (Status: affected) - Snapdragon 8 Gen 2 Mobile Platform (Status: affected) - Snapdragon 8 Gen 3 Mobile Platform (Status: affected) - Snapdragon 8+ Gen 2 Mobile Platform (Status: affected) - Snapdragon 855 Mobile Platform (Status: affected) - Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected) - Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" (Status: affected) - Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite" (Status: affected) - Snapdragon 8cx Compute Platform (SC8180X-AA, AB) (Status: affected) - Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro" (Status: affected) - Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" (Status: affected) - Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB) (Status: affected) - Snapdragon AR2 Gen 1 Platform (Status: affected) - Snapdragon X50 5G Modem-RF System (Status: affected) - Snapdragon X55 5G Modem-RF System (Status: affected) - Snapdragon X65 5G Modem-RF System (Status: affected) - Snapdragon X72 5G Modem-RF System (Status: affected) - Snapdragon X75 5G Modem-RF System (Status: affected) - SSG2115P (Status: affected) - SSG2125P (Status: affected) - SXR1230P (Status: affected) - SXR2230P (Status: affected) - SXR2250P (Status: affected) - WCD9326 (Status: affected) - WCD9335 (Status: affected) - WCD9340 (Status: affected) - WCD9341 (Status: affected) - WCD9370 (Status: affected) - WCD9375 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCD9390 (Status: affected) - WCD9395 (Status: affected) - WCN3910 (Status: affected) - WCN3950 (Status: affected) - WCN3980 (Status: affected) - WCN3988 (Status: affected) - WCN3990 (Status: affected) - WCN7880 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8832 (Status: affected) - WSA8835 (Status: affected) - WSA8840 (Status: affected) - WSA8845 (Status: affected) - WSA8845H (Status: affected) ### References 1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html)