System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-3521, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-3521 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3521
- **State**: PUBLISHED
- **Published Date**: July 03, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:21 UTC
- **Reserved Date**: July 03, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in ArcadeBuilder Game Portal Manager 1.7 allows remote attackers to execute arbitrary SQL commands via a usercookie cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36367](http://osvdb.org/36367)
2. [25916](http://secunia.com/advisories/25916)
3. [4133](https://www.exploit-db.com/exploits/4133)
4. [arcadebuilder-usercookie-sql-injection(35198)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35198)
5. [24731](http://www.securityfocus.com/bid/24731)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-50102, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-50102 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50102
- **State**: PUBLISHED
- **Published Date**: December 14, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:09 UTC
- **Reserved Date**: December 04, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Jarvis-616/cms/blob/master/Content%20data%20exists%20in%20storage%20XSS%20for%20editing.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-6441, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-6441 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6441
- **State**: PUBLISHED
- **Published Date**: December 10, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 20:26 UTC
- **Reserved Date**: December 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 allows local users to bypass security controls and boot Alchemy via certain alternate boot media, as demonstrated by a USB thumb drive.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23265](http://secunia.com/advisories/23265)
2. [](http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-14005, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-14005 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14005
- **State**: PUBLISHED
- **Published Date**: June 24, 2020 at 13:28 UTC
- **Last Updated**: August 04, 2024 at 12:32 UTC
- **Reserved Date**: June 10, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows remote attackers to execute arbitrary code via a defined event.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/alert3/c9dcce5474e55f408c93c086c30cdbb7)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-063/)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-21-065/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2003-0830, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2003-0830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0830
- **State**: PUBLISHED
- **Published Date**: October 01, 2003 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 20:22 UTC
- **Reserved Date**: September 22, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in marbles 1.0.2 and earlier allows local users to gain privileges via a long HOME environment variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-390](http://www.debian.org/security/2003/dsa-390)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-2287, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-2287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2287
- **State**: PUBLISHED
- **Published Date**: July 22, 2019 at 13:47 UTC
- **Last Updated**: August 04, 2024 at 18:42 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Improper validation for inputs received from firmware can lead to an out of bound write issue in video driver. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24 (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2019/06/03/june-2019-code-aurora-security-bulletin)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-26425, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-26425 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26425
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 18:11 UTC
- **Last Updated**: August 03, 2024 at 20:26 UTC
- **Reserved Date**: January 29, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Event Tracing Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26425)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-7696, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-7696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7696
- **State**: PUBLISHED
- **Published Date**: January 07, 2025 at 05:38 UTC
- **Last Updated**: January 07, 2025 at 15:31 UTC
- **Reserved Date**: August 12, 2024 at 05:09 UTC
- **Assigned By**: Axis
### Vulnerability Description
Seth Fogie, member of AXIS Camera Station Pro Bug Bounty Program, has found that it is possible for an authenticated malicious client to tamper with audit log creation in AXIS Camera Station, or perform a Denial-of-Service attack on the AXIS Camera Station server using maliciously crafted audit log entries.
Axis has released a patched version for the highlighted flaw. Please
refer to the Axis security advisory for more information and solution.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-117: Security Weakness
### Affected Products
**Axis Communications AB - AXIS Camera Station Pro**
Affected versions:
- <6.5 (Status: affected)
### References
1. [](https://www.axis.com/dam/public/b3/53/03/cve-2024-7696-en-US-459552.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-49672, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-49672 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49672
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:24 UTC
- **Last Updated**: May 04, 2025 at 08:43 UTC
- **Reserved Date**: February 26, 2025 at 02:21 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: tun: unlink NAPI from device on destruction
Syzbot found a race between tun file and device destruction.
NAPIs live in struct tun_file which can get destroyed before
the netdev so we have to del them explicitly. The current
code is missing deleting the NAPI if the queue was detached
first.
### Affected Products
**Linux - Linux**
Affected versions:
- 943170998b200190f99d3fe7e771437e2c51f319 (Status: affected)
- 943170998b200190f99d3fe7e771437e2c51f319 (Status: affected)
- 943170998b200190f99d3fe7e771437e2c51f319 (Status: affected)
- 943170998b200190f99d3fe7e771437e2c51f319 (Status: affected)
- 943170998b200190f99d3fe7e771437e2c51f319 (Status: affected)
- 943170998b200190f99d3fe7e771437e2c51f319 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.15 (Status: affected)
- 0 (Status: unaffected)
- 4.19.251 (Status: unaffected)
- 5.4.204 (Status: unaffected)
- 5.10.129 (Status: unaffected)
- 5.15.53 (Status: unaffected)
- 5.18.10 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/82e729aee59acefe135fceffadcbc5b86dd4f1b9)
2. [](https://git.kernel.org/stable/c/a8cf919022373c97a84fe596bbea544f909c485d)
3. [](https://git.kernel.org/stable/c/bec1be0a745ab420718217e3e0d9542a75108989)
4. [](https://git.kernel.org/stable/c/8145f77d38de4f88b8a69e1463f5c09ba189d77c)
5. [](https://git.kernel.org/stable/c/8661d4b8faa2f7ee7a559969c0a7c57f077b1728)
6. [](https://git.kernel.org/stable/c/3b9bc84d311104906d2b4995a9a02d7b7ddab2db)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-24418, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-24418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24418
- **State**: PUBLISHED
- **Published Date**: July 12, 2021 at 19:20 UTC
- **Last Updated**: August 03, 2024 at 19:28 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Smooth Scroll Page Up/Down Buttons WordPress plugin through 1.4 does not properly sanitise and validate its psb_positioning settings, allowing high privilege users such as admin to set an XSS payload in it, which will be executed in all pages of the blog
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Mark Senff - Smooth Scroll Page Up/Down Buttons**
Affected versions:
- 1.4 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/1512bba9-89e2-493d-b85d-10c7acb903db)
2. [](https://m0ze.ru/vulnerability/%5B2021-04-29%5D-%5BWordPress%5D-%5BCWE-79%5D-Smooth-Scroll-Page-UpDown-Buttons-WordPress-Plugin-v1.4.txt)
### Credits
- m0ze
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-1789, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-1789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1789
- **State**: PUBLISHED
- **Published Date**: April 09, 2013 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 20:16 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2013-3457](http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html)
2. [FEDORA-2013-3473](http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html)
3. [USN-1785-1](http://ubuntu.com/usn/usn-1785-1)
4. [](http://j00ru.vexillium.org/?p=1507)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=917109)
6. [52846](http://secunia.com/advisories/52846)
7. [[oss-security] 20130228 Re: CVE Request: poppler 0.22.1 security fixes](http://www.openwall.com/lists/oss-security/2013/02/28/8)
8. [](http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a205e71a2dbe0c8d4f4905a76a3f79ec522eacec)
9. [[oss-security] 20130227 Re: CVE Request: poppler 0.22.1 security fixes](http://www.openwall.com/lists/oss-security/2013/02/28/4)
10. [](http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-1384, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-1384 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1384
- **State**: PUBLISHED
- **Published Date**: March 24, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 17:12 UTC
- **Reserved Date**: March 24, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in apwc_win_main.jsp in the web console in IBM Tivoli Business Systems Manager (TBSM) before 3.1.0.1 allows remote attackers to inject arbitrary web script or HTML via the skin parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [OA14904](http://www-1.ibm.com/support/docview.wss?uid=swg1OA14904)
2. [tivoli-bsm-skin-xss(25412)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25412)
3. [24069](http://www.osvdb.org/24069)
4. [19332](http://secunia.com/advisories/19332)
5. [ADV-2006-1073](http://www.vupen.com/english/advisories/2006/1073)
6. [1015822](http://securitytracker.com/id?1015822)
7. [17210](http://www.securityfocus.com/bid/17210)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-13653, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-13653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13653
- **State**: PUBLISHED
- **Published Date**: October 24, 2019 at 14:58 UTC
- **Last Updated**: August 04, 2024 at 23:57 UTC
- **Reserved Date**: July 18, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow triggerPort OS Command Injection (issue 5 of 5).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pastebin.com/yAxBFe05)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-8858, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-8858 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8858
- **State**: PUBLISHED
- **Published Date**: January 23, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 08:29 UTC
- **Reserved Date**: April 20, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The uglify-js package before 2.6.0 for Node.js allows attackers to cause a denial of service (CPU consumption) via crafted input in a parse call, aka a "regular expression denial of service (ReDoS)."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [96409](http://www.securityfocus.com/bid/96409)
2. [](https://nodesecurity.io/advisories/48)
3. [[oss-security] 20160420 various vulnerabilities in Node.js packages](http://www.openwall.com/lists/oss-security/2016/04/20/11)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-1111, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-1111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1111
- **State**: PUBLISHED
- **Published Date**: October 27, 2014 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 18:45 UTC
- **Reserved Date**: February 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
lightdm before 1.0.9 does not properly close file descriptors before opening a child process, which allows local users to write to the lightdm log or have other unspecified impact.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/927060)
2. [openSUSE-SU-2012:0354](http://lists.opensuse.org/opensuse-updates/2012-03/msg00019.html)
3. [](https://bugzilla.novell.com/show_bug.cgi?id=745339)
4. [[oss-security] 20120305 Re: CVE Request: lightdm](http://seclists.org/oss-sec/2012/q1/566)
5. [[oss-security] 20120305 CVE Request: lightdm](http://seclists.org/oss-sec/2012/q1/557)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-0422, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-0422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0422
- **State**: PUBLISHED
- **Published Date**: October 05, 2018 at 14:00 UTC
- **Last Updated**: November 26, 2024 at 14:45 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the folder permissions of Cisco Webex Meetings client for Windows could allow an authenticated, local attacker to modify locally stored files and execute code on a targeted device with the privilege level of the user. The vulnerability is due to folder permissions that grant a user the permission to read, write, and execute files in the Webex folders. An attacker could exploit this vulnerability to write malicious files to the Webex client directory, affecting all other users of the targeted device. A successful exploit could allow a user to execute commands with elevated privileges. Attacks on single-user systems are less likely to occur, as the attack must be carried out by the user on the user's own system. Multiuser systems have a higher risk of exploitation because folder permissions have an impact on all users of the device. For an attacker to exploit this vulnerability successfully, a second user must execute the locally installed malicious file to allow remote code execution to occur.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [105281](http://www.securityfocus.com/bid/105281)
2. [1041681](http://www.securitytracker.com/id/1041681)
3. [20180905 Cisco Webex Meetings Client for Windows Privilege Escalation Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-webex-pe)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-5033, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-5033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5033
- **State**: PUBLISHED
- **Published Date**: May 21, 2025 at 17:31 UTC
- **Last Updated**: May 21, 2025 at 19:03 UTC
- **Reserved Date**: May 21, 2025 at 11:02 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic was found in XiaoBingby TeaCMS 2.0.2. Affected by this vulnerability is an unknown functionality of the file src/main/java/me/teacms/controller/admin/UserManageController/addUser. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
- CWE-862: Missing Authorization
### Affected Products
**XiaoBingby - TeaCMS**
Affected versions:
- 2.0.2 (Status: affected)
### References
1. [VDB-309853 | XiaoBingby TeaCMS addUser cross-site request forgery](https://vuldb.com/?id.309853)
2. [VDB-309853 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.309853)
3. [Submit #580729 | XiaoBingby TeaCMS 2.0.2 CSRF](https://vuldb.com/?submit.580729)
4. [](https://gitee.com/xiaobingby/TeaCMS/issues/IBYRPK)
### Credits
- electroN1c (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-5542, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-5542 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5542
- **State**: PUBLISHED
- **Published Date**: November 20, 2019 at 15:11 UTC
- **Last Updated**: August 04, 2024 at 20:01 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain a denial-of-service vulnerability in the RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM.
### Affected Products
**VMware - Workstation and Fusion**
Affected versions:
- Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2019-0021.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-0153, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-0153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0153
- **State**: PUBLISHED
- **Published Date**: July 01, 2024 at 09:05 UTC
- **Last Updated**: August 01, 2024 at 17:41 UTC
- **Reserved Date**: December 12, 2023 at 11:26 UTC
- **Assigned By**: Arm
### Vulnerability Description
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Valhall GPU Firmware, Arm Ltd Arm 5th Gen GPU Architecture Firmware allows a local non-privileged user to make improper GPU processing operations to access a limited amount outside of buffer bounds. If the operations are carefully prepared, then this in turn could give them access to all system memory. This issue affects Valhall GPU Firmware: from r29p0 through r46p0; Arm 5th Gen GPU Architecture Firmware: from r41p0 through r46p0.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Arm Ltd - Valhall GPU Firmware**
Affected versions:
- r29p0 (Status: affected)
**Arm Ltd - Arm 5th Gen GPU Architecture Firmware**
Affected versions:
- r41p0 (Status: affected)
### References
1. [](https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-16038, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-16038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16038
- **State**: PUBLISHED
- **Published Date**: January 08, 2021 at 17:54 UTC
- **Last Updated**: August 04, 2024 at 13:37 UTC
- **Reserved Date**: July 27, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in media in Google Chrome on OS X prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2020/12/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1138683)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-31411, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-31411 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31411
- **State**: PUBLISHED
- **Published Date**: June 19, 2023 at 14:59 UTC
- **Last Updated**: December 09, 2024 at 21:07 UTC
- **Reserved Date**: April 27, 2023 at 18:35 UTC
- **Assigned By**: SICK AG
### Vulnerability Description
A remote unprivileged attacker can modify and access configuration settings on the EventCam App due to the absence of API authentication. The lack of authentication in the API allows the attacker to potentially compromise the functionality of the EventCam App.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**SICK AG - EventCam App**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://sick.com/psirt)
2. [](https://sick.com/.well-known/csaf/white/2023/sca-2023-0005.pdf)
3. [](https://sick.com/.well-known/csaf/white/2023/sca-2023-0005.json)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-12941, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-12941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12941
- **State**: PUBLISHED
- **Published Date**: October 14, 2019 at 17:02 UTC
- **Last Updated**: August 04, 2024 at 23:32 UTC
- **Reserved Date**: June 24, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kth.se/nse/research/software-systems-architecture-and-security/)
2. [](http://www.diva-portal.org/smash/get/diva2:1334244/FULLTEXT01.pdf)
3. [](https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-23376, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-23376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23376
- **State**: PUBLISHED
- **Published Date**: May 10, 2021 at 22:12 UTC
- **Last Updated**: August 04, 2024 at 14:58 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NoneCMS v1.3 has a CSRF vulnerability in public/index.php/admin/nav/add.html, as demonstrated by adding a navigation column which can be injected with arbitrary web script or HTML via the name parameter to launch a stored XSS attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nangge/noneCms/issues/35)
2. [](https://cwe.mitre.org/data/definitions/352.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-3312, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-3312 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3312
- **State**: PUBLISHED
- **Published Date**: August 09, 2016 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
ActiveSyncProvider in Microsoft Windows 10 Gold and 1511 allows attackers to discover credentials by leveraging failure of Universal Outlook to obtain a secure connection, aka "Universal Outlook Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036577](http://www.securitytracker.com/id/1036577)
2. [92307](http://www.securityfocus.com/bid/92307)
3. [MS16-103](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-103)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-6272, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-6272 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6272
- **State**: PUBLISHED
- **Published Date**: September 22, 2017 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 23:20 UTC
- **Reserved Date**: February 23, 2017 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer handler where a value passed from a user to the driver is not correctly validated and used as the index to an array which may lead to a denial of service or possible escalation of privileges.
### Affected Products
**Nvidia Corporation - GPU Display Driver**
Affected versions:
- All (Status: affected)
### References
1. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4544)
2. [100997](http://www.securityfocus.com/bid/100997)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-55999, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-55999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-55999
- **State**: PUBLISHED
- **Published Date**: December 16, 2024 at 15:53 UTC
- **Last Updated**: December 16, 2024 at 16:13 UTC
- **Reserved Date**: December 14, 2024 at 19:42 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Marco Giannini XML Multilanguage Sitemap Generator.This issue affects XML Multilanguage Sitemap Generator: from n/a through 2.0.6.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Marco Giannini - XML Multilanguage Sitemap Generator**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/xml-multilanguage-sitemap-generator/vulnerability/wordpress-xml-multilanguage-sitemap-generator-plugin-2-0-6-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-47136, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-47136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47136
- **State**: PUBLISHED
- **Published Date**: March 25, 2024 at 09:07 UTC
- **Last Updated**: May 04, 2025 at 12:41 UTC
- **Reserved Date**: March 04, 2024 at 18:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: zero-initialize tc skb extension on allocation
Function skb_ext_add() doesn't initialize created skb extension with any
value and leaves it up to the user. However, since extension of type
TC_SKB_EXT originally contained only single value tc_skb_ext->chain its
users used to just assign the chain value without setting whole extension
memory to zero first. This assumption changed when TC_SKB_EXT extension was
extended with additional fields but not all users were updated to
initialize the new fields which leads to use of uninitialized memory
afterwards. UBSAN log:
[ 778.299821] UBSAN: invalid-load in net/openvswitch/flow.c:899:28
[ 778.301495] load of value 107 is not a valid value for type '_Bool'
[ 778.303215] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.12.0-rc7+ #2
[ 778.304933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[ 778.307901] Call Trace:
[ 778.308680] <IRQ>
[ 778.309358] dump_stack+0xbb/0x107
[ 778.310307] ubsan_epilogue+0x5/0x40
[ 778.311167] __ubsan_handle_load_invalid_value.cold+0x43/0x48
[ 778.312454] ? memset+0x20/0x40
[ 778.313230] ovs_flow_key_extract.cold+0xf/0x14 [openvswitch]
[ 778.314532] ovs_vport_receive+0x19e/0x2e0 [openvswitch]
[ 778.315749] ? ovs_vport_find_upcall_portid+0x330/0x330 [openvswitch]
[ 778.317188] ? create_prof_cpu_mask+0x20/0x20
[ 778.318220] ? arch_stack_walk+0x82/0xf0
[ 778.319153] ? secondary_startup_64_no_verify+0xb0/0xbb
[ 778.320399] ? stack_trace_save+0x91/0xc0
[ 778.321362] ? stack_trace_consume_entry+0x160/0x160
[ 778.322517] ? lock_release+0x52e/0x760
[ 778.323444] netdev_frame_hook+0x323/0x610 [openvswitch]
[ 778.324668] ? ovs_netdev_get_vport+0xe0/0xe0 [openvswitch]
[ 778.325950] __netif_receive_skb_core+0x771/0x2db0
[ 778.327067] ? lock_downgrade+0x6e0/0x6f0
[ 778.328021] ? lock_acquire+0x565/0x720
[ 778.328940] ? generic_xdp_tx+0x4f0/0x4f0
[ 778.329902] ? inet_gro_receive+0x2a7/0x10a0
[ 778.330914] ? lock_downgrade+0x6f0/0x6f0
[ 778.331867] ? udp4_gro_receive+0x4c4/0x13e0
[ 778.332876] ? lock_release+0x52e/0x760
[ 778.333808] ? dev_gro_receive+0xcc8/0x2380
[ 778.334810] ? lock_downgrade+0x6f0/0x6f0
[ 778.335769] __netif_receive_skb_list_core+0x295/0x820
[ 778.336955] ? process_backlog+0x780/0x780
[ 778.337941] ? mlx5e_rep_tc_netdevice_event_unregister+0x20/0x20 [mlx5_core]
[ 778.339613] ? seqcount_lockdep_reader_access.constprop.0+0xa7/0xc0
[ 778.341033] ? kvm_clock_get_cycles+0x14/0x20
[ 778.342072] netif_receive_skb_list_internal+0x5f5/0xcb0
[ 778.343288] ? __kasan_kmalloc+0x7a/0x90
[ 778.344234] ? mlx5e_handle_rx_cqe_mpwrq+0x9e0/0x9e0 [mlx5_core]
[ 778.345676] ? mlx5e_xmit_xdp_frame_mpwqe+0x14d0/0x14d0 [mlx5_core]
[ 778.347140] ? __netif_receive_skb_list_core+0x820/0x820
[ 778.348351] ? mlx5e_post_rx_mpwqes+0xa6/0x25d0 [mlx5_core]
[ 778.349688] ? napi_gro_flush+0x26c/0x3c0
[ 778.350641] napi_complete_done+0x188/0x6b0
[ 778.351627] mlx5e_napi_poll+0x373/0x1b80 [mlx5_core]
[ 778.352853] __napi_poll+0x9f/0x510
[ 778.353704] ? mlx5_flow_namespace_set_mode+0x260/0x260 [mlx5_core]
[ 778.355158] net_rx_action+0x34c/0xa40
[ 778.356060] ? napi_threaded_poll+0x3d0/0x3d0
[ 778.357083] ? sched_clock_cpu+0x18/0x190
[ 778.358041] ? __common_interrupt+0x8e/0x1a0
[ 778.359045] __do_softirq+0x1ce/0x984
[ 778.359938] __irq_exit_rcu+0x137/0x1d0
[ 778.360865] irq_exit_rcu+0xa/0x20
[ 778.361708] common_interrupt+0x80/0xa0
[ 778.362640] </IRQ>
[ 778.363212] asm_common_interrupt+0x1e/0x40
[ 778.364204] RIP: 0010:native_safe_halt+0xe/0x10
[ 778.365273] Code: 4f ff ff ff 4c 89 e7 e8 50 3f 40 fe e9 dc fe ff ff 48 89 df e8 43 3f 40 fe eb 90 cc e9 07 00 00 00 0f 00 2d 74 05 62 00 fb f4 <c3> 90 e9 07 00 00 00 0f 00 2d 64 05 62 00 f4 c3 cc cc 0f 1f 44 00
[ 778.369355] RSP: 0018:ffffffff84407e48 EFLAGS: 00000246
[ 778.370570] RAX
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- 038ebb1a713d114d54dbf14868a73181c0c92758 (Status: affected)
- 038ebb1a713d114d54dbf14868a73181c0c92758 (Status: affected)
- 038ebb1a713d114d54dbf14868a73181c0c92758 (Status: affected)
- 7154bda4cfc1f41b339121475d2b0234141f3492 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.9 (Status: affected)
- 0 (Status: unaffected)
- 5.10.42 (Status: unaffected)
- 5.12.9 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ac493452e937b8939eaf2d24cac51a4804b6c20e)
2. [](https://git.kernel.org/stable/c/86ab133b695ed7ba1f8786b12f4ca43137ad8c18)
3. [](https://git.kernel.org/stable/c/9453d45ecb6c2199d72e73c993e9d98677a2801b)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-0211, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-0211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0211
- **State**: PUBLISHED
- **Published Date**: February 08, 2009 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 04:24 UTC
- **Reserved Date**: January 20, 2009 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Unspecified vulnerability in the WebFGServer application in AREVA e-terrahabitat 5.7 and earlier allows remote attackers to cause a denial of service (system crash) via unknown vectors, aka PD32018.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20090205 C4 SCADA Security Advisory - AREVA e-terrahabitat / e-terraplatform Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/500689/100/0/threaded)
2. [33837](http://secunia.com/advisories/33837)
3. [33637](http://www.securityfocus.com/bid/33637)
4. [VU#337569](http://www.kb.cert.org/vuls/id/337569)
5. [](http://www.scada-security.com/vulnerabilities/areva1.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-5371, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-5371 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5371
- **State**: PUBLISHED
- **Published Date**: December 08, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: December 08, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
screenie in screenie 1.30.0 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/.screenie.##### temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-devel] 20080811 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages](http://lists.debian.org/debian-devel/2008/08/msg00283.html)
2. [32737](http://www.securityfocus.com/bid/32737)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-30460, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-30460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30460
- **State**: PUBLISHED
- **Published Date**: March 29, 2024 at 16:32 UTC
- **Last Updated**: August 02, 2024 at 01:32 UTC
- **Reserved Date**: March 27, 2024 at 06:54 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Tumult Inc Tumult Hype Animations.This issue affects Tumult Hype Animations: from n/a through 1.9.11.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Tumult Inc - Tumult Hype Animations**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/tumult-hype-animations/wordpress-tumult-hype-animations-plugin-1-9-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Majed Refaea (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-48960, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-48960 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48960
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 20:05 UTC
- **Last Updated**: May 04, 2025 at 08:26 UTC
- **Reserved Date**: August 22, 2024 at 01:27 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: hisilicon: Fix potential use-after-free in hix5hd2_rx()
The skb is delivered to napi_gro_receive() which may free it, after
calling this, dereferencing skb may trigger use-after-free.
### Affected Products
**Linux - Linux**
Affected versions:
- 57c5bc9ad7d799e9507ba6e993398d2c55f03fab (Status: affected)
- 57c5bc9ad7d799e9507ba6e993398d2c55f03fab (Status: affected)
- 57c5bc9ad7d799e9507ba6e993398d2c55f03fab (Status: affected)
- 57c5bc9ad7d799e9507ba6e993398d2c55f03fab (Status: affected)
- 57c5bc9ad7d799e9507ba6e993398d2c55f03fab (Status: affected)
- 57c5bc9ad7d799e9507ba6e993398d2c55f03fab (Status: affected)
- 57c5bc9ad7d799e9507ba6e993398d2c55f03fab (Status: affected)
- 57c5bc9ad7d799e9507ba6e993398d2c55f03fab (Status: affected)
**Linux - Linux**
Affected versions:
- 3.16 (Status: affected)
- 0 (Status: unaffected)
- 4.9.336 (Status: unaffected)
- 4.14.302 (Status: unaffected)
- 4.19.269 (Status: unaffected)
- 5.4.227 (Status: unaffected)
- 5.10.159 (Status: unaffected)
- 5.15.83 (Status: unaffected)
- 6.0.13 (Status: unaffected)
- 6.1 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/179499e7a240b2ef590f05eb379c810c26bbc8a4)
2. [](https://git.kernel.org/stable/c/8067cd244cea2c332f8326842fd10158fa2cb64f)
3. [](https://git.kernel.org/stable/c/3a4eddd1cb023a71df4152fcc76092953e6fe95a)
4. [](https://git.kernel.org/stable/c/1b6360a093ab8969c91a30bb58b753282e2ced4c)
5. [](https://git.kernel.org/stable/c/93aaa4bb72e388f6a4887541fd3d18b84f1b5ddc)
6. [](https://git.kernel.org/stable/c/b8ce0e6f9f88a6bb49d291498377e61ea27a5387)
7. [](https://git.kernel.org/stable/c/b6307f7a2fc1c5407b6176f2af34a95214a8c262)
8. [](https://git.kernel.org/stable/c/433c07a13f59856e4585e89e86b7d4cc59348fab)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-35398, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-35398 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35398
- **State**: PUBLISHED
- **Published Date**: May 28, 2024 at 14:38 UTC
- **Last Updated**: February 13, 2025 at 15:58 UTC
- **Reserved Date**: May 17, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a stack overflow via the desc parameter in the function setMacFilterRules.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://totolink.com)
2. [](https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/setMacFilterRules/README.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-6984, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-6984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6984
- **State**: PUBLISHED
- **Published Date**: July 29, 2024 at 14:04 UTC
- **Last Updated**: August 01, 2024 at 21:45 UTC
- **Reserved Date**: July 22, 2024 at 21:29 UTC
- **Assigned By**: canonical
### Vulnerability Description
An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-209: Improper Input Validation
### Affected Products
**Canonical Ltd. - Juju**
Affected versions:
- 3.5 (Status: affected)
- 3.4 (Status: affected)
- 3.3 (Status: affected)
- 3.1 (Status: affected)
- 2.9 (Status: affected)
### References
1. [](https://github.com/juju/juju/commit/da929676853092a29ddf8d589468cf85ba3efaf2)
2. [](https://github.com/juju/juju/security/advisories/GHSA-6vjm-54vp-mxhx)
3. [](https://www.cve.org/CVERecord?id=CVE-2024-6984)
### Credits
- Pedro Valverde Guimaraes
- Joe Phillips
- Mark Esler
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-29310, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-29310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29310
- **State**: PUBLISHED
- **Published Date**: March 24, 2025 at 00:00 UTC
- **Last Updated**: March 26, 2025 at 14:38 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in onos v2.7.0 allows attackers to trigger a packet deserialization problem when supplying a crafted LLDP packet. This vulnerability allows attackers to execute arbitrary commands or access network information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/Saber-Berserker/10c9d548b38fa988310d90b8314e3129.)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-0489, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-0489 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0489
- **State**: PUBLISHED
- **Published Date**: January 30, 2008 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: January 30, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in install.php in Clansphere 2007.4.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3597](http://securityreason.com/securityalert/3597)
2. [27471](http://www.securityfocus.com/bid/27471)
3. [clansphere-install-directory-traversal(39977)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39977)
4. [20080127 ClanSphere 2007.4.4 Remote File Disclosure Vulnerability.](http://www.securityfocus.com/archive/1/487132/100/0/threaded)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-16100, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-16100 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16100
- **State**: REJECTED
- **Published Date**: February 11, 2019 at 19:00 UTC
- **Last Updated**: February 11, 2019 at 18:57 UTC
- **Reserved Date**: August 29, 2018 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-5495, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-5495 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5495
- **State**: REJECTED
- **Published Date**: January 25, 2021 at 17:53 UTC
- **Last Updated**: January 25, 2021 at 17:53 UTC
- **Reserved Date**: January 03, 2020 at 00:00 UTC
- **Assigned By**: pivotal
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-45560, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-45560 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45560
- **State**: PUBLISHED
- **Published Date**: February 03, 2025 at 16:51 UTC
- **Last Updated**: February 12, 2025 at 20:51 UTC
- **Reserved Date**: September 02, 2024 at 10:26 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption while taking a snapshot with hardware encoder due to unvalidated userspace buffer.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-367: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AQT1000 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6430 (Status: affected)
- QCM5430 (Status: affected)
- QCM6490 (Status: affected)
- QCS5430 (Status: affected)
- QCS6490 (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- SC8380XP (Status: affected)
- SDM429W (Status: affected)
- Snapdragon 429 Mobile Platform (Status: affected)
- Snapdragon 7c+ Gen 3 Compute (Status: affected)
- Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180X-AA, AB) (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660B (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-13300, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-13300 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13300
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 20:23 UTC
- **Last Updated**: January 14, 2025 at 15:00 UTC
- **Reserved Date**: January 09, 2025 at 18:28 UTC
- **Assigned By**: drupal
### Vulnerability Description
Vulnerability in Drupal Print Anything.This issue affects Print Anything: *.*.
### Affected Products
**Drupal - Print Anything**
Affected versions:
- *.* (Status: affected)
### References
1. [](https://www.drupal.org/sa-contrib-2024-066)
### Credits
- Drew Webber
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-38050, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-38050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38050
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 17:03 UTC
- **Last Updated**: May 05, 2025 at 17:01 UTC
- **Reserved Date**: June 11, 2024 at 22:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Workstation Service Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-191: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Workstation Service Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38050)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-2305, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-2305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2305
- **State**: PUBLISHED
- **Published Date**: June 09, 2023 at 05:33 UTC
- **Last Updated**: December 20, 2024 at 23:38 UTC
- **Reserved Date**: April 26, 2023 at 13:52 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpdm_members', 'wpdm_login_form', 'wpdm_reg_form' shortcodes in versions up to, and including, 3.2.70 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**codename065 - Download Manager**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a66bc196-e5f8-46b4-a81c-c888eb64021c?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/download-manager/tags/3.2.70/src/User/views/members.php#L10)
3. [](https://plugins.trac.wordpress.org/browser/download-manager/tags/3.2.70/src/User/views/login-form.php#L10)
4. [](https://plugins.trac.wordpress.org/browser/download-manager/tags/3.2.70/src/User/views/reg-form.php#L11)
5. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2906403%40download-manager&new=2906403%40download-manager&sfp_email=&sfph_mail=)
### Credits
- Lana Codes
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-21720, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-21720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21720
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 02:07 UTC
- **Last Updated**: May 04, 2025 at 07:19 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
xfrm: delete intermediate secpath entry in packet offload mode
Packets handled by hardware have added secpath as a way to inform XFRM
core code that this path was already handled. That secpath is not needed
at all after policy is checked and it is removed later in the stack.
However, in the case of IP forwarding is enabled (/proc/sys/net/ipv4/ip_forward),
that secpath is not removed and packets which already were handled are reentered
to the driver TX path with xfrm_offload set.
The following kernel panic is observed in mlx5 in such case:
mlx5_core 0000:04:00.0 enp4s0f0np0: Link up
mlx5_core 0000:04:00.1 enp4s0f1np1: Link up
Initializing XFRM netlink socket
IPsec XFRM device driver
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0
Oops: Oops: 0010 [#1] PREEMPT SMP
CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.13.0-rc1-alex #3
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffb87380003800 EFLAGS: 00010206
RAX: ffff8df004e02600 RBX: ffffb873800038d8 RCX: 00000000ffff98cf
RDX: ffff8df00733e108 RSI: ffff8df00521fb80 RDI: ffff8df001661f00
RBP: ffffb87380003850 R08: ffff8df013980000 R09: 0000000000000010
R10: 0000000000000002 R11: 0000000000000002 R12: ffff8df001661f00
R13: ffff8df00521fb80 R14: ffff8df00733e108 R15: ffff8df011faf04e
FS: 0000000000000000(0000) GS:ffff8df46b800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 0000000106384000 CR4: 0000000000350ef0
Call Trace:
<IRQ>
? show_regs+0x63/0x70
? __die_body+0x20/0x60
? __die+0x2b/0x40
? page_fault_oops+0x15c/0x550
? do_user_addr_fault+0x3ed/0x870
? exc_page_fault+0x7f/0x190
? asm_exc_page_fault+0x27/0x30
mlx5e_ipsec_handle_tx_skb+0xe7/0x2f0 [mlx5_core]
mlx5e_xmit+0x58e/0x1980 [mlx5_core]
? __fib_lookup+0x6a/0xb0
dev_hard_start_xmit+0x82/0x1d0
sch_direct_xmit+0xfe/0x390
__dev_queue_xmit+0x6d8/0xee0
? __fib_lookup+0x6a/0xb0
? internal_add_timer+0x48/0x70
? mod_timer+0xe2/0x2b0
neigh_resolve_output+0x115/0x1b0
__neigh_update+0x26a/0xc50
neigh_update+0x14/0x20
arp_process+0x2cb/0x8e0
? __napi_build_skb+0x5e/0x70
arp_rcv+0x11e/0x1c0
? dev_gro_receive+0x574/0x820
__netif_receive_skb_list_core+0x1cf/0x1f0
netif_receive_skb_list_internal+0x183/0x2a0
napi_complete_done+0x76/0x1c0
mlx5e_napi_poll+0x234/0x7a0 [mlx5_core]
__napi_poll+0x2d/0x1f0
net_rx_action+0x1a6/0x370
? atomic_notifier_call_chain+0x3b/0x50
? irq_int_handler+0x15/0x20 [mlx5_core]
handle_softirqs+0xb9/0x2f0
? handle_irq_event+0x44/0x60
irq_exit_rcu+0xdb/0x100
common_interrupt+0x98/0xc0
</IRQ>
<TASK>
asm_common_interrupt+0x27/0x40
RIP: 0010:pv_native_safe_halt+0xb/0x10
Code: 09 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 0f 22
0f 1f 84 00 00 00 00 00 90 eb 07 0f 00 2d 7f e9 36 00 fb
40 00 83 ff 07 77 21 89 ff ff 24 fd 88 3d a1 bd 0f 21 f8
RSP: 0018:ffffffffbe603de8 EFLAGS: 00000202
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000f92f46680
RDX: 0000000000000037 RSI: 00000000ffffffff RDI: 00000000000518d4
RBP: ffffffffbe603df0 R08: 000000cd42e4dffb R09: ffffffffbe603d70
R10: 0000004d80d62680 R11: 0000000000000001 R12: ffffffffbe60bf40
R13: 0000000000000000 R14: 0000000000000000 R15: ffffffffbe60aff8
? default_idle+0x9/0x20
arch_cpu_idle+0x9/0x10
default_idle_call+0x29/0xf0
do_idle+0x1f2/0x240
cpu_startup_entry+0x2c/0x30
rest_init+0xe7/0x100
start_kernel+0x76b/0xb90
x86_64_start_reservations+0x18/0x30
x86_64_start_kernel+0xc0/0x110
? setup_ghcb+0xe/0x130
common_startup_64+0x13e/0x141
</TASK>
Modules linked in: esp4_offload esp4 xfrm_interface
xfrm6_tunnel tunnel4 tunnel6 xfrm_user xfrm_algo binf
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- 5958372ddf628fe6f4c3e49425734ad32fcfb13c (Status: affected)
- 5958372ddf628fe6f4c3e49425734ad32fcfb13c (Status: affected)
- 5958372ddf628fe6f4c3e49425734ad32fcfb13c (Status: affected)
- 5958372ddf628fe6f4c3e49425734ad32fcfb13c (Status: affected)
**Linux - Linux**
Affected versions:
- 6.2 (Status: affected)
- 0 (Status: unaffected)
- 6.6.76 (Status: unaffected)
- 6.12.13 (Status: unaffected)
- 6.13.2 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c6e1b2cac24b2a4d1dd472071021bf00c26450eb)
2. [](https://git.kernel.org/stable/c/6945701ca1572f81bc9bb46f624b02eabb3eaf3e)
3. [](https://git.kernel.org/stable/c/981ad4c882096e7375b8c2181dd4c3ee58ea5bae)
4. [](https://git.kernel.org/stable/c/600258d555f0710b9c47fb78d2d80a4aecd608cc)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-27094, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-27094 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27094
- **State**: PUBLISHED
- **Published Date**: May 20, 2022 at 12:48 UTC
- **Last Updated**: August 03, 2024 at 05:18 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sony PlayMemories Home v6.0 contains an unquoted service path which allows attackers to escalate privileges to the system level.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/50817)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-3347, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-3347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3347
- **State**: PUBLISHED
- **Published Date**: April 21, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 05:47 UTC
- **Reserved Date**: April 21, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the Cloudwords for Multilingual Drupal module before 7.x-2.3 for Drupal allows remote attackers to hijack the authentication of unspecified victims via an unknown menu callback.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2402643)
2. [71926](http://www.securityfocus.com/bid/71926)
3. [](https://www.drupal.org/node/2403447)
4. [[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015](http://www.openwall.com/lists/oss-security/2015/01/29/6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-9187, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-9187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9187
- **State**: PUBLISHED
- **Published Date**: May 23, 2017 at 03:56 UTC
- **Last Updated**: August 05, 2024 at 16:55 UTC
- **Reserved Date**: May 22, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libautotrace.a in AutoTrace 0.31.1 has a "cannot be represented in type int" issue in input-bmp.c:486:7.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-0338, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-0338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0338
- **State**: PUBLISHED
- **Published Date**: January 17, 2023 at 00:00 UTC
- **Last Updated**: April 04, 2025 at 18:38 UTC
- **Reserved Date**: January 17, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Reflected in GitHub repository lirantal/daloradius prior to master-branch.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**lirantal - lirantal/daloradius**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/fcae1b67-db37-4d24-9137-8dda95573e77)
2. [](https://github.com/lirantal/daloradius/commit/e77a769c7503e63a2e3c05262cb5f8f81a4a7bbe)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-39021, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-39021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39021
- **State**: PUBLISHED
- **Published Date**: July 28, 2023 at 00:00 UTC
- **Last Updated**: October 22, 2024 at 19:42 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
wix-embedded-mysql v4.6.1 and below was discovered to contain a code injection vulnerability in the component com.wix.mysql.distribution.Setup.apply. This vulnerability is exploited via passing an unchecked argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/LetianYuan/My-CVE-Public-References/tree/main/com_wix_wix-embedded-mysql)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-32036, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-32036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32036
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 22:33 UTC
- **Last Updated**: November 19, 2024 at 19:12 UTC
- **Reserved Date**: May 05, 2021 at 00:00 UTC
- **Assigned By**: mongodb
### Vulnerability Description
An authenticated user without any specific authorizations may be able to repeatedly invoke the features command where at a high volume may lead to resource depletion or generate high lock contention. This may result in denial of service and in rare cases could result in id field collisions. This issue affects MongoDB Server v5.0 versions prior to and including 5.0.3; MongoDB Server v4.4 versions prior to and including 4.4.9; MongoDB Server v4.2 versions prior to and including 4.2.16 and MongoDB Server v4.0 versions prior to and including 4.0.28
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**MongoDB Inc. - MongoDB Server**
Affected versions:
- 5.0 (Status: affected)
- 4.4 (Status: affected)
- 4.2 (Status: affected)
- 4.0 (Status: affected)
### References
1. [](https://jira.mongodb.org/browse/SERVER-59294)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-20899, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-20899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20899
- **State**: PUBLISHED
- **Published Date**: July 02, 2024 at 09:20 UTC
- **Last Updated**: August 01, 2024 at 22:06 UTC
- **Reserved Date**: December 05, 2023 at 04:57 UTC
- **Assigned By**: SamsungMobile
### Vulnerability Description
Use of implicit intent for sensitive communication in RCS function in IMS service prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR Jul-2024 Release in Android 12, 13, 14 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-4482, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-4482 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4482
- **State**: PUBLISHED
- **Published Date**: August 16, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 10, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
mar_read.c in the Updater in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows local users to gain privileges or cause a denial of service (out-of-bounds write) via a crafted name of a Mozilla Archive (aka MAR) file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:1454](http://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html)
2. [openSUSE-SU-2015:1389](http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html)
3. [openSUSE-SU-2015:1453](http://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html)
4. [76294](http://www.securityfocus.com/bid/76294)
5. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
6. [1033247](http://www.securitytracker.com/id/1033247)
7. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1184500)
8. [](http://www.mozilla.org/security/announce/2015/mfsa2015-85.html)
9. [GLSA-201605-06](https://security.gentoo.org/glsa/201605-06)
10. [1033372](http://www.securitytracker.com/id/1033372)
11. [openSUSE-SU-2015:1390](http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-20751, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-20751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20751
- **State**: PUBLISHED
- **Published Date**: May 03, 2022 at 03:15 UTC
- **Last Updated**: November 06, 2024 at 16:20 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Snort detection engine integration for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause unlimited memory consumption, which could lead to a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient memory management for certain Snort events. An attacker could exploit this vulnerability by sending a series of crafted IP packets that would generate specific Snort events on an affected device. A sustained attack could cause an out of memory condition on the affected device. A successful exploit could allow the attacker to interrupt all traffic flowing through the affected device. In some circumstances, the attacker may be able to cause the device to reload, resulting in a DoS condition.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**Cisco - Cisco Firepower Threat Defense Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20220427 Cisco Firepower Threat Defense Software Snort Out of Memory Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snort-dos-hd2hFgM)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-3179, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-3179 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3179
- **State**: PUBLISHED
- **Published Date**: December 08, 2011 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 19:24 UTC
- **Reserved Date**: August 19, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The server process in Novell Messenger 2.1 and 2.2.x before 2.2.1, and Novell GroupWise Messenger 2.04 and earlier, allows remote attackers to read from arbitrary memory locations via a crafted command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.novell.com/support/viewContent.do?externalId=7009634)
2. [](https://bugzilla.novell.com/show_bug.cgi?id=712158)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2000-0865, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2000-0865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0865
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:37 UTC
- **Reserved Date**: October 18, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in dvtermtype in Tridia Double Vision 3.07.00 allows local users to gain root privileges via a long terminal type argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1697](http://www.securityfocus.com/bid/1697)
2. [doublevision-dvtermtype-bo(5261)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5261)
3. [20000916 Advisory: Tridia DoubleVision / SCO UnixWare](http://archives.neohapsis.com/archives/bugtraq/2000-09/0185.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-10800, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-10800 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10800
- **State**: PUBLISHED
- **Published Date**: July 03, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 17:50 UTC
- **Reserved Date**: July 02, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
When GraphicsMagick 1.3.25 processes a MATLAB image in coders/mat.c, it can lead to a denial of service (OOM) in ReadMATImage() if the size specified for a MAT Object is larger than the actual amount of data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-4321](https://www.debian.org/security/2018/dsa-4321)
2. [](http://hg.code.sf.net/p/graphicsmagick/code/rev/e5761e3a2012)
3. [99356](http://www.securityfocus.com/bid/99356)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-21843, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-21843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21843
- **State**: PUBLISHED
- **Published Date**: January 11, 2022 at 20:22 UTC
- **Last Updated**: January 02, 2025 at 18:22 UTC
- **Reserved Date**: December 14, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21843)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-8563, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-8563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8563
- **State**: PUBLISHED
- **Published Date**: September 07, 2024 at 20:00 UTC
- **Last Updated**: September 09, 2024 at 13:35 UTC
- **Reserved Date**: September 06, 2024 at 21:36 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester PHP CRUD 1.0. It has been classified as problematic. This affects an unknown part of the file /endpoint/update.php. The manipulation of the argument first_name/middle_name/last_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - PHP CRUD**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-276783 | SourceCodester PHP CRUD update.php cross site scripting](https://vuldb.com/?id.276783)
2. [VDB-276783 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.276783)
3. [Submit #403661 | SourceCodester PHP CRUD using PDO Connection with Free Source Code 1.0 Cross Site Scripting](https://vuldb.com/?submit.403661)
4. [](https://www.sourcecodester.com/)
### Credits
- Delvy (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-8012, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-8012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8012
- **State**: PUBLISHED
- **Published Date**: May 21, 2018 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 00:01 UTC
- **Reserved Date**: March 09, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
No authentication/authorization is enforced when a server attempts to join a quorum in Apache ZooKeeper before 3.4.10, and 3.5.0-alpha through 3.5.3-beta. As a result an arbitrary end point could join the cluster and begin propagating counterfeit changes to the leader.
### Affected Products
**Apache Software Foundation - Apache ZooKeeper**
Affected versions:
- Apache ZooKeeper prior to 3.4.10, Apache ZooKeeper 3.5.0-alpha through 3.5.3-beta (Status: affected)
### References
1. [DSA-4214](https://www.debian.org/security/2018/dsa-4214)
2. [1040948](http://www.securitytracker.com/id/1040948)
3. [104253](http://www.securityfocus.com/bid/104253)
4. [[activemq-issues] 20190820 [jira] [Created] (AMQ-7279) Security Vulnerabilities in Libraries - jackson-databind-2.9.8.jar, tomcat-servlet-api-8.0.53.jar, tomcat-websocket-api-8.0.53.jar, zookeeper-3.4.6.jar, guava-18.0.jar, jetty-all-9.2.26.v20180806.jar, scala-library-2.11.0.jar](https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E)
5. [[nifi-commits] 20191113 svn commit: r1869773 - /nifi/site/trunk/security.html](https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E)
6. [[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html](https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E)
7. [](https://www.oracle.com/security-alerts/cpujul2020.html)
8. [](https://lists.apache.org/thread.html/c75147028c1c79bdebd4f8fa5db2b77da85de2b05ecc0d54d708b393%40%3Cdev.zookeeper.apache.org%3E)
9. [[jackrabbit-dev] 20210716 [GitHub] [jackrabbit-oak] nit0906 opened a new pull request #326: OAK-9496 | Update zookeeper version to handle CVE-2018-8012](https://lists.apache.org/thread.html/r8f0d920805af93033c488af89104e2d682662bacfb8406db865d5e14%40%3Cdev.jackrabbit.apache.org%3E)
10. [[jackrabbit-dev] 20210716 [GitHub] [jackrabbit-oak] nit0906 commented on pull request #326: OAK-9496 | Update zookeeper version to handle CVE-2018-8012](https://lists.apache.org/thread.html/rc5bc4ddb0deabf8cfb69378cecee56fcdc76929bea9e6373cb863870%40%3Cdev.jackrabbit.apache.org%3E)
11. [[jackrabbit-oak-commits] 20210720 [jackrabbit-oak] branch trunk updated: OAK-9496 | Update zookeeper version to handle CVE-2018-8012 (#326)](https://lists.apache.org/thread.html/r73daf1fc5d85677d9a854707e1908d14e174b7bbb0c603709c0ab33f%40%3Coak-commits.jackrabbit.apache.org%3E)
12. [[jackrabbit-dev] 20210720 [GitHub] [jackrabbit-oak] nit0906 merged pull request #326: OAK-9496 | Update zookeeper version to handle CVE-2018-8012](https://lists.apache.org/thread.html/re3a4048e9515d4afea416df907a612ed384a16c57cf99e97ee4a12f2%40%3Cdev.jackrabbit.apache.org%3E)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-35758, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-35758 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35758
- **State**: PUBLISHED
- **Published Date**: May 03, 2021 at 20:48 UTC
- **Last Updated**: August 04, 2024 at 17:09 UTC
- **Reserved Date**: December 28, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a Authentication Bypass in the Web Interface. This interface does not properly restrict access to internal functionality. Despite presenting a password login page on first access, authentication is not required to access privileged functionality. As such, it's possible to directly access APIs that should not be exposed to an unauthenticated user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25002, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25002 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25002
- **State**: PUBLISHED
- **Published Date**: June 27, 2023 at 00:00 UTC
- **Last Updated**: December 05, 2024 at 14:39 UTC
- **Reserved Date**: February 01, 2023 at 00:00 UTC
- **Assigned By**: autodesk
### Vulnerability Description
A maliciously crafted SKP file in Autodesk products is used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.
### Affected Products
**n/a - Multiple**
Affected versions:
- 2023, 2022, 2021 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0002)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-4024, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-4024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4024
- **State**: PUBLISHED
- **Published Date**: October 28, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: October 21, 2010 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in HP Insight Control Power Management before 6.2 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBMA02603](http://marc.info/?l=bugtraq&m=128811282526943&w=2)
2. [1024642](http://www.securitytracker.com/id?1024642)
3. [SSRT100319](http://marc.info/?l=bugtraq&m=128811282526943&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-4429, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-4429 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4429
- **State**: PUBLISHED
- **Published Date**: December 21, 2005 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 23:46 UTC
- **Reserved Date**: December 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in CS-Cart 1.3.0 allows remote attackers to execute arbitrary SQL commands via the (1) sort_by and (2) sort_order parameters to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060105 Vendor ACK: 21370: CS-Cart index.php Multiple Variable SQL Injection (fwd)](http://attrition.org/pipermail/vim/2006-January/000450.html)
2. [16134](http://www.securityfocus.com/bid/16134)
3. [21370](http://www.osvdb.org/21370)
4. [](http://pridels0.blogspot.com/2005/11/cs-cart-sql-inj-vuln.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-1144, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-1144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1144
- **State**: PUBLISHED
- **Published Date**: March 03, 2011 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 22:14 UTC
- **Reserved Date**: March 02, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The installer in PEAR 1.9.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1072.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 <= - Symlink Attack](http://openwall.com/lists/oss-security/2011/02/28/5)
2. [[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 <= - Symlink Attack](http://openwall.com/lists/oss-security/2011/03/01/7)
3. [](http://pear.php.net/bugs/bug.php?id=18056)
4. [[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 <= - Symlink Attack](http://openwall.com/lists/oss-security/2011/03/01/8)
5. [pear-package-symlink(65911)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65911)
6. [[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 <= - Symlink Attack](http://openwall.com/lists/oss-security/2011/03/01/5)
7. [[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 <= - Symlink Attack](http://openwall.com/lists/oss-security/2011/03/01/4)
8. [[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 <= - Symlink Attack](http://openwall.com/lists/oss-security/2011/03/01/9)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-1549, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-1549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1549
- **State**: PUBLISHED
- **Published Date**: February 20, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:53 UTC
- **Reserved Date**: February 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The conference menu in ActivePost Standard 3.1 sends passwords of password-protected rooms in cleartext, which could allow remote attackers to gain sensitive information by sniffing the network connection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040923 Multiple vulnerabilities in ActivePost Standard 3.1](http://marc.info/?l=bugtraq&m=109597139011373&w=2)
2. [12642](http://secunia.com/advisories/12642/)
3. [](http://aluigi.altervista.org/adv/actp-adv.txt)
4. [11244](http://www.securityfocus.com/bid/11244)
5. [activepost-plaintext-password(17486)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17486)
6. [1011406](http://securitytracker.com/id?1011406)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-41242, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-41242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41242
- **State**: PUBLISHED
- **Published Date**: September 21, 2022 at 15:46 UTC
- **Last Updated**: May 28, 2025 at 14:34 UTC
- **Reserved Date**: September 21, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A missing permission check in Jenkins extreme-feedback Plugin 1.7 and earlier allows attackers with Overall/Read permission to discover information about job names attached to lamps, discover MAC and IP addresses of existing lamps, and rename lamps.
### Affected Products
**Jenkins project - Jenkins extreme-feedback Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.7 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2001)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-21942, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-21942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21942
- **State**: PUBLISHED
- **Published Date**: April 18, 2023 at 19:54 UTC
- **Last Updated**: September 16, 2024 at 15:17 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in Oracle Essbase (component: Security and Provisioning). The supported version that is affected is 21.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Essbase. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - Hyperion Essbase**
Affected versions:
- 21.4 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2023.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-40332, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-40332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40332
- **State**: PUBLISHED
- **Published Date**: July 10, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:33 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/moneyRecord_deal.php?mudi=delRecord
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Tank992/cms/blob/main/65/csrf.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-35659, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-35659 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35659
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 10:51 UTC
- **Last Updated**: September 25, 2024 at 14:53 UTC
- **Reserved Date**: June 28, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS Base Score depend on the software that uses Outside In Technology. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology, but if data is not received over a network the CVSS score may be lower. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - Outside In Technology**
Affected versions:
- 8.5.5 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-13685, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-13685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13685
- **State**: PUBLISHED
- **Published Date**: August 29, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 19:05 UTC
- **Reserved Date**: August 24, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The dump_callback function in SQLite 3.20.0 allows remote attackers to cause a denial of service (EXC_BAD_ACCESS and application crash) via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html)
2. [100521](http://www.securityfocus.com/bid/100521)
3. [USN-4019-1](https://usn.ubuntu.com/4019-1/)
4. [USN-4019-2](https://usn.ubuntu.com/4019-2/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-2437, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-2437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2437
- **State**: PUBLISHED
- **Published Date**: July 18, 2022 at 16:13 UTC
- **Last Updated**: May 05, 2025 at 16:19 UTC
- **Reserved Date**: July 15, 2022 at 00:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Feed Them Social – for Twitter feed, Youtube and more plugin for WordPress is vulnerable to deserialization of untrusted input via the 'fts_url' parameter in versions up to, and including 2.9.8.5. This makes it possible for unauthenticated attackers to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**slickremix - Feed Them Social – Page, Post, Video, and Photo Galleries**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/50bcea94-b12a-4b31-b0c1-bba834ea9bd0?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2754749%40feed-them-social&new=2754749%40feed-them-social&sfp_email=&sfph_mail=)
3. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2437)
### Credits
- Rasoul Jahanshahi
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-6515, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-6515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6515
- **State**: PUBLISHED
- **Published Date**: August 18, 2015 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 17:38 UTC
- **Reserved Date**: August 18, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Splunk Web in Splunk Enterprise 6.2.x before 6.2.4, 6.1.x before 6.1.8, 6.0.x before 6.0.9, and 5.0.x before 5.0.13 and Splunk Light 6.2.x before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via a header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.splunk.com/view/SP-CAAAN7C)
2. [1032859](http://www.securitytracker.com/id/1032859)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-24172, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-24172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24172
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 22:22 UTC
- **Last Updated**: April 02, 2025 at 13:50 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. "Block All Remote Content" may not apply for all mail previews.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122373)
2. [](https://support.apple.com/en-us/122374)
3. [](https://support.apple.com/en-us/122375)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-3475, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-3475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3475
- **State**: PUBLISHED
- **Published Date**: October 31, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 10:43 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Users panel (admin/users/) in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-8578.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [68456](http://www.securityfocus.com/bid/68456)
2. [](https://bugs.launchpad.net/horizon/+bug/1320235)
3. [[oss-security] 20140708 [OSSA 2014-023] Multiple XSS vulnerabilities in Horizon (CVE-2014-3473, CVE-2014-3474, and CVE-2014-3475)](http://www.openwall.com/lists/oss-security/2014/07/08/6)
4. [openSUSE-SU-2015:0078](http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-0964, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-0964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0964
- **State**: PUBLISHED
- **Published Date**: March 16, 2010 at 18:26 UTC
- **Last Updated**: August 07, 2024 at 01:06 UTC
- **Reserved Date**: March 16, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in start.php in Eros Webkatalog allows remote attackers to execute arbitrary SQL commands via the id parameter in a rubrik action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38900](http://secunia.com/advisories/38900)
2. [11689](http://www.exploit-db.com/exploits/11689)
3. [](http://packetstormsecurity.org/1003-exploits/eroserotikwebkat-sql.txt)
4. [62902](http://osvdb.org/62902)
5. [](http://4004securityproject.wordpress.com/2010/03/11/eros-erotik-webkatalog-start-php-rubrikidsql-injection/)
6. [eroswebkatalog-start-sql-injection(56851)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56851)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10901, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10901 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10901
- **State**: PUBLISHED
- **Published Date**: August 21, 2019 at 12:42 UTC
- **Last Updated**: August 06, 2024 at 03:38 UTC
- **Reserved Date**: August 16, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The wp-customer-reviews plugin before 3.0.9 for WordPress has XSS in the admin tools.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/wp-customer-reviews/#developers)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-4528, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-4528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4528
- **State**: PUBLISHED
- **Published Date**: July 16, 2015 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 11, 2015 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in EMC Documentum CenterStage 1.2SP1 and 1.2SP2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [75929](http://www.securityfocus.com/bid/75929)
2. [1032966](http://www.securitytracker.com/id/1032966)
3. [20150716 ESA-2015-122: EMC Documentum CenterStage Cross-site Scripting Vulnerability](http://seclists.org/bugtraq/2015/Jul/80)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-28968, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-28968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28968
- **State**: PUBLISHED
- **Published Date**: March 22, 2021 at 15:10 UTC
- **Last Updated**: August 03, 2024 at 21:55 UTC
- **Reserved Date**: March 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in PunBB before 1.4.6. An XSS vulnerability in the [email] BBcode tag allows (with authentication) injecting arbitrary JavaScript into any forum message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://punbb.informer.com/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-1045, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-1045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1045
- **State**: PUBLISHED
- **Published Date**: February 02, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:44 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in basilix.php3 in Basilix Webmail 1.0.3beta and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the request_id[DUMMY] parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2995](http://www.securityfocus.com/bid/2995)
2. [20010706 basilix bug](http://archives.neohapsis.com/archives/bugtraq/2001-07/0114.html)
3. [basilix-webmail-view-files(6873)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6873)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-1448, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-1448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1448
- **State**: REJECTED
- **Published Date**: January 15, 2014 at 02:00 UTC
- **Last Updated**: January 15, 2014 at 02:57 UTC
- **Reserved Date**: January 14, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-14140, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-14140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14140
- **State**: PUBLISHED
- **Published Date**: September 05, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 19:20 UTC
- **Reserved Date**: September 05, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.9)
2. [USN-3583-2](https://usn.ubuntu.com/3583-2/)
3. [RHSA-2018:1062](https://access.redhat.com/errata/RHSA-2018:1062)
4. [](https://source.android.com/security/bulletin/pixel/2018-01-01)
5. [DSA-3981](http://www.debian.org/security/2017/dsa-3981)
6. [USN-3583-1](https://usn.ubuntu.com/3583-1/)
7. [RHSA-2018:0676](https://access.redhat.com/errata/RHSA-2018:0676)
8. [](https://github.com/torvalds/linux/commit/197e7e521384a23b9e585178f3f11c9fa08274b9)
9. [100876](http://www.securityfocus.com/bid/100876)
10. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=197e7e521384a23b9e585178f3f11c9fa08274b9)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-2959, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-2959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2959
- **State**: PUBLISHED
- **Published Date**: September 08, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 02:55 UTC
- **Reserved Date**: August 04, 2010 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
Integer overflow in net/can/bcm.c in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows attackers to execute arbitrary code or cause a denial of service (system crash) via crafted CAN traffic.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SA:2010:041](http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html)
2. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.6)
3. [42585](http://www.securityfocus.com/bid/42585)
4. [FEDORA-2010-13903](http://lists.fedoraproject.org/pipermail/package-announce/2010-September/046947.html)
5. [MDVSA-2010:198](http://www.mandriva.com/security/advisories?name=MDVSA-2010:198)
6. [SUSE-SA:2010:040](http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html)
7. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.53)
8. [ADV-2010-2430](http://www.vupen.com/english/advisories/2010/2430)
9. [SUSE-SA:2011:007](http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html)
10. [ADV-2011-0298](http://www.vupen.com/english/advisories/2011/0298)
11. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5b75c4973ce779520b9d1e392483207d6f842cde)
12. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.4)
13. [DSA-2094](http://www.debian.org/security/2010/dsa-2094)
14. [[oss-security] 20100820 kernel: can: add limit for nframes and clean up signed/unsigned variables](http://www.openwall.com/lists/oss-security/2010/08/20/2)
15. [](https://bugzilla.redhat.com/show_bug.cgi?id=625699)
16. [](http://jon.oberheide.org/files/i-can-haz-modharden.c)
17. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21)
18. [41512](http://secunia.com/advisories/41512)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-11297, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-11297 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11297
- **State**: PUBLISHED
- **Published Date**: December 20, 2024 at 06:59 UTC
- **Last Updated**: December 20, 2024 at 15:57 UTC
- **Reserved Date**: November 16, 2024 at 00:54 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Page Restriction WordPress (WP) – Protect WP Pages/Post plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.3.6 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**cyberlord92 - Page Restriction WordPress (WP) – Protect WP Pages/Post**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/6d12ab8c-d5d0-4e02-986e-e894fae073e5?source=cve)
2. [](https://wordpress.org/plugins/page-and-post-restriction/)
### Credits
- Francesco Carlucci
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-41343, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-41343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41343
- **State**: PUBLISHED
- **Published Date**: November 03, 2023 at 04:11 UTC
- **Last Updated**: September 05, 2024 at 13:59 UTC
- **Reserved Date**: August 29, 2023 at 00:11 UTC
- **Assigned By**: twcert
### Vulnerability Description
Rogic No-Code Database Builder's file uploading function has insufficient filtering for special characters. A remote attacker with regular user privilege can inject JavaScript to perform XSS (Stored Cross-Site Scripting) attack.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Ragic - No-Code Database Builder **
Affected versions:
- All version before patching (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-7509-5b734-1.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-20933, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-20933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20933
- **State**: PUBLISHED
- **Published Date**: February 17, 2024 at 01:50 UTC
- **Last Updated**: March 26, 2025 at 16:09 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: Engineering Change Order). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Installed Base, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Installed Base accessible data as well as unauthorized read access to a subset of Oracle Installed Base accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Oracle Corporation - Installed Base**
Affected versions:
- 12.2.3 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2024.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-37664, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-37664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37664
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 20:25 UTC
- **Last Updated**: August 04, 2024 at 01:23 UTC
- **Reserved Date**: July 29, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `BoostedTreesSparseCalculateBestFeatureSplit`. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/stats_ops.cc) needs to validate that each value in `stats_summary_indices` is in range. We have patched the issue in GitHub commit e84c975313e8e8e38bb2ea118196369c45c51378. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- >= 2.5.0, < 2.5.1 (Status: affected)
- >= 2.4.0, < 2.4.3 (Status: affected)
- < 2.3.4 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4c4-5fpq-56wg)
2. [](https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-0292, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-0292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0292
- **State**: PUBLISHED
- **Published Date**: June 09, 2023 at 05:33 UTC
- **Last Updated**: December 20, 2024 at 23:35 UTC
- **Reserved Date**: January 13, 2023 at 16:56 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Quiz And Survey Master plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 8.0.8. This is due to missing nonce validation on the function associated with the qsm_remove_file_fd_question AJAX action. This makes it possible for unauthenticated attackers to delete arbitrary media files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Affected Products
**expresstech - Quiz And Survey Master – Best Quiz, Exam and Survey Plugin for WordPress**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c75e6d27-7f6b-4bec-b653-c2024504f427?source=cve)
2. [](https://wordpress.org/plugins/quiz-master-next/)
3. [](https://packetstormsecurity.com/files/171011/wpqsm808-xsrf.txt)
4. [](https://plugins.trac.wordpress.org/changeset/2834471/quiz-master-next)
### Credits
- Julien Ahrens
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-9832, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-9832 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9832
- **State**: PUBLISHED
- **Published Date**: March 15, 2019 at 17:00 UTC
- **Last Updated**: August 04, 2024 at 22:01 UTC
- **Reserved Date**: March 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The AirDrop application through 2.0 for Android allows remote attackers to cause a denial of service via a client that makes many socket connections through a configured port.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [46445](https://www.exploit-db.com/exploits/46445)
2. [](https://www.youtube.com/watch?v=qwjuY7znZjs)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-27195, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-27195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27195
- **State**: PUBLISHED
- **Published Date**: November 08, 2024 at 00:00 UTC
- **Last Updated**: November 08, 2024 at 15:10 UTC
- **Reserved Date**: February 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Trimble TM4Web 22.2.0 allows unauthenticated attackers to access /inc/tm_ajax.msw?func=UserfromUUID&uuid= to retrieve the last registration access code and use this access code to register a valid account. via a PUT /inc/tm_ajax.msw request. If the access code was used to create an Administrator account, attackers are also able to register new Administrator accounts with full privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://transportation.trimble.com/products/TM4Web)
2. [](https://seclists.org/fulldisclosure/2024/Apr/16)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-3246, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-3246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3246
- **State**: PUBLISHED
- **Published Date**: October 27, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:01 UTC
- **Reserved Date**: October 17, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Ethereal 0.10.12 and earlier allows remote attackers to cause a denial of service (null dereference) via unknown vectors in the (1) SCSI, (2) sFlow, or (3) RTnet dissectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2005:809](http://www.redhat.com/support/errata/RHSA-2005-809.html)
2. [17327](http://secunia.com/advisories/17327)
3. [GLSA-200510-25](http://www.gentoo.org/security/en/glsa/glsa-200510-25.xml)
4. [17392](http://secunia.com/advisories/17392)
5. [17480](http://secunia.com/advisories/17480)
6. [1015082](http://securitytracker.com/id?1015082)
7. [](http://www.ethereal.com/appnotes/enpa-sa-00021.html)
8. [SUSE-SR:2005:025](http://www.novell.com/linux/security/advisories/2005_25_sr.html)
9. [17286](http://secunia.com/advisories/17286)
10. [20128](http://www.osvdb.org/20128)
11. [DSA-1171](http://www.debian.org/security/2006/dsa-1171)
12. [21813](http://secunia.com/advisories/21813)
13. [FLSA-2006:152922](http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html)
14. [17377](http://secunia.com/advisories/17377)
15. [15148](http://www.securityfocus.com/bid/15148)
16. [20131](http://www.osvdb.org/20131)
17. [oval:org.mitre.oval:def:10303](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10303)
18. [20130](http://www.osvdb.org/20130)
19. [17254](http://secunia.com/advisories/17254)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-8720, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-8720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8720
- **State**: PUBLISHED
- **Published Date**: March 06, 2023 at 00:00 UTC
- **Last Updated**: January 28, 2025 at 21:28 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory corruption issues.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**n/a - webkitgtk**
Affected versions:
- Fixed in webkitgtk 2.26.0 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1876611)
2. [](https://webkitgtk.org/security/WSA-2019-0005.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-36976, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-36976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36976
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 06:49 UTC
- **Last Updated**: August 04, 2024 at 01:09 UTC
- **Reserved Date**: July 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block and process_block).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml)
2. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375)
3. [FEDORA-2022-9bb794c5f5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/)
4. [](https://support.apple.com/kb/HT213183)
5. [](https://support.apple.com/kb/HT213182)
6. [](https://support.apple.com/kb/HT213193)
7. [20220314 APPLE-SA-2022-03-14-2 watchOS 8.5](http://seclists.org/fulldisclosure/2022/Mar/28)
8. [20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3](http://seclists.org/fulldisclosure/2022/Mar/29)
9. [20220314 APPLE-SA-2022-03-14-1 iOS 15.4 and iPadOS 15.4](http://seclists.org/fulldisclosure/2022/Mar/27)
10. [GLSA-202208-26](https://security.gentoo.org/glsa/202208-26)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-12997, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-12997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12997
- **State**: PUBLISHED
- **Published Date**: September 14, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 18:51 UTC
- **Reserved Date**: August 21, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The LLDP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-lldp.c:lldp_private_8021_print().
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201709-23](https://security.gentoo.org/glsa/201709-23)
2. [](https://support.apple.com/HT208221)
3. [DSA-3971](http://www.debian.org/security/2017/dsa-3971)
4. [](https://github.com/the-tcpdump-group/tcpdump/commit/34cec721d39c76be1e0a600829a7b17bdfb832b6)
5. [100914](http://www.securityfocus.com/bid/100914)
6. [1039307](http://www.securitytracker.com/id/1039307)
7. [](http://www.tcpdump.org/tcpdump-changes.txt)
8. [RHEA-2018:0705](https://access.redhat.com/errata/RHEA-2018:0705)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-4583, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-4583 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4583
- **State**: PUBLISHED
- **Published Date**: December 29, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:53 UTC
- **Reserved Date**: December 29, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Management Interface in VMware ESX Server 2.x up to 2.5.x before 24 December 2005 allows "remote code execution in the Web browser" via unspecified attack vectors, probably related to cross-site scripting (XSS).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2001)
2. [16086](http://www.securityfocus.com/bid/16086)
3. [1015422](http://securitytracker.com/id?1015422)
4. [18250](http://secunia.com/advisories/18250)
5. [ADV-2005-3084](http://www.vupen.com/english/advisories/2005/3084)
6. [22119](http://www.osvdb.org/22119)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-19267, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-19267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-19267
- **State**: PUBLISHED
- **Published Date**: September 09, 2021 at 17:44 UTC
- **Last Updated**: August 04, 2024 at 14:08 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in index.php/Dswjcms/Basis/resources of Dswjcms 1.6.4 allows attackers to execute arbitrary code via uploading a crafted PHP file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/tifaweb/Dswjcms/issues/7)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-20650, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-20650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20650
- **State**: PUBLISHED
- **Published Date**: March 07, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 18:38 UTC
- **Reserved Date**: October 28, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In apu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629577; Issue ID: ALPS07629577.
### Affected Products
**MediaTek, Inc. - MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983**
Affected versions:
- Android 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/March-2023)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-4716, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-4716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4716
- **State**: PUBLISHED
- **Published Date**: December 08, 2011 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 00:16 UTC
- **Reserved Date**: December 08, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in file in DreamBox DM800 1.6rc3, 1.5rc1, and earlier allows remote attackers to read arbitrary files via the file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18079](http://www.exploit-db.com/exploits/18079)
2. [50520](http://www.securityfocus.com/bid/50520)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-39120, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-39120 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39120
- **State**: PUBLISHED
- **Published Date**: October 14, 2022 at 00:00 UTC
- **Last Updated**: May 15, 2025 at 14:20 UTC
- **Reserved Date**: September 01, 2022 at 00:00 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1575654905820020738)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-1676, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-1676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1676
- **State**: PUBLISHED
- **Published Date**: December 22, 2010 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 01:35 UTC
- **Reserved Date**: April 30, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://blog.torproject.org/blog/tor-02128-released-security-patches)
2. [42667](http://secunia.com/advisories/42667)
3. [](http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches)
4. [1024910](http://securitytracker.com/id?1024910)
5. [](https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog)
6. [ADV-2011-0114](http://www.vupen.com/english/advisories/2011/0114)
7. [[or-announce] 20101220 Tor 0.2.1.28 is released (security patches)](http://archives.seul.org/or/announce/Dec-2010/msg00000.html)
8. [ADV-2010-3290](http://www.vupen.com/english/advisories/2010/3290)
9. [GLSA-201101-02](http://security.gentoo.org/glsa/glsa-201101-02.xml)
10. [45500](http://www.securityfocus.com/bid/45500)
11. [42916](http://secunia.com/advisories/42916)
12. [42783](http://secunia.com/advisories/42783)
13. [42536](http://secunia.com/advisories/42536)
14. [FEDORA-2010-19159](http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html)
15. [DSA-2136](http://www.debian.org/security/2010/dsa-2136)
16. [FEDORA-2010-19147](http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-3213, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-3213 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3213
- **State**: PUBLISHED
- **Published Date**: June 24, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: June 23, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in WeBBoA Hosting 1.1 allows remote attackers to execute arbitrary SQL commands via the id parameter to an unspecified script, possibly host/yeni_host.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [webboa-yenihost-sql-injection(27389)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27389)
2. [1016341](http://securitytracker.com/id?1016341)
3. [20060618 WeBBoA Hosting Script SQL Injection](http://www.securityfocus.com/archive/1/437635/100/0/threaded)
4. [1140](http://securityreason.com/securityalert/1140)
5. [18564](http://www.securityfocus.com/bid/18564)
6. [ADV-2006-2448](http://www.vupen.com/english/advisories/2006/2448)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-6373, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-6373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6373
- **State**: PUBLISHED
- **Published Date**: December 15, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in GestDown 1.00 Beta allow remote attackers to execute arbitrary SQL commands via the (1) categorie parameter to catdownload.php, or the id parameter to (2) download.php or (3) hitcounter.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [gestdown-multiple-scripts-sql-injection(38945)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38945)
2. [20071209 SQL injection - GestDownV1.00Beta](http://marc.info/?l=bugtraq&m=119730791316604&w=2)
3. [26799](http://www.securityfocus.com/bid/26799)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-28260, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-28260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28260
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 19:13 UTC
- **Last Updated**: January 23, 2025 at 01:05 UTC
- **Reserved Date**: March 13, 2023 at 22:18 UTC
- **Assigned By**: microsoft
### Vulnerability Description
.NET DLL Hijacking Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - .NET 6.0**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - .NET 7.0**
Affected versions:
- 7.0.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.5**
Affected versions:
- 17.5.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.4**
Affected versions:
- 17.4.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.2**
Affected versions:
- 17.2.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.0**
Affected versions:
- 17.0.0 (Status: affected)
**Microsoft - PowerShell 7.3**
Affected versions:
- 7.3.0 (Status: affected)
**Microsoft - PowerShell 7.2**
Affected versions:
- 7.2.0 (Status: affected)
### References
1. [.NET DLL Hijacking Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28260)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.