System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4474 - **State**: PUBLISHED - **Published Date**: February 17, 2011 at 18:31 UTC - **Last Updated**: August 07, 2024 at 03:43 UTC - **Reserved Date**: December 06, 2010 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Java DB component in Oracle Java SE and Java for Business 6 Update 23, and, and earlier allows local users to affect confidentiality via unknown vectors related to Security, a similar vulnerability to CVE-2009-4269. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [HPSBMU02799](http://marc.info/?l=bugtraq&m=134254866602253&w=2) 2. [46407](http://www.securityfocus.com/bid/46407) 3. [](http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html) 4. [oracle-java-javadb-info-disc(65412)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65412) 5. [oval:org.mitre.oval:def:14534](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14534) 6. [SSRT100867](http://marc.info/?l=bugtraq&m=134254957702612&w=2) 7. [HPSBMU02797](http://marc.info/?l=bugtraq&m=134254957702612&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1119, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1119 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1119 - **State**: PUBLISHED - **Published Date**: December 01, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:39 UTC - **Reserved Date**: November 30, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in IN_CDDA.dll in Winamp 5.05, and possibly other versions including 5.06, allows remote attackers to execute arbitrary code via a certain .m3u playlist file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [winamp-incddadll-bo(18197)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18197) 2. [13269](http://secunia.com/advisories/13269/) 3. [20041123 Winamp - Buffer Overflow In IN_CDDA.dll](http://marc.info/?l=bugtraq&m=110123330404482&w=2) 4. [20041124 Winamp - Buffer Overflow In IN_CDDA.dll [Unpatched]](http://marc.info/?l=bugtraq&m=110146036300803&w=2) 5. [11730](http://www.securityfocus.com/bid/11730) 6. [20041124 Winamp - Buffer Overflow In IN_CDDA.dll [Unpatched]](http://marc.info/?l=ntbugtraq&m=110135574326217&w=2) 7. [VU#986504](http://www.kb.cert.org/vuls/id/986504) 8. [20041123 Winamp - Buffer Overflow In IN_CDDA.dll](http://marc.info/?l=ntbugtraq&m=110126352412395&w=2) 9. [20041126 Re: Winamp - Buffer Overflow In IN_CDDA.dll [Unpatched](http://archives.neohapsis.com/archives/bugtraq/2004-11/0369.html) 10. [](http://www.security-assessment.com/Papers/Winamp_IN_CDDA_Buffer_Overflow.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1514, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1514 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1514 - **State**: PUBLISHED - **Published Date**: July 01, 2011 at 10:00 UTC - **Last Updated**: September 16, 2024 at 18:07 UTC - **Reserved Date**: March 23, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request containing crafted parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [HPSBMU02686](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02872182) 2. [45100](http://secunia.com/advisories/45100) 3. [SSRT100541](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02872182) 4. [](http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16487, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16487 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16487 - **State**: REJECTED - **Published Date**: March 05, 2019 at 20:00 UTC - **Last Updated**: March 05, 2019 at 19:57 UTC - **Reserved Date**: November 01, 2017 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13750, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13750 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13750 - **State**: PUBLISHED - **Published Date**: March 01, 2025 at 04:21 UTC - **Last Updated**: March 03, 2025 at 20:57 UTC - **Reserved Date**: January 27, 2025 at 22:01 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Multilevel Referral Affiliate Plugin for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 2.27 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **prismitsystems - Multilevel Referral Affiliate Plugin for WooCommerce** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/4389ddc9-de69-4316-9bfa-ff3bd3346c69?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/multilevel-referral-plugin-for-woocommerce/tags/2.27/classes/referral-program.php#L310) ### Credits - Tamir Tsegaye
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0893, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0893 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0893 - **State**: PUBLISHED - **Published Date**: March 29, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:28 UTC - **Reserved Date**: March 29, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description modes.c in smail 3.2.0.120 implements signal handlers with certain unsafe library calls, which may allow attackers to execute arbitrary code via signal handler race conditions, possibly using xmalloc. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050325 smail remote and local root holes](http://marc.info/?l=bugtraq&m=111177045217717&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45130, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45130 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45130 - **State**: PUBLISHED - **Published Date**: October 10, 2024 at 09:57 UTC - **Last Updated**: October 10, 2024 at 14:01 UTC - **Reserved Date**: August 21, 2024 at 23:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and have a low impact on integrity. Exploitation of this issue does not require user interaction. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Adobe - Adobe Commerce** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/magento/apsb24-73.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21370, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21370 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21370 - **State**: PUBLISHED - **Published Date**: January 14, 2025 at 18:04 UTC - **Last Updated**: April 02, 2025 at 13:24 UTC - **Reserved Date**: December 11, 2024 at 00:29 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 24H2** Affected versions: - 10.0.26100.0 (Status: affected) ### References 1. [Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21370)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6677, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6677 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6677 - **State**: PUBLISHED - **Published Date**: September 23, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:24 UTC - **Reserved Date**: September 19, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Ticket Round Up (aka com.xcr.android.ticketroundupapp) application 3.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#143641](http://www.kb.cert.org/vuls/id/143641) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3717, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3717 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3717 - **State**: PUBLISHED - **Published Date**: July 03, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 05:56 UTC - **Reserved Date**: May 07, 2015 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [75491](http://www.securityfocus.com/bid/75491) 2. [](http://support.apple.com/kb/HT204941) 3. [APPLE-SA-2015-06-30-2](http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html) 4. [1032760](http://www.securitytracker.com/id/1032760) 5. [](http://support.apple.com/kb/HT204942) 6. [APPLE-SA-2015-06-30-1](http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-44141, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-44141 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-44141 - **State**: PUBLISHED - **Published Date**: October 30, 2023 at 03:42 UTC - **Last Updated**: September 06, 2024 at 20:49 UTC - **Reserved Date**: September 26, 2023 at 06:46 UTC - **Assigned By**: jpcert ### Vulnerability Description Inkdrop prior to v5.6.0 allows a local attacker to conduct a code injection attack by having a legitimate user open a specially crafted markdown file. ### Affected Products **Takuya Matsuyama - Inkdrop** Affected versions: - prior to v5.6.0 (Status: affected) ### References 1. [](https://www.inkdrop.app/) 2. [](https://forum.inkdrop.app/t/inkdrop-desktop-v5-6-0/4211) 3. [](https://jvn.jp/en/jp/JVN48057522/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0768 - **State**: PUBLISHED - **Published Date**: May 08, 2023 at 13:58 UTC - **Last Updated**: January 29, 2025 at 15:06 UTC - **Reserved Date**: February 09, 2023 at 19:39 UTC - **Assigned By**: WPScan ### Vulnerability Description The Avirato hotels online booking engine WordPress plugin through 5.0.5 does not validate and escape some of its shortcode attributes before using them in SQL statement/s, which could allow any authenticated users, such as subscriber to perform SQL Injection attacks. ### Weakness Classification (CWE) - CWE-89 SQL Injection: SQL Injection ### Affected Products **Unknown - Avirato hotels online booking engine** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/03d061b4-1b71-44f5-b3dc-f82a5fcd92eb) ### Credits - Lana Codes - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11342, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11342 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11342 - **State**: PUBLISHED - **Published Date**: July 16, 2017 at 04:00 UTC - **Last Updated**: September 17, 2024 at 00:02 UTC - **Reserved Date**: July 15, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description There is an illegal address access in ast.cpp of LibSass 3.4.5. A crafted input will lead to a remote denial of service attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1470722)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39471, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39471 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39471 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 02:10 UTC - **Last Updated**: August 02, 2024 at 18:10 UTC - **Reserved Date**: August 02, 2023 at 21:37 UTC - **Assigned By**: zdi ### Vulnerability Description TP-Link TL-WR841N ated_tp Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ated_tp service. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21825. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **TP-Link - TL-WR841N** Affected versions: - 4.19 (Status: affected) ### References 1. [ZDI-23-1624](https://www.zerodayinitiative.com/advisories/ZDI-23-1624/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20301, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20301 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20301 - **State**: PUBLISHED - **Published Date**: August 11, 2022 at 15:21 UTC - **Last Updated**: August 03, 2024 at 02:10 UTC - **Reserved Date**: October 14, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In Content, there is a possible way to check if an account exists on the device due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200956614 ### Affected Products **n/a - Android** Affected versions: - Android-13 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/android-13)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0295, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0295 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0295 - **State**: PUBLISHED - **Published Date**: September 29, 1999 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:34 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Solaris sysdef command allows local users to read kernel memory, potentially leading to root privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [00157](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/157)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5090 - **State**: PUBLISHED - **Published Date**: November 06, 2023 at 10:56 UTC - **Last Updated**: November 13, 2024 at 14:42 UTC - **Reserved Date**: September 20, 2023 at 15:29 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition. ### CVSS Metrics - **CVSS Base Score**: 6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-755: Security Weakness ### Affected Products **Red Hat - Red Hat Enterprise Linux 8** Affected versions: - 0:4.18.0-553.8.1.rt7.349.el8_10 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 8** Affected versions: - 0:4.18.0-553.8.1.el8_10 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9** Affected versions: - 0:5.14.0-427.16.1.el9_4 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9** Affected versions: - 0:5.14.0-427.16.1.el9_4 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support** Affected versions: - 0:5.14.0-284.69.1.el9_2 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support** Affected versions: - 0:5.14.0-284.69.1.rt14.354.el9_2 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 6** **Red Hat - Red Hat Enterprise Linux 7** **Red Hat - Red Hat Enterprise Linux 7** **Red Hat - Red Hat Enterprise Linux 9** ### References 1. [RHSA-2024:2758](https://access.redhat.com/errata/RHSA-2024:2758) 2. [RHSA-2024:3854](https://access.redhat.com/errata/RHSA-2024:3854) 3. [RHSA-2024:3855](https://access.redhat.com/errata/RHSA-2024:3855) 4. [RHSA-2024:4211](https://access.redhat.com/errata/RHSA-2024:4211) 5. [RHSA-2024:4352](https://access.redhat.com/errata/RHSA-2024:4352) 6. [](https://access.redhat.com/security/cve/CVE-2023-5090) 7. [RHBZ#2248122](https://bugzilla.redhat.com/show_bug.cgi?id=2248122) ### Credits - This issue was discovered by Maxim Levitsky (Red Hat).
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32466, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32466 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32466 - **State**: PUBLISHED - **Published Date**: September 29, 2021 at 10:21 UTC - **Last Updated**: August 03, 2024 at 23:17 UTC - **Reserved Date**: May 07, 2021 at 00:00 UTC - **Assigned By**: trendmicro ### Vulnerability Description An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **Trend Micro - Trend Micro HouseCall for Home Networks** Affected versions: - 5.3.1225 and below (Status: affected) ### References 1. [](https://helpcenter.trendmicro.com/en-us/article/tmka-10626) 2. [](https://helpcenter.trendmicro.com/ja-jp/article/TMKA-10621) 3. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1112/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21411, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21411 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21411 - **State**: PUBLISHED - **Published Date**: August 03, 2023 at 06:54 UTC - **Last Updated**: November 08, 2024 at 08:29 UTC - **Reserved Date**: November 04, 2022 at 18:30 UTC - **Assigned By**: Axis ### Vulnerability Description User provided input is not sanitized in the “Settings > Access Control” configuration interface allowing for arbitrary code execution. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Axis Communications AB - AXIS License Plate Verifier** Affected versions: - 2.8.3 or earlier (Status: affected) ### References 1. [](https://www.axis.com/dam/public/0b/1c/96/cve-2023-2140712-en-US-409778.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45999, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45999 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45999 - **State**: PUBLISHED - **Published Date**: October 01, 2024 at 00:00 UTC - **Last Updated**: October 01, 2024 at 19:56 UTC - **Reserved Date**: September 11, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A SQL Injection vulnerability was discovered in Cloudlog 2.6.15, specifically within the get_station_info()function located in the file /application/models/Oqrs_model.php. The vulnerability is exploitable via the station_id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://chiggerlor.substack.com/p/cve-2024-45999)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0437, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0437 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0437 - **State**: PUBLISHED - **Published Date**: March 24, 2010 at 10:00 UTC - **Last Updated**: August 07, 2024 at 00:52 UTC - **Reserved Date**: January 27, 2010 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The ip6_dst_lookup_tail function in net/ipv6/ip6_output.c in the Linux kernel before 2.6.27 does not properly handle certain circumstances involving an IPv6 TUN network interface and a large number of neighbors, which allows attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2010:0147](http://www.redhat.com/support/errata/RHSA-2010-0147.html) 2. [](http://bugzilla.kernel.org/show_bug.cgi?id=11469) 3. [oval:org.mitre.oval:def:10061](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10061) 4. [[oss-security] 20100211 CVE request - kernel: ip6_dst_lookup_tail() NULL pointer dereference](http://www.openwall.com/lists/oss-security/2010/02/11/1) 5. [43315](http://secunia.com/advisories/43315) 6. [](https://bugzilla.redhat.com/show_bug.cgi?id=563781) 7. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27) 8. [39033](http://secunia.com/advisories/39033) 9. [[oss-security] 20100304 Re: CVE request - kernel: ip6_dst_lookup_tail() NULL pointer dereference](http://www.openwall.com/lists/oss-security/2010/03/04/4) 10. [](http://www.vmware.com/security/advisories/VMSA-2011-0003.html) 11. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e550dfb0c2c31b6363aa463a035fc9f8dcaa3c9b) 12. [20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX](http://www.securityfocus.com/archive/1/516397/100/0/threaded) 13. [RHSA-2010:0161](http://www.redhat.com/support/errata/RHSA-2010-0161.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10452, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10452 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10452 - **State**: PUBLISHED - **Published Date**: April 18, 2018 at 14:00 UTC - **Last Updated**: September 16, 2024 at 18:17 UTC - **Reserved Date**: August 16, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 820A, and SD 835, memory protection assertion happens after invoking TA termination out of order. ### Affected Products **Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile** Affected versions: - SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 820A, SD 835 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-04-01) 2. [103671](http://www.securityfocus.com/bid/103671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6846, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6846 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6846 - **State**: PUBLISHED - **Published Date**: October 18, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 07:36 UTC - **Reserved Date**: September 10, 2015 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description EMC SourceOne Email Supervisor before 7.2 uses hardcoded encryption keys, which makes it easier for attackers to obtain access by examining how a program's code conducts cryptographic operations. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20151011 ESA-2015-153 EMC SourceOne Email Supervisor Security Update for Multiple Security Vulnerabilities](http://seclists.org/bugtraq/2015/Oct/58) 2. [](http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html) 3. [1033787](http://www.securitytracker.com/id/1033787)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45651 - **State**: PUBLISHED - **Published Date**: December 02, 2022 at 00:00 UTC - **Last Updated**: April 24, 2025 at 13:41 UTC - **Reserved Date**: November 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the list parameter in the formSetVirtualSer function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetVirtualSer/formSetVirtualSer.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2964, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2964 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2964 - **State**: PUBLISHED - **Published Date**: September 09, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 00:53 UTC - **Reserved Date**: August 23, 2022 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **n/a - kernel** Affected versions: - kernel 5.17 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2067482) 2. [](https://security.netapp.com/advisory/ntap-20230113-0001/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3926, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3926 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3926 - **State**: PUBLISHED - **Published Date**: March 13, 2017 at 16:00 UTC - **Last Updated**: August 06, 2024 at 10:57 UTC - **Reserved Date**: May 31, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in lg.cgi in Cougar LG 1.9 allows remote attackers to inject arbitrary web script or HTML via the "addr" parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/viewAlert.x?alertId=35685) 2. [](http://blog.talosintelligence.com/2014/09/looking-glasses-with-bacon.html) 3. [](https://gist.github.com/bittorrent3389/8fee7cdaa73d1d351ee9) 4. [](https://github.com/Cougar/lg/issues/3) 5. [](https://hackerone.com/reports/16330)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2007, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2007 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2007 - **State**: PUBLISHED - **Published Date**: June 20, 2005 at 04:00 UTC - **Last Updated**: September 16, 2024 at 16:13 UTC - **Reserved Date**: June 20, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in Edgewall Trac 0.8.3 and earlier allows remote attackers to read or write arbitrary files via a .. (dot dot) in the id parameter to the (1) upload or (2) attachment scripts. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.hardened-php.net/advisory-012005.php) 2. [20050619 Advisory 01/2005: Fileupload/download vulnerability in Trac](http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034618.html) 3. [15752](http://secunia.com/advisories/15752) 4. [](http://svn.edgewall.com/repos/trac/tags/trac-0.8.4/ChangeLog)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20460, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20460 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20460 - **State**: PUBLISHED - **Published Date**: October 16, 2024 at 16:16 UTC - **Last Updated**: October 31, 2024 at 14:10 UTC - **Reserved Date**: November 08, 2023 at 15:08 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information on an affected device. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **Cisco - Cisco Analog Telephone Adaptor (ATA) Software** Affected versions: - 12.0.1 SR2 (Status: affected) - 11.1.0 (Status: affected) - 12.0.1 SR1 (Status: affected) - 11.1.0 MSR1 (Status: affected) - 12.0.1 (Status: affected) - 11.1.0 MSR2 (Status: affected) - 11.1.0 MSR3 (Status: affected) - 11.1.0 MSR4 (Status: affected) - 12.0.1 SR3 (Status: affected) - 11.2.1 (Status: affected) - 12.0.1 SR4 (Status: affected) - 11.2.2 (Status: affected) - 11.2.2 MSR1 (Status: affected) - 12.0.1 SR5 (Status: affected) - 11.2.3 (Status: affected) - 11.2.4 (Status: affected) ### References 1. [cisco-sa-ata19x-multi-RDTEqRsy](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0959 - **State**: PUBLISHED - **Published Date**: March 16, 2022 at 14:03 UTC - **Last Updated**: August 02, 2024 at 23:47 UTC - **Reserved Date**: March 14, 2022 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A malicious, but authorised and authenticated user can construct an HTTP request using their existing CSRF token and session cookie to manually upload files to any location that the operating system user account under which pgAdmin is running has permission to write. ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **n/a - pgadmin** Affected versions: - pgadmin 6.7 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2063759)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9688, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9688 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9688 - **State**: REJECTED - **Last Updated**: February 11, 2025 at 01:05 UTC - **Reserved Date**: October 09, 2024 at 13:30 UTC - **Assigned By**: GitLab ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5839, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5839 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5839 - **State**: PUBLISHED - **Published Date**: October 29, 2023 at 00:00 UTC - **Last Updated**: September 06, 2024 at 19:32 UTC - **Reserved Date**: October 29, 2023 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Privilege Chaining in GitHub repository hestiacp/hestiacp prior to 1.8.9. ### Weakness Classification (CWE) - CWE-268: Security Weakness ### Affected Products **hestiacp - hestiacp/hestiacp** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/21125f12-64a0-42a3-b218-26b9945a5bc0) 2. [](https://github.com/hestiacp/hestiacp/commit/acb766e1db53de70534524b3fbc2270689112630)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1000138, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1000138 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1000138 - **State**: PUBLISHED - **Published Date**: October 10, 2016 at 20:00 UTC - **Last Updated**: August 06, 2024 at 03:55 UTC - **Reserved Date**: July 20, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Reflected XSS in wordpress plugin indexisto v1.0.5 ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [93816](http://www.securityfocus.com/bid/93816) 2. [](https://wordpress.org/plugins/indexisto) 3. [](http://www.vapidlabs.com/wp/wp_advisory.php?v=38)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2292 - **State**: PUBLISHED - **Published Date**: October 18, 2011 at 22:00 UTC - **Last Updated**: August 06, 2024 at 22:53 UTC - **Reserved Date**: June 02, 2011 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle Solaris 9 and 11 Express allows local users to affect confidentiality and integrity via unknown vectors related to xscreensaver. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [50268](http://www.securityfocus.com/bid/50268) 2. [76462](http://osvdb.org/76462) 3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25398, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25398 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25398 - **State**: PUBLISHED - **Published Date**: February 27, 2024 at 00:00 UTC - **Last Updated**: August 27, 2024 at 20:38 UTC - **Reserved Date**: February 07, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Srelay (the SOCKS proxy and Relay) v.0.4.8p3, a specially crafted network payload can trigger a denial of service condition and disrupt the service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/projects/socks-relay/) 2. [](https://github.com/Nivedita-22/SRELAY-exploit-writeup/blob/main/Srelay.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0204, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0204 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0204 - **State**: PUBLISHED - **Published Date**: March 09, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:14 UTC - **Reserved Date**: March 08, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Watchguard Firebox II allows remote attackers to cause a denial of service by establishing multiple connections and sending malformed PPTP packets. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2369](http://www.securityfocus.com/bid/2369) 2. [20010214 def-2001-07: Watchguard Firebox II PPTP DoS](http://www.securityfocus.com/archive/1/162965) 3. [firebox-pptp-dos(6109)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6109)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0609, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0609 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0609 - **State**: PUBLISHED - **Published Date**: August 17, 2014 at 18:00 UTC - **Last Updated**: August 06, 2024 at 09:20 UTC - **Reserved Date**: December 28, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Novell Open Enterprise Server (OES) 11 SP1 before Scheduled Maintenance Update 9415 and 11 SP2 before Scheduled Maintenance Update 9413 for Linux has unknown impact and attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [59982](http://secunia.com/advisories/59982) 2. [](http://www.novell.com/support/kb/doc.php?id=7014420) 3. [](http://www.novell.com/support/kb/doc.php?id=7010867)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5769, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5769 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5769 - **State**: PUBLISHED - **Published Date**: August 16, 2015 at 23:00 UTC - **Last Updated**: August 06, 2024 at 06:59 UTC - **Reserved Date**: August 06, 2015 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description The MSVDX driver in Apple iOS before 8.4.1 allows remote attackers to cause a denial of service (device crash) via a crafted video. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.apple.com/kb/HT205030) 2. [1033275](http://www.securitytracker.com/id/1033275) 3. [76337](http://www.securityfocus.com/bid/76337) 4. [APPLE-SA-2015-08-13-3](http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36425, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36425 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36425 - **State**: PUBLISHED - **Published Date**: February 03, 2023 at 00:00 UTC - **Last Updated**: March 26, 2025 at 17:33 UTC - **Reserved Date**: July 12, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in phpcms 1.9.25 allows remote attackers to delete arbitrary files via unfiltered $file parameter to unlink method in include/inc_act/act_ftptakeover.php file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/slackero/phpwcms/issues/311)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0091 - **State**: PUBLISHED - **Published Date**: March 11, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 03:55 UTC - **Reserved Date**: November 18, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted (1) web site or (2) file, aka "Adobe Font Driver Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-0088, CVE-2015-0090, CVE-2015-0092, and CVE-2015-0093. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS15-021](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-021) 2. [1031889](http://www.securitytracker.com/id/1031889) 3. [72905](http://www.securityfocus.com/bid/72905)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24342, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24342 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24342 - **State**: PUBLISHED - **Published Date**: February 25, 2022 at 14:35 UTC - **Last Updated**: August 03, 2024 at 04:07 UTC - **Reserved Date**: February 02, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.jetbrains.com) 2. [](https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41173, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41173 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41173 - **State**: PUBLISHED - **Published Date**: August 27, 2024 at 08:00 UTC - **Last Updated**: August 27, 2024 at 13:07 UTC - **Reserved Date**: July 17, 2024 at 13:42 UTC - **Assigned By**: CERTVDE ### Vulnerability Description The IPC-Diagnostics package included in TwinCAT/BSD is vulnerable to a local authentication bypass by a low privileged attacker. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-288: Security Weakness ### Affected Products **Beckhoff - IPC Diagnostics package** Affected versions: - 0 (Status: affected) **Beckhoff - TwinCAT/BSD** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert.vde.com/en/advisories/VDE-2024-045) ### Credits - Nozomi Networks - Andrea Palanca
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34418, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34418 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34418 - **State**: PUBLISHED - **Published Date**: November 11, 2021 at 22:59 UTC - **Last Updated**: September 16, 2024 at 22:14 UTC - **Reserved Date**: June 09, 2021 at 00:00 UTC - **Assigned By**: Zoom ### Vulnerability Description The login routine of the web console in the Zoom On-Premise Meeting Connector before version 4.6.239.20200613, Zoom On-Premise Meeting Connector MMR before version 4.6.239.20200613, Zoom On-Premise Recording Connector before version 3.8.42.20200905, Zoom On-Premise Virtual Room Connector before version 4.4.6344.20200612, and Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5492.20200616 fails to validate that a NULL byte was sent while authenticating. This could lead to a crash of the login service. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Affected Products **Zoom Video Communications Inc - Zoom On-Premise Meeting Connector** Affected versions: - unspecified (Status: affected) **Zoom Video Communications Inc - Zoom On-Premise Meeting Connector MMR** Affected versions: - unspecified (Status: affected) **Zoom Video Communications Inc - Zoom On-Premise Recording Connector** Affected versions: - unspecified (Status: affected) **Zoom Video Communications Inc - Zoom On-Premise Virtual Room Connector** Affected versions: - unspecified (Status: affected) **Zoom Video Communications Inc - Zoom On-Premise Virtual Room Connector Load Balancer** Affected versions: - unspecified (Status: affected) ### References 1. [](https://explore.zoom.us/en/trust/security/security-bulletin) ### Credits - Jeremy Brown
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28490, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28490 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28490 - **State**: PUBLISHED - **Published Date**: February 18, 2021 at 14:20 UTC - **Last Updated**: September 17, 2024 at 04:14 UTC - **Reserved Date**: November 12, 2020 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb') ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N` ### Affected Products **n/a - async-git** Affected versions: - unspecified (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877) 2. [](https://github.com/omrilotan/async-git/pull/14) 3. [](https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d) ### Credits - Omri Lotan - Adar-Checkmarx
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6716, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6716 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6716 - **State**: REJECTED - **Last Updated**: February 09, 2024 at 08:48 UTC - **Reserved Date**: December 12, 2023 at 06:47 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25333, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25333 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25333 - **State**: PUBLISHED - **Published Date**: February 27, 2025 at 00:00 UTC - **Last Updated**: February 27, 2025 at 20:05 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in IKEA CN iOS 4.13.0 allows attackers to access sensitive user information via supplying a crafted link. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ZhouZiyi1/Vuls/blob/main/250116-IKEACN/250116-IKEACN.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23487, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23487 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23487 - **State**: PUBLISHED - **Published Date**: December 07, 2022 at 20:05 UTC - **Last Updated**: April 23, 2025 at 16:31 UTC - **Reserved Date**: January 19, 2022 at 21:23 UTC - **Assigned By**: GitHub_M ### Vulnerability Description js-libp2p is the official javascript Implementation of libp2p networking stack. Versions older than `v0.38.0` of js-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of js-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. Users are advised to update their js-libp2p dependency to `v0.38.0` or greater. There are no known workarounds for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **libp2p - js-libp2p** Affected versions: - < 0.38.0 (Status: affected) ### References 1. [https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv](https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2634, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2634 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2634 - **State**: PUBLISHED - **Published Date**: August 23, 2014 at 23:00 UTC - **Last Updated**: August 06, 2024 at 10:21 UTC - **Reserved Date**: March 24, 2014 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Unspecified vulnerability in the server in HP Service Manager (SM) 7.21 and 9.x before 9.34 allows remote attackers to bypass intended access restrictions, and modify data or cause a denial of service, via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [69379](http://www.securityfocus.com/bid/69379) 2. [1030756](http://www.securitytracker.com/id/1030756) 3. [hp-service-cve20142634-unauth-access(95450)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95450) 4. [60028](http://secunia.com/advisories/60028) 5. [60714](http://secunia.com/advisories/60714) 6. [SSRT101654](http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127) 7. [HPSBMU03079](http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3676 - **State**: PUBLISHED - **Published Date**: October 24, 2022 at 00:00 UTC - **Last Updated**: May 07, 2025 at 15:59 UTC - **Reserved Date**: October 24, 2022 at 00:00 UTC - **Assigned By**: eclipse ### Vulnerability Description In Eclipse Openj9 before version 0.35.0, interface calls can be inlined without a runtime type check. Malicious bytecode could make use of this inlining to access or modify memory via an incompatible type. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation - CWE-843: Security Weakness ### Affected Products **The Eclipse Foundation - Eclipse OpenJ9** Affected versions: - unspecified (Status: affected) ### References 1. [](https://github.com/eclipse-openj9/openj9/pull/16122) 2. [](https://github.com/eclipse/omr/pull/6773) 3. [](https://gitlab.eclipse.org/eclipsefdn/emo-team/emo/-/issues/389)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7754, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7754 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7754 - **State**: PUBLISHED - **Published Date**: January 08, 2016 at 19:00 UTC - **Last Updated**: August 06, 2024 at 07:59 UTC - **Reserved Date**: October 08, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Juniper ScreenOS before 6.3.0r21, when ssh-pka is configured and enabled, allows remote attackers to cause a denial of service (system crash) or execute arbitrary code via crafted SSH negotiation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [79627](http://www.securityfocus.com/bid/79627) 2. [1034490](http://www.securitytracker.com/id/1034490) 3. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10712)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4602, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4602 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4602 - **State**: PUBLISHED - **Published Date**: January 12, 2010 at 17:00 UTC - **Last Updated**: September 16, 2024 at 23:20 UTC - **Reserved Date**: January 12, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Randomizer module 5.x through 5.x-1.0 and 6.x through 6.x-1.0, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [37274](http://www.securityfocus.com/bid/37274) 2. [ADV-2009-3476](http://www.vupen.com/english/advisories/2009/3476) 3. [](http://drupal.org/node/655668)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0251, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0251 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0251 - **State**: PUBLISHED - **Published Date**: June 25, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:42 UTC - **Reserved Date**: May 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in licq 1.0.4 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string of format string characters such as "%d". ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20020206 -Possible- licq D.o.S](http://marc.info/?l=bugtraq&m=101301254432079&w=2) 2. [20020208 RE: -Possible- licq D.o.S](http://marc.info/?l=bugtraq&m=101318594420200&w=2) 3. [licq-static-bo(8107)](http://www.iss.net/security_center/static/8107.php) 4. [4036](http://www.securityfocus.com/bid/4036)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1762, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1762 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1762 - **State**: PUBLISHED - **Published Date**: April 12, 2008 at 20:00 UTC - **Last Updated**: August 07, 2024 at 08:32 UTC - **Reserved Date**: April 12, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Opera before 9.27 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted scaled image pattern in an HTML CANVAS element, which triggers memory corruption. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.opera.com/support/search/view/882/) 2. [28585](http://www.securityfocus.com/bid/28585) 3. [29679](http://secunia.com/advisories/29679) 4. [opera-htmlcanvas-code-execution(41627)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41627) 5. [29735](http://secunia.com/advisories/29735) 6. [SUSE-SR:2008:009](http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00007.html) 7. [](http://www.opera.com/docs/changelogs/linux/927/) 8. [29662](http://secunia.com/advisories/29662) 9. [ADV-2008-1084](http://www.vupen.com/english/advisories/2008/1084/references) 10. [GLSA-200804-14](http://security.gentoo.org/glsa/glsa-200804-14.xml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49543, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49543 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49543 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 20:51 UTC - **Last Updated**: December 17, 2024 at 04:55 UTC - **Reserved Date**: October 15, 2024 at 15:35 UTC - **Assigned By**: adobe ### Vulnerability Description InDesign Desktop versions ID19.5, ID18.5.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Adobe - InDesign Desktop** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/indesign/apsb24-97.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34073, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34073 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34073 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 10:11 UTC - **Last Updated**: August 02, 2024 at 02:42 UTC - **Reserved Date**: April 30, 2024 at 06:56 UTC - **Assigned By**: GitHub_M ### Vulnerability Description sagemaker-python-sdk is a library for training and deploying machine learning models on Amazon SageMaker. In affected versions the capture_dependencies function in `sagemaker.serve.save_retrive.version_1_0_0.save.utils` module allows for potentially unsafe Operating System (OS) Command Injection if inappropriate command is passed as the “requirements_path” parameter. This consequently may allow an unprivileged third party to cause remote code execution, denial of service, affecting both confidentiality and integrity. This issue has been addressed in version 2.214.3. Users are advised to upgrade. Users unable to upgrade should not override the “requirements_path” parameter of capture_dependencies function in `sagemaker.serve.save_retrive.version_1_0_0.save.utils`, and instead use the default value. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **aws - sagemaker-python-sdk** Affected versions: - < 2.214.3 (Status: affected) ### References 1. [https://github.com/aws/sagemaker-python-sdk/security/advisories/GHSA-7pc3-pr3q-58vg](https://github.com/aws/sagemaker-python-sdk/security/advisories/GHSA-7pc3-pr3q-58vg) 2. [https://github.com/aws/sagemaker-python-sdk/pull/4556](https://github.com/aws/sagemaker-python-sdk/pull/4556) 3. [https://github.com/aws/sagemaker-python-sdk/commit/2d873d53f708ea570fc2e2a6974f8c3097fe9df5](https://github.com/aws/sagemaker-python-sdk/commit/2d873d53f708ea570fc2e2a6974f8c3097fe9df5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7986, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7986 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7986 - **State**: PUBLISHED - **Published Date**: August 26, 2019 at 18:40 UTC - **Last Updated**: August 04, 2024 at 21:02 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Photoshop CC versions 19.1.8 and earlier and 20.0.5 and earlier have an out of bound write vulnerability. Successful exploitation could lead to arbitrary code execution. ### Affected Products **Adobe - Adobe Photoshop CC** Affected versions: - <=19.1.8 and <=20.0.5 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/photoshop/apsb19-44.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1086, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1086 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1086 - **State**: PUBLISHED - **Published Date**: May 21, 2020 at 22:53 UTC - **Last Updated**: August 04, 2024 at 06:25 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1077, CVE-2020-1090, CVE-2020-1125, CVE-2020-1139, CVE-2020-1149, CVE-2020-1151, CVE-2020-1155, CVE-2020-1156, CVE-2020-1157, CVE-2020-1158, CVE-2020-1164. ### Affected Products **Microsoft - Windows** Affected versions: - 10 Version 1803 for 32-bit Systems (Status: affected) - 10 Version 1803 for x64-based Systems (Status: affected) - 10 Version 1803 for ARM64-based Systems (Status: affected) - 10 Version 1809 for 32-bit Systems (Status: affected) - 10 Version 1809 for x64-based Systems (Status: affected) - 10 Version 1809 for ARM64-based Systems (Status: affected) - 10 Version 1709 for 32-bit Systems (Status: affected) - 10 Version 1709 for x64-based Systems (Status: affected) - 10 Version 1709 for ARM64-based Systems (Status: affected) - 10 for 32-bit Systems (Status: affected) - 10 for x64-based Systems (Status: affected) - 10 Version 1607 for 32-bit Systems (Status: affected) - 10 Version 1607 for x64-based Systems (Status: affected) **Microsoft - Windows Server** Affected versions: - version 1803 (Core Installation) (Status: affected) - 2019 (Status: affected) - 2019 (Core installation) (Status: affected) - 2016 (Status: affected) - 2016 (Core installation) (Status: affected) **Microsoft - Windows 10 Version 1909 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1086)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-25758, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-25758 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-25758 - **State**: PUBLISHED - **Published Date**: December 15, 2020 at 19:27 UTC - **Last Updated**: August 04, 2024 at 15:40 UTC - **Reserved Date**: September 18, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on D-Link DSR-250 3.17 devices. Insufficient validation of configuration file checksums could allow a remote, authenticated attacker to inject arbitrary crontab entries into saved configurations before uploading. These entries are executed as root. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.dlink.com/en/security-bulletin) 2. [](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10195) 3. [](https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35002, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35002 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35002 - **State**: PUBLISHED - **Published Date**: September 25, 2023 at 15:22 UTC - **Last Updated**: September 24, 2024 at 14:53 UTC - **Reserved Date**: June 09, 2023 at 13:03 UTC - **Assigned By**: talos ### Vulnerability Description A heap-based buffer overflow vulnerability exists in the pictwread functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Accusoft - ImageGear** Affected versions: - 20.1 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1760](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1760) ### Credits - Discovered by Emmanuel Tacheau of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8239 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: October 10, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4885, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4885 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4885 - **State**: PUBLISHED - **Published Date**: September 19, 2006 at 21:00 UTC - **Last Updated**: August 07, 2024 at 19:32 UTC - **Reserved Date**: September 19, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in Shadowed Portal 5.599 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the root parameter in (1) footer.php and (2) header.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information. The bottom.php parameter is already covered by CVE-2006-4826. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [28836](http://www.osvdb.org/28836) 2. [84177](http://www.securityfocus.com/bid/84177) 3. [28837](http://www.osvdb.org/28837) 4. [ADV-2006-3629](http://www.vupen.com/english/advisories/2006/3629) 5. [21920](http://secunia.com/advisories/21920)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48532, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48532 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48532 - **State**: PUBLISHED - **Published Date**: December 15, 2023 at 10:17 UTC - **Last Updated**: October 07, 2024 at 13:54 UTC - **Reserved Date**: November 16, 2023 at 23:29 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7199, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7199 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7199 - **State**: PUBLISHED - **Published Date**: March 23, 2017 at 16:00 UTC - **Last Updated**: August 05, 2024 at 15:56 UTC - **Reserved Date**: March 20, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Nessus 6.6.2 - 6.10.3 contains a flaw related to insecure permissions that may allow a local attacker to escalate privileges when the software is running in Agent Mode. Version 6.10.4 fixes this issue. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [97110](http://www.securityfocus.com/bid/97110) 2. [](https://www.tenable.com/security/tns-2017-08) 3. [](https://aspe1337.blogspot.nl/2017/04/writeup-of-cve-2017-7199.html) 4. [1038124](http://www.securitytracker.com/id/1038124)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27765, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27765 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27765 - **State**: PUBLISHED - **Published Date**: December 04, 2020 at 00:00 UTC - **Last Updated**: August 04, 2024 at 16:18 UTC - **Reserved Date**: October 27, 2020 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. ### Weakness Classification (CWE) - CWE-369: Security Weakness ### Affected Products **n/a - ImageMagick** Affected versions: - ImageMagick 7.0.9-0 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1894684) 2. [[debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html) 3. [[debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3623, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3623 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3623 - **State**: PUBLISHED - **Published Date**: March 02, 2022 at 22:02 UTC - **Last Updated**: August 03, 2024 at 17:01 UTC - **Reserved Date**: June 28, 2021 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **n/a - libtpms** Affected versions: - Fixed-In - libtpms 0.6.5, libtpms 0.7.8, libtpms 0.8.4 (Status: affected) ### References 1. [FEDORA-2021-465b5c3b67](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1976806) 3. [](https://github.com/stefanberger/libtpms/pull/223) 4. [](https://github.com/stefanberger/libtpms/commit/2f30d62) 5. [](https://github.com/stefanberger/libtpms/commit/7981d9a) 6. [](https://github.com/stefanberger/libtpms/commit/2e6173c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7701, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7701 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7701 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6743, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6743 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6743 - **State**: REJECTED - **Published Date**: January 12, 2021 at 20:02 UTC - **Last Updated**: January 12, 2021 at 20:02 UTC - **Reserved Date**: January 09, 2020 at 00:00 UTC - **Assigned By**: Eaton ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2661, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2661 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2661 - **State**: PUBLISHED - **Published Date**: March 12, 2018 at 15:00 UTC - **Last Updated**: September 16, 2024 at 17:28 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description ClusterLabs pcs before version 0.9.157 is vulnerable to a cross-site scripting vulnerability due to improper validation of Node name field when creating new cluster or adding existing cluster. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **ClusterLabs - pcs** Affected versions: - 0.9.157 (Status: affected) ### References 1. [](https://github.com/ClusterLabs/pcs/commit/1874a769b5720ae5430f10c6cedd234430bc703f) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1428948)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30832, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30832 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30832 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 10:55 UTC - **Last Updated**: March 27, 2025 at 18:57 UTC - **Reserved Date**: March 26, 2025 at 09:20 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themifyme Themify Event Post allows DOM-Based XSS. This issue affects Themify Event Post: from n/a through 1.3.2. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **themifyme - Themify Event Post** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/themify-event-post/vulnerability/wordpress-themify-event-post-plugin-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - LVT-tholv2k (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20198 - **State**: PUBLISHED - **Published Date**: December 18, 2018 at 01:00 UTC - **Last Updated**: August 05, 2024 at 11:58 UTC - **Reserved Date**: December 17, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A NULL pointer dereference was discovered in ifilter_bank of libfaad/filtbank.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service because adding to windowed output is mishandled in the LONG_START_SEQUENCE case. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/knik0/faad2/issues/23) 2. [[debian-lts-announce] 20190519 [SECURITY] [DLA 1791-1] faad2 security update](https://lists.debian.org/debian-lts-announce/2019/05/msg00022.html) 3. [DSA-4522](https://www.debian.org/security/2019/dsa-4522) 4. [20190916 [SECURITY] [DSA 4522-1] faad2 security update](https://seclists.org/bugtraq/2019/Sep/28) 5. [GLSA-202006-17](https://security.gentoo.org/glsa/202006-17)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26877, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26877 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26877 - **State**: PUBLISHED - **Published Date**: June 29, 2022 at 13:15 UTC - **Last Updated**: August 04, 2024 at 16:03 UTC - **Reserved Date**: October 07, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ApiFest OAuth 2.0 Server 0.3.1 does not validate the redirect URI in accordance with RFC 6749 and is susceptible to an open redirector attack. Specifically, it directly sends an authorization code to the redirect URI submitted with the authorization request, without checking whether the redirect URI is registered by the client who initiated the request. This allows an attacker to craft a request with a manipulated redirect URI (redirect_uri parameter), which is under the attacker's control, and consequently obtain the leaked authorization code when the server redirects the client to the manipulated redirect URI with an authorization code. NOTE: this is similar to CVE-2019-3778. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://tools.ietf.org/html/rfc6749#section-3.1.2.3) 2. [](https://github.com/apifest/apifest-oauth20) 3. [](http://www.apifest.org/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28050, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28050 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28050 - **State**: PUBLISHED - **Published Date**: August 14, 2024 at 13:45 UTC - **Last Updated**: August 16, 2024 at 15:48 UTC - **Reserved Date**: March 27, 2024 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper access control in some Intel(R) Arc(TM) & Iris(R) Xe Graphics software before version 31.0.101.4824 may allow an authenticated user to potentially enable denial of service via local access. ### CVSS Metrics - **CVSS Base Score**: 5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **n/a - Intel(R) Arc(TM) & Iris(R) Xe Graphics software** Affected versions: - before version 31.0.101.4824 (Status: affected) ### References 1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01130.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01130.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5797 - **State**: PUBLISHED - **Published Date**: November 08, 2006 at 20:00 UTC - **Last Updated**: August 07, 2024 at 20:04 UTC - **Reserved Date**: November 08, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in default.asp in Xenis.creator CMS allow remote attackers to execute arbitrary SQL commands via the (1) nav, (2) s, or (3) print parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [22716](http://secunia.com/advisories/22716) 2. [20908](http://www.securityfocus.com/bid/20908) 3. [20061104 Xenis.creator CMS - Multiple Cross](http://marc.info/?l=bugtraq&m=116266150514762&w=2) 4. [](http://www.majorsecurity.de/index_2.php?major_rls=major_rls31) 5. [xeniscreatorcms-default-sql-injection(30017)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30017) 6. [20061104 Re: MajorSecurity Advisory #31]Xenis.creator CMS - Multiple Cross](http://marc.info/?l=bugtraq&m=116267021732120&w=2) 7. [ADV-2006-4470](http://www.vupen.com/english/advisories/2006/4470) 8. [1017162](http://securitytracker.com/id?1017162)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-55560, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-55560 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-55560 - **State**: PUBLISHED - **Published Date**: December 08, 2024 at 00:00 UTC - **Last Updated**: December 09, 2024 at 15:58 UTC - **Reserved Date**: December 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MailCleaner before 28d913e has default values of ssh_host_dsa_key, ssh_host_rsa_key, and ssh_host_ed25519_key that persist after installation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.mailcleaner.net/infobox/mc-info-box.php) 2. [](https://github.com/MailCleaner/MailCleaner/wiki/Watchdogs#host_keys) 3. [](https://github.com/MailCleaner/MailCleaner/commit/28d913eaa044b689eb114f72ebe92d48cb4aaca7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17240, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17240 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17240 - **State**: PUBLISHED - **Published Date**: October 06, 2019 at 18:32 UTC - **Last Updated**: August 05, 2024 at 01:33 UTC - **Reserved Date**: October 06, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-force protection mechanism by using many different forged X-Forwarded-For or Client-IP HTTP headers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rastating.github.io/bludit-brute-force-mitigation-bypass/) 2. [](https://github.com/bludit/bludit/pull/1090) 3. [](http://packetstormsecurity.com/files/158875/Bludit-3.9.2-Authentication-Bruteforce-Mitigation-Bypass.html) 4. [](http://packetstormsecurity.com/files/159664/Bludit-3.9.2-Bruteforce-Mitigation-Bypass.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1420 - **State**: PUBLISHED - **Published Date**: May 21, 2025 at 13:04 UTC - **Last Updated**: May 21, 2025 at 13:24 UTC - **Reserved Date**: February 18, 2025 at 13:43 UTC - **Assigned By**: CERT-PL ### Vulnerability Description Input provided in a field containing "activationMessage" in Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite). ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Proget - Proget** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert.pl/en/posts/2025/05/CVE-2025-1415) 2. [](https://proget.pl/en/mobile-device-management/) ### Credits - Marcin Węgłowski (AFINE)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5502 - **State**: PUBLISHED - **Published Date**: September 30, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 21:05 UTC - **Reserved Date**: October 24, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in safe_html.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with permissions to edit content to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt) 2. [[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix](http://www.openwall.com/lists/oss-security/2012/11/10/1) 3. [](https://plone.org/products/plone-hotfix/releases/20121106) 4. [](https://plone.org/products/plone/security/advisories/20121106/18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4031, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4031 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4031 - **State**: PUBLISHED - **Published Date**: October 31, 2019 at 20:29 UTC - **Last Updated**: August 05, 2024 at 05:04 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable vulnerability exists in the safe browsing function of the CUJO Smart Firewall, version 7003. The flaw lies in the way the safe browsing function parses HTTP requests. The server hostname is extracted from captured HTTP/HTTPS requests and inserted as part of a Lua statement without prior sanitization, which results in arbitrary Lua script execution in the kernel. An attacker could send an HTTP request to exploit this vulnerability. ### Affected Products **n/a - CUJO** Affected versions: - CUJO Smart Firewall - Firmware version 7003 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0703)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4540, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4540 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4540 - **State**: PUBLISHED - **Published Date**: June 03, 2024 at 15:33 UTC - **Last Updated**: November 13, 2024 at 14:26 UTC - **Reserved Date**: May 06, 2024 at 11:02 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authorization request, possibly leading to an information disclosure vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Unknown - Unknown** Affected versions: - d5e82356f90893ca3b308a7e10020103e402369a (Status: unaffected) **Red Hat - Red Hat Build of Keycloak** **Red Hat - Red Hat Build of Keycloak** **Red Hat - Red Hat build of Keycloak 22** Affected versions: - 22.0.11-2 (Status: unaffected) **Red Hat - Red Hat build of Keycloak 22** Affected versions: - 22-15 (Status: unaffected) **Red Hat - Red Hat build of Keycloak 22** Affected versions: - 22-18 (Status: unaffected) **Red Hat - Red Hat build of Keycloak 24** Affected versions: - 24.0.5-2 (Status: unaffected) **Red Hat - Red Hat build of Keycloak 24** Affected versions: - 24-10 (Status: unaffected) **Red Hat - Red Hat build of Keycloak 24** Affected versions: - 24-10 (Status: unaffected) **Red Hat - Red Hat Single Sign-On 7** **Red Hat - Red Hat Single Sign-On 7.6 for RHEL 7** Affected versions: - 0:18.0.14-1.redhat_00001.1.el7sso (Status: unaffected) **Red Hat - Red Hat Single Sign-On 7.6 for RHEL 8** Affected versions: - 0:18.0.14-1.redhat_00001.1.el8sso (Status: unaffected) **Red Hat - Red Hat Single Sign-On 7.6 for RHEL 9** Affected versions: - 0:18.0.14-1.redhat_00001.1.el9sso (Status: unaffected) **Red Hat - RHEL-8 based Middleware Containers** Affected versions: - 7.6-49 (Status: unaffected) ### References 1. [RHSA-2024:3566](https://access.redhat.com/errata/RHSA-2024:3566) 2. [RHSA-2024:3567](https://access.redhat.com/errata/RHSA-2024:3567) 3. [RHSA-2024:3568](https://access.redhat.com/errata/RHSA-2024:3568) 4. [RHSA-2024:3570](https://access.redhat.com/errata/RHSA-2024:3570) 5. [RHSA-2024:3572](https://access.redhat.com/errata/RHSA-2024:3572) 6. [RHSA-2024:3573](https://access.redhat.com/errata/RHSA-2024:3573) 7. [RHSA-2024:3574](https://access.redhat.com/errata/RHSA-2024:3574) 8. [RHSA-2024:3575](https://access.redhat.com/errata/RHSA-2024:3575) 9. [RHSA-2024:3576](https://access.redhat.com/errata/RHSA-2024:3576) 10. [](https://access.redhat.com/security/cve/CVE-2024-4540) 11. [RHBZ#2279303](https://bugzilla.redhat.com/show_bug.cgi?id=2279303) ### Credits - Red Hat would like to thank Manuel Schallar for reporting this issue.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50298, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50298 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50298 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 01:30 UTC - **Last Updated**: May 04, 2025 at 09:51 UTC - **Reserved Date**: October 21, 2024 at 19:36 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: net: enetc: allocate vf_state during PF probes In the previous implementation, vf_state is allocated memory only when VF is enabled. However, net_device_ops::ndo_set_vf_mac() may be called before VF is enabled to configure the MAC address of VF. If this is the case, enetc_pf_set_vf_mac() will access vf_state, resulting in access to a null pointer. The simplified error log is as follows. root@ls1028ardb:~# ip link set eno0 vf 1 mac 00:0c:e7:66:77:89 [ 173.543315] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004 [ 173.637254] pc : enetc_pf_set_vf_mac+0x3c/0x80 Message from sy [ 173.641973] lr : do_setlink+0x4a8/0xec8 [ 173.732292] Call trace: [ 173.734740] enetc_pf_set_vf_mac+0x3c/0x80 [ 173.738847] __rtnl_newlink+0x530/0x89c [ 173.742692] rtnl_newlink+0x50/0x7c [ 173.746189] rtnetlink_rcv_msg+0x128/0x390 [ 173.750298] netlink_rcv_skb+0x60/0x130 [ 173.754145] rtnetlink_rcv+0x18/0x24 [ 173.757731] netlink_unicast+0x318/0x380 [ 173.761665] netlink_sendmsg+0x17c/0x3c8 ### Affected Products **Linux - Linux** Affected versions: - d4fd0404c1c95b17880f254ebfee3485693fa8ba (Status: affected) - d4fd0404c1c95b17880f254ebfee3485693fa8ba (Status: affected) - d4fd0404c1c95b17880f254ebfee3485693fa8ba (Status: affected) **Linux - Linux** Affected versions: - 5.1 (Status: affected) - 0 (Status: unaffected) - 6.6.61 (Status: unaffected) - 6.11.8 (Status: unaffected) - 6.12 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/ef0edfbe9eeed1fccad7cb705648af5222664944) 2. [](https://git.kernel.org/stable/c/7eb923f8d4819737c07d6a8d0daef0a4d7f99e0c) 3. [](https://git.kernel.org/stable/c/e15c5506dd39885cd047f811a64240e2e8ab401b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0462, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0462 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0462 - **State**: PUBLISHED - **Published Date**: January 27, 2013 at 18:00 UTC - **Last Updated**: September 16, 2024 at 23:45 UTC - **Reserved Date**: December 16, 2012 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Unspecified vulnerability in IBM WebSphere Application Server (WAS) 6.1, 7.0 before 7.0.0.27, 8.0, and 8.5 has unknown impact and attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.ibm.com/connections/blogs/PSIRT/entry/security_vulnerabilities_fixed_in_ibm_websphere_application_server_7_0_0_2785)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1151, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1151 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1151 - **State**: PUBLISHED - **Published Date**: August 14, 2019 at 20:55 UTC - **Last Updated**: August 04, 2024 at 18:06 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or instant message that takes users to the attacker's website, or by opening an attachment sent through email. In a file-sharing attack scenario, an attacker could provide a specially crafted document file designed to exploit the vulnerability and then convince users to open the document file. The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1703** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1803** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1803 (Server Core Installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1709 for 32-bit Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1709** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Systems Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Microsoft Office 2019 for Mac** Affected versions: - 16.0.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1151) 2. [](http://packetstormsecurity.com/files/154092/Microsoft-Font-Subsetting-DLL-ReadAllocFormat12CharGlyphMapList-Heap-Corruption.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31720 - **State**: PUBLISHED - **Published Date**: April 02, 2025 at 14:59 UTC - **Last Updated**: April 02, 2025 at 16:49 UTC - **Reserved Date**: April 01, 2025 at 12:50 UTC - **Assigned By**: jenkins ### Vulnerability Description A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Extended Read permission to copy an agent, gaining access to its configuration. ### Affected Products **Jenkins Project - Jenkins** Affected versions: - 2.492.3 (Status: unaffected) - 2.504 (Status: unaffected) ### References 1. [Jenkins Security Advisory 2025-04-02](https://www.jenkins.io/security/advisory/2025-04-02/#SECURITY-3512)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3973, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3973 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3973 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-37094, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-37094 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-37094 - **State**: PUBLISHED - **Published Date**: August 25, 2022 at 14:04 UTC - **Last Updated**: August 03, 2024 at 10:21 UTC - **Reserved Date**: August 01, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description H3C H200 H200V100R004 was discovered to contain a stack overflow via the function Edit_BasicSSID_5G. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7851, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7851 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7851 - **State**: PUBLISHED - **Published Date**: April 19, 2021 at 12:55 UTC - **Last Updated**: September 17, 2024 at 02:48 UTC - **Reserved Date**: January 22, 2020 at 00:00 UTC - **Assigned By**: krcert ### Vulnerability Description Innorix Web-Based File Transfer Solution versuibs prior to and including 9.2.18.385 contains a vulnerability that could allow remote files to be downloaded and executed by setting the arguments to the internal method. A remote attacker could induce a user to access a crafted web page, causing damage such as malicious code infection. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-88: Security Weakness ### Affected Products **INNORIX - INNORIX Agent.exe** Affected versions: - 9.2.18.390 (Status: affected) ### References 1. [](https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35984) 2. [](https://www.innorix.com/ko/) ### Credits - Thanks to Hyeonjin Ko for reporting this vulnerability.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6813, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6813 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6813 - **State**: PUBLISHED - **Published Date**: February 06, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 00:26 UTC - **Reserved Date**: August 12, 2016 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description Apache CloudStack 4.1 to 4.8.1.0 and 4.9.0.0 contain an API call designed to allow a user to register for the developer API. If a malicious user is able to determine the ID of another (non-"root") CloudStack user, the malicious user may be able to reset the API keys for the other user, in turn accessing their account and resources. ### Affected Products **Apache Software Foundation - Apache CloudStack** Affected versions: - 4.1 to 4.8.1.0 (Status: affected) - 4.9.0.0 (Status: affected) ### References 1. [[cloudstack-announce] 20161027 Apache CloudStack Security Releases 4.8.1.1, 4.9.0.1](https://s.apache.org/qV5l) 2. [93945](http://www.securityfocus.com/bid/93945) 3. [[www-announce] 20161028 [SECURITY] CVE-2016-6813: Apache CloudStack registerUserKeys authorization vulnerability](http://mail-archives.apache.org/mod_mbox/www-announce/201610.mbox/%3CCAJtfqCupOYQoNY2BNx86_zauses_MpmpiX8WciO_DEaWp6uNig%40mail.gmail.com%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48599, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48599 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48599 - **State**: PUBLISHED - **Published Date**: August 09, 2023 at 18:26 UTC - **Last Updated**: October 09, 2024 at 20:50 UTC - **Reserved Date**: August 09, 2023 at 16:58 UTC - **Assigned By**: Securifera ### Vulnerability Description A SQL injection vulnerability exists in the “reporter events type” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **ScienceLogic - SL 1** Affected versions: - 11.1.2 (Status: affected) ### References 1. [](https://www.securifera.com/advisories/cve-2022-48599/) ### Credits - Ryan Wincey @rwincey @Securifera
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10585, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10585 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10585 - **State**: PUBLISHED - **Published Date**: January 21, 2020 at 06:30 UTC - **Last Updated**: August 04, 2024 at 22:24 UTC - **Reserved Date**: March 29, 2019 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Possible integer overflow happens when mmap find function will increment refcount every time when it invokes and can lead to use after free issue in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, MDM9607, MDM9640, MSM8909W, MSM8917, MSM8953, Nicobar, QCS605, QM215, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM660, SDM670, SDM710, SDM845, SDX24, SDX55, SM6150, SM8150, SM8250, SXR1130, SXR2130 ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables** Affected versions: - APQ8009, APQ8053, MDM9607, MDM9640, MSM8909W, MSM8917, MSM8953, Nicobar, QCS605, QM215, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM660, SDM670, SDM710, SDM845, SDX24, SDX55, SM6150, SM8150, SM8250, SXR1130, SXR2130 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2052 - **State**: PUBLISHED - **Published Date**: April 26, 2006 at 20:00 UTC - **Last Updated**: August 07, 2024 at 17:35 UTC - **Reserved Date**: April 26, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Verosky Media Instant Photo Gallery allows remote attackers to inject arbitrary web script or HTML via the member parameter in a viewpro action in member.php. NOTE: the original report may be inaccurate, since the "viewpro" string does not appear in the source code for version 1.0.2 of the product. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060425 Instant Photo Gallery <= Multiple XSS](http://www.securityfocus.com/archive/1/432022/100/0/threaded) 2. [17696](http://www.securityfocus.com/bid/17696) 3. [24984](http://www.osvdb.org/24984) 4. [20060427 Re: Instant Photo Gallery <= Multiple XSS](http://www.securityfocus.com/archive/1/432241/100/0/threaded) 5. [790](http://securityreason.com/securityalert/790)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10416, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10416 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10416 - **State**: PUBLISHED - **Published Date**: March 12, 2020 at 13:04 UTC - **Last Updated**: August 04, 2024 at 10:58 UTC - **Reserved Date**: March 12, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/kb-backup.php by adding a question mark (?) followed by the payload. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://antoniocannito.it/?p=137#uxss) 2. [](https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0870, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0870 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0870 - **State**: PUBLISHED - **Published Date**: February 21, 2008 at 01:00 UTC - **Last Updated**: August 07, 2024 at 08:01 UTC - **Reserved Date**: February 20, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description BEA WebLogic Portal 10.0 and 9.2 through Maintenance Pack 2, under certain circumstances, can redirect a user from the https:// URI for the Portal Administration Console to an http URI, which allows remote attackers to sniff the session. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-0613](http://www.vupen.com/english/advisories/2008/0613) 2. [BEA08-190.00](http://dev2dev.bea.com/pub/advisory/264) 3. [29041](http://secunia.com/advisories/29041) 4. [1019442](http://www.securitytracker.com/id?1019442)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30751, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30751 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30751 - **State**: PUBLISHED - **Published Date**: July 11, 2022 at 13:31 UTC - **Last Updated**: August 03, 2024 at 06:56 UTC - **Reserved Date**: May 16, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Improper access control vulnerability in sendDHCPACKBroadcast function of SemWifiApClient prior to SMR Jul-2022 Release 1 allows attacker to access wifi ap client mac address that connected by using WIFI_AP_STA_DHCPACK_EVENT action. ### CVSS Metrics - **CVSS Base Score**: 3.3/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - Q(10), R(11), S(12) (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3285, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3285 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3285 - **State**: PUBLISHED - **Published Date**: April 11, 2024 at 07:31 UTC - **Last Updated**: August 01, 2024 at 20:05 UTC - **Reserved Date**: April 03, 2024 at 20:06 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Slider, Gallery, and Carousel by MetaSlider – Responsive WordPress Slideshows plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'metaslider' shortcode in all versions up to, and including, 3.70.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **metaslider - Slider, Gallery, and Carousel by MetaSlider – Responsive WordPress Slideshows** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1cbd95bb-6f13-48c9-a51e-5f7bf7a296df?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3067751/ml-slider) ### Credits - wesley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22036, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22036 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22036 - **State**: PUBLISHED - **Published Date**: October 13, 2021 at 15:52 UTC - **Last Updated**: August 03, 2024 at 18:30 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: vmware ### Vulnerability Description VMware vRealize Orchestrator ((8.x prior to 8.6) contains an open redirect vulnerability due to improper path handling. A malicious actor may be able to redirect victim to an attacker controlled domain due to improper path handling in vRealize Orchestrator leading to sensitive information disclosure. ### Affected Products **n/a - VMware vRealize Orchestrator** Affected versions: - VMware vRealize Orchestrator (8.x prior to 8.6) (Status: affected) ### References 1. [](https://www.vmware.com/security/advisories/VMSA-2021-0023.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12042, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12042 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12042 - **State**: PUBLISHED - **Published Date**: May 23, 2019 at 13:30 UTC - **Last Updated**: August 04, 2024 at 23:10 UTC - **Reserved Date**: May 13, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Insecure permissions of the section object Global\PandaDevicesAgentSharedMemory and the event Global\PandaDevicesAgentSharedMemoryChange in Panda products before 18.07.03 allow attackers to queue an event (as an encrypted JSON string) to the system service AgentSvc.exe, which leads to privilege escalation when the CmdLineExecute event is queued. This affects Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection, and Panda Internet Security. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/SouhailHammou/Panda-Antivirus-LPE) 2. [](https://www.pandasecurity.com/usa/support/card?id=100063) 3. [](https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0198 - **State**: PUBLISHED - **Published Date**: March 04, 2013 at 21:00 UTC - **Last Updated**: August 06, 2024 at 14:18 UTC - **Reserved Date**: December 06, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Dnsmasq before 2.66test2, when used with certain libvirt configurations, replies to queries from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via spoofed TCP based DNS queries. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3411. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=894486) 2. [MDVSA-2013:072](http://www.mandriva.com/security/advisories?name=MDVSA-2013:072) 3. [](http://www.thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=22ce550e5346947a12a781ed0959a7b1165d0dc6) 4. [[oss-security] 20130118 Re: CVE Request -- dnsmasq: Incomplete fix for the CVE-2012-3411 issue](http://www.openwall.com/lists/oss-security/2013/01/18/7) 5. [[oss-security] 20130118 CVE Request -- dnsmasq: Incomplete fix for the CVE-2012-3411 issue](http://www.openwall.com/lists/oss-security/2013/01/18/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25209, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25209 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25209 - **State**: PUBLISHED - **Published Date**: July 22, 2021 at 19:05 UTC - **Last Updated**: August 03, 2024 at 19:56 UTC - **Reserved Date**: January 15, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in SourceCodester Theme Park Ticketing System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to view_user.php . ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BigTiger2020/Theme-Park-Ticketing-System/blob/main/Theme%20Park%20Ticketing%20System.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20462, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20462 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20462 - **State**: PUBLISHED - **Published Date**: December 25, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 12:05 UTC - **Reserved Date**: December 25, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the jsmol.php data parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wpvulndb.com/vulnerabilities/9196) 2. [](https://www.cbiu.cc/2018/12/WordPress%E6%8F%92%E4%BB%B6jsmol2wp%E6%BC%8F%E6%B4%9E/#%E5%8F%8D%E5%B0%84%E6%80%A7XSS)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32296, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32296 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32296 - **State**: PUBLISHED - **Published Date**: June 05, 2022 at 21:53 UTC - **Last Updated**: August 03, 2024 at 07:39 UTC - **Reserved Date**: June 05, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5) 2. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9) 3. [[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update](https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html) 4. [DSA-5173](https://www.debian.org/security/2022/dsa-5173) 5. [](https://arxiv.org/abs/2209.12993) 6. [](https://github.com/0xkol/rfc6056-device-tracker)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1742, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1742 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1742 - **State**: PUBLISHED - **Published Date**: March 22, 2024 at 10:26 UTC - **Last Updated**: August 12, 2024 at 18:34 UTC - **Reserved Date**: February 22, 2024 at 12:43 UTC - **Assigned By**: Checkmk ### Vulnerability Description Invocation of the sqlplus command with sensitive information in the command line in the mk_oracle Checkmk agent plugin before Checkmk 2.3.0b4 (beta), 2.2.0p24, 2.1.0p41 and 2.0.0 (EOL) allows the extraction of this information from the process list. ### CVSS Metrics - **CVSS Base Score**: 3.8/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-214: Security Weakness ### Affected Products **Checkmk GmbH - Checkmk** Affected versions: - 2.3.0 (Status: affected) - 2.2.0 (Status: affected) - 2.1.0 (Status: affected) - 2.0.0 (Status: affected) ### References 1. [](https://checkmk.com/werk/16234)