System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4370, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4370 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4370
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 01:51 UTC
- **Last Updated**: December 28, 2024 at 00:53 UTC
- **Reserved Date**: June 06, 2023 at 13:11 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The uListing plugin for WordPress is vulnerable to authorization bypass as most actions and endpoints are accessible to unauthenticated users, lack security nonces, and data is seldom validated. This issue exists in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to conduct numerous administrative actions, including those less critical than the explicitly outlined ones in our detection.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**stylemix - Directory Listings WordPress plugin – uListing**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c5ada976-03b8-4219-9ae3-9060fb7b9de5?source=cve)
2. [](https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vulnerabilities/)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2456786%40ulisting&new=2456786%40ulisting&sfp_email=&sfph_mail=)
### Credits
- Jerome Bruandet |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0252, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0252 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0252
- **State**: PUBLISHED
- **Published Date**: July 08, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 22:15 UTC
- **Reserved Date**: December 08, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Control Center 6.x before 6.0.0.1 iFix06 and Sterling Control Center 5.4.x before 5.4.2.1 iFix09 allow local users to decrypt the master key via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21985641) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6231
- **State**: PUBLISHED
- **Published Date**: February 20, 2009 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 11:20 UTC
- **Reserved Date**: February 20, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pre Classified Listing PHP allows remote attackers to bypass authentication and gain administrative access by setting the (1) adminname and the (2) adminid cookies to "admin".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [preclassifiedlistings-cookie-sec-bypass(46390)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46390)
2. [ADV-2008-3019](http://www.vupen.com/english/advisories/2008/3019)
3. [32126](http://www.securityfocus.com/bid/32126)
4. [7000](https://www.exploit-db.com/exploits/7000)
5. [32557](http://secunia.com/advisories/32557) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3351, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3351
- **State**: PUBLISHED
- **Published Date**: September 24, 2009 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 02:06 UTC
- **Reserved Date**: September 24, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in the Node Browser module for Drupal have unknown impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://drupal.org/node/572852)
2. [36325](http://www.securityfocus.com/bid/36325) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7597, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7597 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7597
- **State**: PUBLISHED
- **Published Date**: February 20, 2017 at 08:35 UTC
- **Last Updated**: August 06, 2024 at 02:04 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "SpringBoard" component, which allows physically proximate attackers to maintain the unlocked state via vectors related to Handoff with Siri.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT207422)
2. [1037429](http://www.securitytracker.com/id/1037429)
3. [94850](http://www.securityfocus.com/bid/94850) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4886, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4886
- **State**: PUBLISHED
- **Published Date**: March 24, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 20:50 UTC
- **Reserved Date**: September 10, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in wpsio.dll in Kingsoft WPS Office 2012 possibly 8.1.0.3238 allows remote attackers to execute arbitrary code via a long BSTR string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/121431/WPS-Office-Stack-Buffer-Overflow.html)
2. [wpsoffice-wpsio-bo(83862)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83862)
3. [92847](http://osvdb.org/92847)
4. [59529](http://www.securityfocus.com/bid/59529)
5. [20130427 WPS Office Wpsio.dll Stack Buffer Overflow Vulnerability](http://seclists.org/fulldisclosure/2013/Apr/247)
6. [25140](http://www.exploit-db.com/exploits/25140) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8637
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 23, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-17145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-17145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-17145
- **State**: PUBLISHED
- **Published Date**: December 09, 2020 at 23:36 UTC
- **Last Updated**: August 04, 2024 at 13:53 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure DevOps Server and Team Foundation Services Spoofing Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Azure DevOps Server 2019.0.1**
Affected versions:
- 2019.0.0 (Status: affected)
**Microsoft - Team Foundation Server 2017 Update 3.1**
Affected versions:
- 3.0 (Status: affected)
**Microsoft - Team Foundation Server 2018 Update 1.2**
Affected versions:
- 1.0 (Status: affected)
**Microsoft - Team Foundation Server 2018 Update 3.2**
Affected versions:
- 3.0 (Status: affected)
**Microsoft - Team Foundation Server 2015 Update 4.2**
Affected versions:
- 4.0 (Status: affected)
**Microsoft - Azure DevOps Server 2019 Update 1.1**
Affected versions:
- 1.0 (Status: affected)
**Microsoft - Azure DevOps Server 2020**
Affected versions:
- 2020 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17145) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5501, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5501 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5501
- **State**: PUBLISHED
- **Published Date**: October 25, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 19:55 UTC
- **Reserved Date**: October 25, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the AOL.PicDownloadCtrl.1 ActiveX control (YGPPicDownload.dll) 9.2.3.0 in America Online (AOL) 9.0 Security Edition allows remote attackers to execute arbitrary code via the downloadFileDirectory property, a different vulnerability than CVE-2006-5502.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20745](http://www.securityfocus.com/bid/20745)
2. [20061025 AOL YGPPDownload downloadFileDirectory ActiveX Control Heap Corruption Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=430)
3. [aol-ygp-downloadfiledirectory-bo(29797)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29797)
4. [ADV-2006-4197](http://www.vupen.com/english/advisories/2006/4197)
5. [1017121](http://securitytracker.com/id?1017121)
6. [22567](http://secunia.com/advisories/22567) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-53042, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-53042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-53042
- **State**: PUBLISHED
- **Published Date**: May 02, 2025 at 15:54 UTC
- **Last Updated**: May 04, 2025 at 07:48 UTC
- **Reserved Date**: April 16, 2025 at 07:18 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Do not set DRR on pipe Commit
[WHY]
Writing to DRR registers such as OTG_V_TOTAL_MIN on the same frame as a
pipe commit can cause underflow.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.1.21 (Status: unaffected)
- 6.2.8 (Status: unaffected)
- 6.3 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/f8080f1e300e7abcc03025ec8b5bab69ae98daaa)
2. [](https://git.kernel.org/stable/c/3c20a098b507020936e02a98f4fbb924deeef44b)
3. [](https://git.kernel.org/stable/c/56574f89dbd84004c3fd6485bcaafb5aa9b8be14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0461
- **State**: PUBLISHED
- **Published Date**: January 24, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 12:19 UTC
- **Reserved Date**: January 23, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple memory leaks in the Dazuko anti-virus helper module before 2.3.2 allow attackers to cause a denial of service (memory consumption) via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38322](http://osvdb.org/38322)
2. [SUSE-SR:2007:001](http://www.novell.com/linux/security/advisories/2007_01_sr.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5399
- **State**: PUBLISHED
- **Published Date**: April 10, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 15:31 UTC
- **Reserved Date**: October 12, 2007 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Multiple heap-based buffer overflows in emlsr.dll in the EML reader in Autonomy (formerly Verity) KeyView 10.3.0.0, as used by IBM Lotus Notes, allow remote attackers to execute arbitrary code via a long (1) To, (2) Cc, (3) Bcc, (4) From, (5) Date, (6) Subject, (7) Priority, (8) Importance, or (9) X-MSMail-Priority header; (10) a long string at the beginning of an RFC2047 encoded-word in a header; (11) a long text string in an RFC2047 encoded-word in a header; or (12) a long Subject header, related to creation of an associated filename.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28209](http://secunia.com/advisories/28209)
2. [20080414 Secunia Research: Autonomy Keyview EML Reader Buffer Overflows](http://www.securityfocus.com/archive/1/490832/100/0/threaded)
3. [ADV-2008-1156](http://www.vupen.com/english/advisories/2008/1156)
4. [](http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453)
5. [28454](http://www.securityfocus.com/bid/28454)
6. [28210](http://secunia.com/advisories/28210)
7. [](http://secunia.com/secunia_research/2007-91/advisory/)
8. [1019842](http://www.securitytracker.com/id?1019842)
9. [20080414 Secunia Research: Lotus Notes EML Reader Buffer Overflows](http://www.securityfocus.com/archive/1/490833/100/0/threaded)
10. [ADV-2008-1153](http://www.vupen.com/english/advisories/2008/1153)
11. [](http://secunia.com/secunia_research/2007-92/advisory/)
12. [autonomy-keyview-eml-multiple-bo(41723)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41723) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5794, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5794 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5794
- **State**: PUBLISHED
- **Published Date**: November 04, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 21:14 UTC
- **Reserved Date**: November 04, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The MoneyBookers module in osCommerce does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [moneybookers-ssl-spoofing(79957)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79957)
2. [](http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37202, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37202 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37202
- **State**: PUBLISHED
- **Published Date**: October 26, 2022 at 00:00 UTC
- **Last Updated**: May 07, 2025 at 18:40 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JFinal CMS 5.1.0 is vulnerable to SQL Injection via /admin/advicefeedback/list
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql1.md)
2. [](https://github.com/AgainstTheLight/CVE-2022-37202/blob/main/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52033, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52033
- **State**: PUBLISHED
- **Published Date**: November 20, 2024 at 07:29 UTC
- **Last Updated**: November 20, 2024 at 15:05 UTC
- **Reserved Date**: November 05, 2024 at 02:54 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Exposure of sensitive system information to an unauthorized control sphere issue exists in Rakuten Turbo 5G firmware version V1.3.18 and earlier. If this vulnerability is exploited, a remote unauthenticated attacker may obtain information of the other devices connected through the Wi-Fi.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-497: Security Weakness
### Affected Products
**Rakuten Mobile, Inc. - Rakuten Turbo 5G**
Affected versions:
- V1.3.18 and earlier (Status: affected)
### References
1. [](https://network.mobile.rakuten.co.jp/internet/turbo/information/news/3184/)
2. [](https://jvn.jp/en/vu/JVNVU90667116/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27558, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27558 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27558
- **State**: PUBLISHED
- **Published Date**: August 31, 2021 at 02:44 UTC
- **Last Updated**: August 03, 2024 at 21:26 UTC
- **Reserved Date**: February 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross site scripting (XSS) issue in EasyCorp ZenTao 12.5.3 allows remote attackers to execute arbitrary web script via various areas such as data-link-creator.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://privasec.com/blog/zentao-cms-a-monkeys-journey-to-priv-esc-remote-code-execution/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15178
- **State**: PUBLISHED
- **Published Date**: September 15, 2020 at 17:50 UTC
- **Last Updated**: August 04, 2024 at 13:08 UTC
- **Reserved Date**: June 25, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In PrestaShop contactform module (prestashop/contactform) before version 4.3.0, an attacker is able to inject JavaScript while using the contact form. The `message` field was incorrectly unescaped, possibly allowing attackers to execute arbitrary JavaScript in a victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**PrestaShop - contactform**
Affected versions:
- < 4.3.0 (Status: affected)
### References
1. [](https://github.com/PrestaShop/contactform/security/advisories/GHSA-95hx-62rh-gg96)
2. [](https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a7cb41bcc5ed8bfa09)
3. [](https://packagist.org/packages/prestashop/contactform) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13897, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13897 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13897
- **State**: PUBLISHED
- **Published Date**: July 25, 2019 at 16:33 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 11, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Clients hostname gets added to DNS record on device which is running dnsmasq resulting in an information exposure in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 855, SDA660, SDM630, SDM660
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables**
Affected versions:
- MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 855, SDA660, SDM630, SDM660 (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2019/07/01/july-2019-code-aurora-security-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3013, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3013 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3013
- **State**: PUBLISHED
- **Published Date**: March 28, 2024 at 00:31 UTC
- **Last Updated**: August 12, 2024 at 13:33 UTC
- **Reserved Date**: March 27, 2024 at 14:18 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in FLIR AX8 up to 1.46.16. It has been rated as critical. This issue affects some unknown processing of the file /tools/test_login.php?action=register of the component User Registration. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258299. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**FLIR - AX8**
Affected versions:
- 1.46.0 (Status: affected)
- 1.46.1 (Status: affected)
- 1.46.2 (Status: affected)
- 1.46.3 (Status: affected)
- 1.46.4 (Status: affected)
- 1.46.5 (Status: affected)
- 1.46.6 (Status: affected)
- 1.46.7 (Status: affected)
- 1.46.8 (Status: affected)
- 1.46.9 (Status: affected)
- 1.46.10 (Status: affected)
- 1.46.11 (Status: affected)
- 1.46.12 (Status: affected)
- 1.46.13 (Status: affected)
- 1.46.14 (Status: affected)
- 1.46.15 (Status: affected)
- 1.46.16 (Status: affected)
### References
1. [VDB-258299 | FLIR AX8 User Registration improper authorization](https://vuldb.com/?id.258299)
2. [VDB-258299 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.258299)
3. [Submit #301588 | FLIR FLIR-AX8 Fixed Thermal Cameras 1.46.16 and below Register any user in the background](https://vuldb.com/?submit.301588)
4. [](https://h0e4a0r1t.github.io/2024/vulns/FLIR-AX8%20Fixed%20Thermal%20Cameras%20Register%20any%20user%20in%20the%20background--test_login.php.pdf)
### Credits
- H0e4a0r1t (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2051, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2051 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2051
- **State**: PUBLISHED
- **Published Date**: August 15, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 19:17 UTC
- **Reserved Date**: April 02, 2012 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4147, CVE-2012-4148, CVE-2012-4149, CVE-2012-4150, CVE-2012-4151, CVE-2012-4152, CVE-2012-4153, CVE-2012-4154, CVE-2012-4155, CVE-2012-4156, CVE-2012-4157, CVE-2012-4158, CVE-2012-4159, and CVE-2012-4160.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:16394](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16394)
2. [](http://www.adobe.com/support/security/bulletins/apsb12-16.html)
3. [GLSA-201308-03](http://security.gentoo.org/glsa/glsa-201308-03.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3562, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3562
- **State**: PUBLISHED
- **Published Date**: June 06, 2018 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 21:56 UTC
- **Reserved Date**: December 19, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Buffer over -read can occur while processing a FILS authentication frame in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-security-bulletin-2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13940, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13940 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13940
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:41 UTC
- **Reserved Date**: August 30, 2017 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18323, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18323 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18323
- **State**: PUBLISHED
- **Published Date**: December 12, 2019 at 19:08 UTC
- **Last Updated**: August 05, 2024 at 01:54 UTC
- **Reserved Date**: October 23, 2019 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Siemens - SPPA-T3000 MS3000 Migration Server**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0434
- **State**: PUBLISHED
- **Published Date**: May 12, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:17 UTC
- **Reserved Date**: May 03, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
k5admind (kadmind) for Heimdal allows remote attackers to execute arbitrary code via a Kerberos 4 compatibility administration request whose framing length is less than 2, which leads to a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [heimdal-kadmind-bo(16071)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16071)
2. [DSA-504](http://www.debian.org/security/2004/dsa-504)
3. [20040506 Advisory: Heimdal kadmind version4 remote heap overflow](http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html)
4. [20040505 Advisory: Heimdal kadmind version4 remote heap overflow](http://marc.info/?l=bugtraq&m=108386148126457&w=2)
5. [GLSA-200405-23](http://security.gentoo.org/glsa/glsa-200405-23.xml)
6. [FreeBSD-SA-04:09](ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27133, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27133 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27133
- **State**: PUBLISHED
- **Published Date**: February 23, 2024 at 22:00 UTC
- **Last Updated**: August 22, 2024 at 18:01 UTC
- **Reserved Date**: February 20, 2024 at 11:10 UTC
- **Assigned By**: JFROG
### Vulnerability Description
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. This issue leads to a client-side RCE when running the recipe in Jupyter Notebook. The vulnerability stems from lack of sanitization over dataset table fields.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/)
2. [](https://github.com/mlflow/mlflow/pull/10893) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0039
- **State**: PUBLISHED
- **Published Date**: February 09, 2011 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 21:43 UTC
- **Reserved Date**: December 10, 2010 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly process authentication requests, which allows local users to gain privileges via a request with a crafted length, aka "LSASS Length Validation Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [46152](http://www.securityfocus.com/bid/46152)
2. [43253](http://secunia.com/advisories/43253)
3. [ADV-2011-0327](http://www.vupen.com/english/advisories/2011/0327)
4. [MS11-014](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-014)
5. [1025049](http://www.securitytracker.com/id?1025049)
6. [oval:org.mitre.oval:def:12537](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12537) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21687, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21687 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21687
- **State**: PUBLISHED
- **Published Date**: February 14, 2023 at 19:33 UTC
- **Last Updated**: January 01, 2025 at 00:41 UTC
- **Reserved Date**: December 13, 2022 at 18:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
HTTP.sys Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
### References
1. [HTTP.sys Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21687) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-5159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-5159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-5159
- **State**: PUBLISHED
- **Published Date**: August 25, 2012 at 21:00 UTC
- **Last Updated**: January 21, 2025 at 19:54 UTC
- **Reserved Date**: August 25, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Race condition in Dr.Web Security Space Pro 6.0.0.03100 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20100505 KHOBE - 8.0 earthquake for Windows desktop security software](http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html)
2. [](http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/)
3. [39924](http://www.securityfocus.com/bid/39924)
4. [](http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php)
5. [20100505 KHOBE - 8.0 earthquake for Windows desktop security software](http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html)
6. [67660](http://www.osvdb.org/67660)
7. [](http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/)
8. [](http://www.f-secure.com/weblog/archives/00001949.html)
9. [](http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36618, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36618 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36618
- **State**: PUBLISHED
- **Published Date**: December 19, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 12:57 UTC
- **Reserved Date**: December 19, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in Furqan node-whois. Affected is an unknown function of the file index.coffee. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to launch the attack remotely. The name of the patch is 46ccc2aee8d063c7b6b4dee2c2834113b7286076. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216252.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-74: Security Weakness
### Affected Products
**Furqan - node-whois**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FurqanSoftware/node-whois/pull/105)
2. [](https://github.com/FurqanSoftware/node-whois/commit/46ccc2aee8d063c7b6b4dee2c2834113b7286076)
3. [](https://vuldb.com/?id.216252) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2291
- **State**: PUBLISHED
- **Published Date**: July 17, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:22 UTC
- **Reserved Date**: July 17, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Oracle JDeveloper 9.0.4, 9.0.5, and 10.1.2 passes the cleartext password as a parameter when starting sqlplus, which allows local users to gain sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050713 Advisory: Oracle JDeveloper passes Plaintext Password](http://marc.info/?l=bugtraq&m=112129082323341&w=2)
2. [](http://www.red-database-security.com/advisory/oracle_jdeveloper_passes_plaintext_password.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26142
- **State**: PUBLISHED
- **Published Date**: September 12, 2023 at 05:00 UTC
- **Last Updated**: September 26, 2024 at 14:23 UTC
- **Reserved Date**: February 20, 2023 at 10:28 UTC
- **Assigned By**: snyk
### Vulnerability Description
All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P`
### Affected Products
**n/a - Crow**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556)
2. [](https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c)
### Credits
- Alessio Della Libera - Snyk Research Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42302
- **State**: PUBLISHED
- **Published Date**: October 03, 2022 at 14:49 UTC
- **Last Updated**: August 03, 2024 at 13:03 UTC
- **Reserved Date**: October 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Veritas NetBackup through 10.0 and related Veritas products. The NetBackup Primary server is vulnerable to a SQL Injection attack affecting the NBFSMCLIENT service.
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.veritas.com/content/support/en_US/security/VTS22-011#C1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2409
- **State**: PUBLISHED
- **Published Date**: August 18, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:29 UTC
- **Reserved Date**: August 18, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the sh_hash_compdata function for Samhain 1.8.9 through 2.0.1, when running in update mode ("-t update"), might allow attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1012142](http://securitytracker.com/id?1012142)
2. [samhain-update-bo(18000)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18000)
3. [13130](http://secunia.com/advisories/13130)
4. [11635](http://www.securityfocus.com/bid/11635)
5. [11525](http://www.osvdb.org/11525) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2004
- **State**: PUBLISHED
- **Published Date**: November 08, 2011 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 22:46 UTC
- **Reserved Date**: May 09, 2011 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Array index error in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (reboot) via a crafted TrueType font file, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2011-3402.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:14133](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14133)
2. [VU#675073](http://www.kb.cert.org/vuls/id/675073)
3. [MS11-084](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-084) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0092, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0092
- **State**: PUBLISHED
- **Published Date**: May 07, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:06 UTC
- **Reserved Date**: February 01, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A function in Internet Explorer 5.0 through 5.5 does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files, aka a new variant of the "Frame Domain Verification" vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ie-frame-verification-read-files(6086)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6086)
2. [7817](http://www.osvdb.org/7817)
3. [MS00-093](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-093) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27198
- **State**: PUBLISHED
- **Published Date**: April 08, 2025 at 17:51 UTC
- **Last Updated**: April 09, 2025 at 04:01 UTC
- **Reserved Date**: February 19, 2025 at 22:28 UTC
- **Assigned By**: adobe
### Vulnerability Description
Photoshop Desktop versions 25.12.1, 26.4.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Adobe - Photoshop Desktop**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/photoshop/apsb25-30.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15197
- **State**: PUBLISHED
- **Published Date**: October 10, 2017 at 05:00 UTC
- **Last Updated**: September 17, 2024 at 02:53 UTC
- **Reserved Date**: October 10, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Kanboard before 1.0.47, by altering form data, an authenticated user can add a new category to a private project of another user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0)
2. [](http://openwall.com/lists/oss-security/2017/10/04/9)
3. [](https://kanboard.net/news/version-1.0.47)
4. [](https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35937, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35937 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35937
- **State**: PUBLISHED
- **Published Date**: January 01, 2021 at 01:25 UTC
- **Last Updated**: August 04, 2024 at 17:16 UTC
- **Reserved Date**: January 01, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stored Cross-Site Scripting (XSS) vulnerabilities in the Team Showcase plugin before 1.22.16 for WordPress allow remote authenticated attackers to import layouts including JavaScript supplied via a remotely hosted crafted payload in the source parameter via AJAX. The action must be set to team_import_xml_layouts.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:L/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.wordfence.com/blog/2020/10/high-severity-vulnerabilities-in-post-grid-and-team-showcase-plugins/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10240, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10240 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10240
- **State**: PUBLISHED
- **Published Date**: November 26, 2024 at 19:22 UTC
- **Last Updated**: November 26, 2024 at 20:26 UTC
- **Reserved Date**: October 22, 2024 at 09:02 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab EE affecting all versions starting from 17.3 before 17.3.7, all versions starting from 17.4 before 17.4.4, all versions starting from 17.5 before 17.5.2 in which an unauthenticated user may be able to read some information about an MR in a private project, under certain circumstances.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-497: Security Weakness
### Affected Products
**GitLab - GitLab**
Affected versions:
- 17.3 (Status: affected)
- 17.4 (Status: affected)
- 17.5 (Status: affected)
### References
1. [GitLab Issue #493188](https://gitlab.com/gitlab-org/gitlab/-/issues/493188)
2. [](https://about.gitlab.com/releases/2024/11/13/patch-release-gitlab-17-5-2-released/#information-disclosure-through-an-api-endpoint)
### Credits
- This vulnerability has been discovered internally by GitLab team member [Patrick Bajao](https://gitlab.com/patrickbajao). |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18388, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18388 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18388
- **State**: PUBLISHED
- **Published Date**: December 20, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 11:08 UTC
- **Reserved Date**: October 16, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
eScan Agent Application (MWAGENT.EXE) 4.0.2.98 in MicroWorld Technologies eScan 14.0 allows remote or local attackers to execute arbitrary commands by sending a carefully crafted payload to TCP port 2222.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://blog.escanav.com/2018/11/cve-2018-18388/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40394
- **State**: PUBLISHED
- **Published Date**: January 10, 2024 at 22:03 UTC
- **Last Updated**: August 02, 2024 at 18:31 UTC
- **Reserved Date**: August 14, 2023 at 20:26 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved validation of environment variables. This issue is fixed in iOS 16.6 and iPadOS 16.6. An app may be able to access sensitive user data.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213841) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4325, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4325
- **State**: PUBLISHED
- **Published Date**: January 09, 2023 at 22:13 UTC
- **Last Updated**: April 09, 2025 at 17:40 UTC
- **Reserved Date**: December 07, 2022 at 08:34 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Post Status Notifier Lite WordPress plugin before 1.10.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which can be used against high privilege users such as admin.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Post Status Notifier Lite**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/5b983c48-6b05-47cf-85cb-28bbeec17395)
### Credits
- cydave
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0207
- **State**: PUBLISHED
- **Published Date**: March 19, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 04:03 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 before 1.0.2a does not properly isolate the state information of independent data streams, which allows remote attackers to cause a denial of service (application crash) via crafted DTLS traffic, as demonstrated by DTLS 1.0 traffic to a DTLS 1.2 server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10110)
2. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1202351)
4. [HPSBMU03409](http://marc.info/?l=bugtraq&m=144050155601375&w=2)
5. [](https://bto.bluecoat.com/security-advisory/sa92)
6. [](https://www.openssl.org/news/secadv_20150319.txt)
7. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html)
8. [HPSBMU03380](http://marc.info/?l=bugtraq&m=143748090628601&w=2)
9. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html)
10. [73229](http://www.securityfocus.com/bid/73229)
11. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html)
12. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html)
13. [HPSBMU03397](http://marc.info/?l=bugtraq&m=144050297101809&w=2)
14. [1031929](http://www.securitytracker.com/id/1031929)
15. [](https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=819418110b6fff4a7b96f01a5d68f71df3e3b736)
16. [GLSA-201503-11](https://security.gentoo.org/glsa/201503-11)
17. [](https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1245, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1245
- **State**: PUBLISHED
- **Published Date**: March 07, 2023 at 00:00 UTC
- **Last Updated**: March 06, 2025 at 14:40 UTC
- **Reserved Date**: March 07, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**answerdev - answerdev/answer**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/f8011bb3-8212-4937-aa58-79f4b73be004)
2. [](https://github.com/answerdev/answer/commit/71a4cdac81112975969129d308899edd155c0e80) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22660
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 14:26 UTC
- **Last Updated**: March 27, 2025 at 15:29 UTC
- **Reserved Date**: January 07, 2025 at 21:02 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wolfgang Include Mastodon Feed allows DOM-Based XSS.This issue affects Include Mastodon Feed: from n/a through 1.9.9.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Wolfgang - Include Mastodon Feed**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/include-mastodon-feed/vulnerability/wordpress-include-mastodon-feed-plugin-1-9-9-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Muhammad Yudha (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5367, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5367
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: January 06, 2021 at 16:16 UTC
- **Reserved Date**: August 20, 2014 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20995, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20995 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20995
- **State**: PUBLISHED
- **Published Date**: March 24, 2023 at 00:00 UTC
- **Last Updated**: February 25, 2025 at 14:41 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In captureImage of CustomizedSensor.cpp, there is a possible way to bypass the fingerprint unlock due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-241910279
### Affected Products
**n/a - Android**
Affected versions:
- Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2023-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28606, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28606
- **State**: PUBLISHED
- **Published Date**: April 18, 2022 at 16:55 UTC
- **Last Updated**: April 23, 2025 at 18:38 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser<PMDEC>::read_hedge() e->set_face().
### Weakness Classification (CWE)
- CWE-129: Security Weakness
### Affected Products
**CGAL Project - libcgal**
Affected versions:
- CGAL-5.1.1 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225)
2. [[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html)
3. [GLSA-202305-34](https://security.gentoo.org/glsa/202305-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12652, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12652 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12652
- **State**: PUBLISHED
- **Published Date**: July 10, 2019 at 14:10 UTC
- **Last Updated**: June 09, 2025 at 15:23 UTC
- **Reserved Date**: August 07, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libpng before 1.6.32 does not properly check the length of chunks against the user limit.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/glennrp/libpng/blob/df7e9dae0c4aac63d55361e35709c864fa1b8363/ANNOUNCE)
2. [109269](http://www.securityfocus.com/bid/109269)
3. [](https://support.f5.com/csp/article/K88124225)
4. [](https://support.f5.com/csp/article/K88124225?utm_source=f5support&utm_medium=RSS)
5. [](https://security.netapp.com/advisory/ntap-20220506-0003/)
6. [](https://github.com/pnggroup/libpng/commit/347538efbdc21b8df684ebd92d37400b3ce85d55) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6580
- **State**: PUBLISHED
- **Published Date**: December 07, 2023 at 21:31 UTC
- **Last Updated**: August 02, 2024 at 08:35 UTC
- **Reserved Date**: December 07, 2023 at 13:14 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in D-Link DIR-846 FW100A53DBR. This affects an unknown part of the file /HNAP1/ of the component QoS POST Handler. The manipulation of the argument smartqos_express_devices/smartqos_normal_devices leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247161 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**D-Link - DIR-846**
Affected versions:
- FW100A53DBR (Status: affected)
### References
1. [](https://vuldb.com/?id.247161)
2. [](https://vuldb.com/?ctiid.247161)
3. [](https://github.com/c2dc/cve-reported/blob/main/CVE-2023-6580/CVE-2023-6580.md)
### Credits
- Françoa Taffarel
- francoa.taffarel (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23611, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23611 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23611
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 22:32 UTC
- **Last Updated**: April 23, 2025 at 19:07 UTC
- **Reserved Date**: January 19, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
iTunesRPC-Remastered is a Discord Rich Presence for iTunes on Windows utility. In affected versions iTunesRPC-Remastered did not properly sanitize image file paths leading to OS level command injection. This issue has been patched in commit cdcd48b. Users are advised to upgrade.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**bildsben - iTunesRPC-Remastered**
Affected versions:
- Commits prior to cdcd48b (Status: affected)
### References
1. [](https://github.com/bildsben/iTunesRPC-Remastered/security/advisories/GHSA-mjv7-r62p-vhhg)
2. [](https://github.com/bildsben/iTunesRPC-Remastered/commit/cdcd48bbc44009ddcbd07a809b87376dc9ce37f4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8662, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8662 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8662
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: October 14, 2016 at 00:00 UTC
- **Assigned By**: obdev
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9620, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9620 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9620
- **State**: PUBLISHED
- **Published Date**: June 26, 2020 at 19:59 UTC
- **Last Updated**: August 04, 2024 at 10:34 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe DNG Software Development Kit (SDK) 1.5 and earlier versions have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe - Adobe DNG Software Development Kit (SDK)**
Affected versions:
- Adobe DNG Software Development Kit (SDK) 1.5 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/dng-sdk/apsb20-26.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31176, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31176 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31176
- **State**: PUBLISHED
- **Published Date**: May 11, 2021 at 19:11 UTC
- **Last Updated**: August 03, 2024 at 22:55 UTC
- **Reserved Date**: April 14, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31176)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-575/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36349
- **State**: PUBLISHED
- **Published Date**: January 24, 2022 at 20:10 UTC
- **Last Updated**: September 17, 2024 at 03:33 UTC
- **Reserved Date**: July 08, 2021 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell EMC Data Protection Central versions 19.5 and prior contain a Server Side Request Forgery vulnerability in the DPC DNS client processing. A remote malicious user could potentially exploit this vulnerability, allowing port scanning of external hosts.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**Dell - Data Protection Central**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/000195103) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43622
- **State**: PUBLISHED
- **Published Date**: November 12, 2024 at 17:54 UTC
- **Last Updated**: January 30, 2025 at 00:10 UTC
- **Reserved Date**: August 14, 2024 at 01:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Telephony Service Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
### References
1. [Windows Telephony Service Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43622) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45196, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45196 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45196
- **State**: PUBLISHED
- **Published Date**: June 24, 2024 at 20:48 UTC
- **Last Updated**: August 02, 2024 at 20:14 UTC
- **Reserved Date**: October 05, 2023 at 03:54 UTC
- **Assigned By**: cisa-cg
### Vulnerability Description
Adminer and AdminerEvo allow an unauthenticated remote attacker to cause a denial of service by connecting to an attacker-controlled service that responds with HTTP redirects. The denial of service is subject to PHP configuration limits. Adminer is no longer supported, but this issue was fixed in AdminerEvo version 4.8.4.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Adminer - Adminer**
Affected versions:
- 0 (Status: affected)
- cpe:2.3:a:adminer:adminer:0:*:*:*:*:*:*:* (Status: affected)
**AdminerEvo - AdminerEvo**
Affected versions:
- 4.8.2 (Status: affected)
- cpe:2.3:a:adminerevo:adminerevo:0:*:*:*:*:*:*:* (Status: affected)
### References
1. [](https://github.com/adminerevo/adminerevo/pull/102/commits/23e7cdc0a32b3739e13d19ae504be0fe215142b6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10395, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10395
- **State**: PUBLISHED
- **Published Date**: October 19, 2017 at 17:00 UTC
- **Last Updated**: October 04, 2024 at 16:44 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality Cruise Fleet Management component of Oracle Hospitality Applications (subcomponent: GangwayActivityWebApp). The supported version that is affected is 9.0.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Cruise Fleet Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Cruise Fleet Management accessible data as well as unauthorized read access to a subset of Oracle Hospitality Cruise Fleet Management accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - Hospitality Cruise Fleet Management**
Affected versions:
- 9.0.2.0 (Status: affected)
### References
1. [101438](http://www.securityfocus.com/bid/101438)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1242, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1242
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vulnerability in subnetconfig in HP-UX 9.01 and 9.0 allows local users to gain privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [hp-subnet-config(2162)](https://exchange.xforce.ibmcloud.com/vulnerabilities/2162)
2. [HPSBUX9402-003](http://packetstormsecurity.org/advisories/hpalert/003) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4047, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4047 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4047
- **State**: PUBLISHED
- **Published Date**: August 01, 2023 at 14:57 UTC
- **Last Updated**: February 13, 2025 at 17:08 UTC
- **Reserved Date**: August 01, 2023 at 14:57 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1839073)
2. [](https://www.mozilla.org/security/advisories/mfsa2023-29/)
3. [](https://www.mozilla.org/security/advisories/mfsa2023-30/)
4. [](https://www.mozilla.org/security/advisories/mfsa2023-31/)
5. [](https://www.debian.org/security/2023/dsa-5464)
6. [](https://www.debian.org/security/2023/dsa-5469)
7. [](https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html)
8. [](https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html)
### Credits
- Axel Chong (@Haxatron) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0568
- **State**: PUBLISHED
- **Published Date**: July 27, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:21 UTC
- **Reserved Date**: July 27, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Digital Creations Zope 2.3.1 b1 and earlier allows a local attacker (Zope user) with through-the-web scripting capabilities to alter ZClasses class attributes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-043](http://www.debian.org/security/2001/dsa-043)
2. [](http://www.zope.org/Products/Zope/Products/Zope/Products/Zope/Hotfix_2001-02-23)
3. [RHSA-2001:021](http://www.redhat.com/support/errata/RHSA-2001-021.html)
4. [MDKSA-2001:025](http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-025.php3)
5. [CLA-2001:382](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000382) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0165
- **State**: PUBLISHED
- **Published Date**: April 09, 2014 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 09:05 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
WordPress before 3.7.2 and 3.8.x before 3.8.2 allows remote authenticated users to publish posts by leveraging the Contributor role, related to wp-admin/includes/post.php and wp-admin/includes/class-wp-posts-list-table.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://codex.wordpress.org/Version_3.7.2)
2. [](http://core.trac.wordpress.org/changeset/27976)
3. [](http://codex.wordpress.org/Version_3.8.2)
4. [DSA-2901](http://www.debian.org/security/2014/dsa-2901)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=1085866) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1127, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1127
- **State**: PUBLISHED
- **Published Date**: July 22, 2022 at 23:36 UTC
- **Last Updated**: August 02, 2024 at 23:55 UTC
- **Reserved Date**: March 29, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in QR Code Generator in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_29.html)
2. [](https://crbug.com/1291891)
3. [GLSA-202208-25](https://security.gentoo.org/glsa/202208-25) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5005, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5005 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5005
- **State**: PUBLISHED
- **Published Date**: November 08, 2015 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 06:32 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
CSPOC in IBM PowerHA SystemMirror on AIX 6.1 and 7.1 allows remote authenticated users to perform an "su root" action by leveraging presence on the cluster-wide password-change list.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://aix.software.ibm.com/aix/efixes/security/powerha_advisory.asc)
2. [IV76946](http://www-01.ibm.com/support/docview.wss?uid=isg1IV76946)
3. [76948](http://www.securityfocus.com/bid/76948)
4. [IV77007](http://www-01.ibm.com/support/docview.wss?uid=isg1IV77007)
5. [IV76943](http://www-01.ibm.com/support/docview.wss?uid=isg1IV76943) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18672, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18672 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18672
- **State**: PUBLISHED
- **Published Date**: July 23, 2019 at 16:11 UTC
- **Last Updated**: August 05, 2024 at 11:16 UTC
- **Reserved Date**: October 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board head contents" parameter, aka the adm/board_form_update.php bo_content_head parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gnuboard/gnuboard5/releases/tag/5.3.2.0)
2. [](https://github.com/gnuboard/gnuboard5/compare/15b2e73...2549172)
3. [](https://github.com/gnuboard/gnuboard5/commit/a45241f4bc46aee1ab2cc0749f6444b043681edf#diff-05e83ad5f4c0624ed6ff385aed1bf33b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3879, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3879
- **State**: PUBLISHED
- **Published Date**: November 29, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:24 UTC
- **Reserved Date**: November 29, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Softbiz Resource Repository Script 1.1 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) sbres_id parameter in (a) details_res.php, (b) refer_friend.php, and (c) report_link.php, and (2) the sbcat_id parameter in (d) showcats.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21136](http://www.osvdb.org/21136)
2. [17555](http://secunia.com/advisories/17555)
3. [ADV-2005-2617](http://www.vupen.com/english/advisories/2005/2617)
4. [21134](http://www.osvdb.org/21134)
5. [15585](http://www.securityfocus.com/bid/15585)
6. [](http://pridels0.blogspot.com/2005/11/softbiz-resource-repository-script-sql.html)
7. [softbiz-whds-multiple-sql-injection(23208)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23208)
8. [21135](http://www.osvdb.org/21135)
9. [21133](http://www.osvdb.org/21133) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2158
- **State**: PUBLISHED
- **Published Date**: May 02, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:05 UTC
- **Reserved Date**: February 25, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45720.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17450
- **State**: PUBLISHED
- **Published Date**: December 07, 2017 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 20:51 UTC
- **Reserved Date**: December 06, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [102110](http://www.securityfocus.com/bid/102110)
2. [USN-3617-1](https://usn.ubuntu.com/3617-1/)
3. [USN-3619-2](https://usn.ubuntu.com/3619-2/)
4. [DSA-4082](https://www.debian.org/security/2018/dsa-4082)
5. [USN-3617-3](https://usn.ubuntu.com/3617-3/)
6. [](https://lkml.org/lkml/2017/12/5/982)
7. [USN-3583-2](https://usn.ubuntu.com/3583-2/)
8. [SUSE-SU-2018:0011](http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html)
9. [USN-3632-1](https://usn.ubuntu.com/3632-1/)
10. [USN-3583-1](https://usn.ubuntu.com/3583-1/)
11. [DSA-4073](https://www.debian.org/security/2017/dsa-4073)
12. [USN-3617-2](https://usn.ubuntu.com/3617-2/)
13. [USN-3619-1](https://usn.ubuntu.com/3619-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7038, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7038
- **State**: PUBLISHED
- **Published Date**: December 11, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 07:36 UTC
- **Reserved Date**: September 16, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Buffer overflow in libc in Apple iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS before 2.1 allows remote attackers to execute arbitrary code via a crafted package, a different vulnerability than CVE-2015-7039.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT205635)
2. [](https://support.apple.com/HT205637)
3. [1034344](http://www.securitytracker.com/id/1034344)
4. [APPLE-SA-2015-12-08-4](http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html)
5. [APPLE-SA-2015-12-08-3](http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html)
6. [78719](http://www.securityfocus.com/bid/78719)
7. [APPLE-SA-2015-12-08-1](http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html)
8. [](https://support.apple.com/HT205641)
9. [](https://support.apple.com/HT205640)
10. [APPLE-SA-2015-12-08-2](http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8398, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8398 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8398
- **State**: PUBLISHED
- **Published Date**: January 12, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 02:20 UTC
- **Reserved Date**: October 05, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
Unauthenticated messages processed by the UE. Certain NAS messages are processed when no EPS security context exists in the UE. Product: Android. Versions: Kernel 3.18. Android ID: A-31548486. References: QC-CR#877705.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Kernel-3.10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-01-01.html)
2. [95227](http://www.securityfocus.com/bid/95227) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12787, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12787
- **State**: PUBLISHED
- **Published Date**: December 19, 2024 at 15:31 UTC
- **Last Updated**: December 19, 2024 at 16:16 UTC
- **Reserved Date**: December 19, 2024 at 08:31 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in 1000 Projects Attendance Tracking Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /student/check_student_login.php. The manipulation of the argument student_emailid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**1000 Projects - Attendance Tracking Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-288967 | 1000 Projects Attendance Tracking Management System check_student_login.php sql injection](https://vuldb.com/?id.288967)
2. [VDB-288967 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.288967)
3. [Submit #465082 | 1000 Projects Attendance Tracking Management System PHP & MySQL Project V1.0 SQL Injection](https://vuldb.com/?submit.465082)
4. [](https://github.com/AFK-cmd/CVE/issues/1)
5. [](https://1000projects.org/)
### Credits
- AFK-cmd (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42653, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42653
- **State**: PUBLISHED
- **Published Date**: November 01, 2023 at 09:08 UTC
- **Last Updated**: September 05, 2024 at 19:42 UTC
- **Reserved Date**: September 12, 2023 at 08:33 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In faceid service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000**
Affected versions:
- Android12/Android11/Android10 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1844, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1844
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: June 03, 2005 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-19858, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-19858 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-19858
- **State**: PUBLISHED
- **Published Date**: January 21, 2022 at 12:19 UTC
- **Last Updated**: August 04, 2024 at 14:15 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Platinum Upnp SDK through 1.2.0 has a directory traversal vulnerability. The attack could remote attack victim by sending http://ip:port/../privacy.avi URL to compromise a victim's privacy.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/plutinosoft/Platinum/issues/22)
2. [](https://github.com/plutinosoft/Platinum/commit/9a4ceaccb1585ec35c45fd8e2585538fff6a865e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34374, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34374
- **State**: PUBLISHED
- **Published Date**: June 30, 2021 at 10:24 UTC
- **Last Updated**: August 04, 2024 at 00:12 UTC
- **Reserved Date**: June 09, 2021 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
Trusty contains a vulnerability in command handlers where the length of input buffers is not verified. This vulnerability can cause memory corruption, which may lead to information disclosure, escalation of privileges, and denial of service.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H`
### Affected Products
**NVIDIA - NVIDIA Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX**
Affected versions:
- All Jetson Linux versions prior to r32.5.1 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5205) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26413, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26413 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26413
- **State**: PUBLISHED
- **Published Date**: April 11, 2022 at 12:00 UTC
- **Last Updated**: August 03, 2024 at 05:03 UTC
- **Reserved Date**: March 04, 2022 at 00:00 UTC
- **Assigned By**: Zyxel
### Vulnerability Description
A command injection vulnerability in the CGI program of Zyxel VMG3312-T20A firmware version 5.30(ABFX.5)C0 could allow a local authenticated attacker to execute arbitrary OS commands on a vulnerable device via a LAN interface.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Zyxel - VMG3312-T20A firmware**
Affected versions:
- V5.30(ABFX.5)C0 (Status: affected)
### References
1. [](https://www.zyxel.com/support/OS-command-injection-and-buffer-overflow-vulnerabilities-of-CPE-and-ONTs.shtml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3782, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3782 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3782
- **State**: PUBLISHED
- **Published Date**: July 19, 2023 at 20:57 UTC
- **Last Updated**: October 28, 2024 at 15:09 UTC
- **Reserved Date**: July 19, 2023 at 20:36 UTC
- **Assigned By**: JFROG
### Vulnerability Description
DoS of the OkHttp client when using a BrotliInterceptor and surfing to a malicious web server, or when an attacker can perform MitM to inject a Brotli zip-bomb into an HTTP response
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/square/okhttp/issues/7738)
2. [](https://research.jfrog.com/vulnerabilities/okhttp-client-brotli-dos/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0756, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0756
- **State**: PUBLISHED
- **Published Date**: June 14, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:28 UTC
- **Reserved Date**: March 17, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18056](http://secunia.com/advisories/18056)
2. [17073](http://secunia.com/advisories/17073)
3. [USN-137-1](https://usn.ubuntu.com/137-1/)
4. [13891](http://www.securityfocus.com/bid/13891)
5. [18059](http://secunia.com/advisories/18059)
6. [FLSA:157459-2](http://www.securityfocus.com/archive/1/428058/100/0/threaded)
7. [DSA-922](http://www.debian.org/security/2005/dsa-922)
8. [oval:org.mitre.oval:def:11119](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11119)
9. [DSA-921](http://www.debian.org/security/2005/dsa-921)
10. [RHSA-2005:514](http://www.redhat.com/support/errata/RHSA-2005-514.html)
11. [17002](http://secunia.com/advisories/17002)
12. [FLSA:157459-3](http://www.securityfocus.com/archive/1/427980/100/0/threaded)
13. [RHSA-2005:663](http://www.redhat.com/support/errata/RHSA-2005-663.html)
14. [ADV-2005-1878](http://www.vupen.com/english/advisories/2005/1878) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13895, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13895
- **State**: PUBLISHED
- **Published Date**: March 08, 2025 at 02:24 UTC
- **Last Updated**: March 10, 2025 at 16:00 UTC
- **Reserved Date**: February 20, 2025 at 16:13 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The The Code Snippets CPT plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.1.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**jtsternberg - Code Snippets CPT**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/65f521f4-1968-4c43-a3f0-b0f81632d7aa?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/code-snippets-cpt/trunk/lib/CodeSnippitButton.php#L201)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24485, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24485 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24485
- **State**: PUBLISHED
- **Published Date**: February 16, 2023 at 00:00 UTC
- **Last Updated**: March 19, 2025 at 14:18 UTC
- **Reserved Date**: January 24, 2023 at 00:00 UTC
- **Assigned By**: Citrix
### Vulnerability Description
Vulnerabilities have been identified that, collectively, allow a standard Windows user to perform operations as SYSTEM on the computer running Citrix Workspace app.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Citrix - Citrix Workspace App for Windows**
Affected versions:
- Citrix Workspace App versions (Status: affected)
### References
1. [](https://support.citrix.com/article/CTX477617/citrix-workspace-app-for-windows-security-bulletin-for-cve202324484-cve202324485) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22331
- **State**: PUBLISHED
- **Published Date**: February 06, 2024 at 16:15 UTC
- **Last Updated**: August 01, 2024 at 22:43 UTC
- **Reserved Date**: January 08, 2024 at 23:42 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.19, 7.1 through 7.1.2.15, 7.2 through 7.2.3.8, 7.3 through 7.3.2.3, and IBM UrbanCode Deploy (UCD) - IBM DevOps Deploy 8.0.0.0 could disclose sensitive user information when installing the Windows agent. IBM X-Force ID: 279971.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**IBM - UrbanCode Deploy **
Affected versions:
- 7.0 (Status: affected)
- 7.1 (Status: affected)
- 7.2 (Status: affected)
- 7.3 (Status: affected)
**IBM - DevOps Deploy**
Affected versions:
- 8.0.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7114131)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/279971) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42930, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42930 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42930
- **State**: PUBLISHED
- **Published Date**: October 28, 2024 at 00:00 UTC
- **Last Updated**: October 30, 2024 at 20:44 UTC
- **Reserved Date**: August 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PbootCMS 3.2.8 is vulnerable to URL Redirect.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.pbootcms.com/)
2. [](https://github.com/cyb3res3c/CVE-2024-42930/blob/main/CVE-2024-42930.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2366
- **State**: PUBLISHED
- **Published Date**: September 13, 2010 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 18:48 UTC
- **Reserved Date**: June 21, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVN#35605523](http://jvn.jp/en/jp/JVN35605523/index.html)
2. [43142](http://www.securityfocus.com/bid/43142)
3. [JVNDB-2010-000035](http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html)
4. [](http://www.futomi.com/library/info/2010/20100910.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19960, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19960 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19960
- **State**: PUBLISHED
- **Published Date**: December 07, 2018 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 18:44 UTC
- **Reserved Date**: December 07, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The debug_mode function in web/web.py in OnionShare through 1.3.1, when --debug is enabled, uses the /tmp/onionshare_server.log pathname for logging, which might allow local users to overwrite files or obtain sensitive information by using this pathname.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.debian.org/915859) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47100, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47100 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47100
- **State**: PUBLISHED
- **Published Date**: January 24, 2023 at 00:00 UTC
- **Last Updated**: April 02, 2025 at 15:18 UTC
- **Reserved Date**: December 12, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability in Sengled Smart bulb 0x0000024 allows attackers to arbitrarily perform a factory reset on the device via a crafted IEEE 802.15.4 frame.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/iot-sec23/IoT-CVE/blob/main/Sengled%20Smart%20Bulb%20Vulnerability%20Report.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28357
- **State**: PUBLISHED
- **Published Date**: April 13, 2021 at 19:33 UTC
- **Last Updated**: August 03, 2024 at 21:40 UTC
- **Reserved Date**: March 12, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Remote Procedure Call Runtime Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28357) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37830
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 03:57 UTC
- **Reserved Date**: June 10, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Outline <= v0.76.1 allows attackers to redirect a victim user to a malicious site via intercepting and changing the state cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-37830) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5663, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5663 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5663
- **State**: PUBLISHED
- **Published Date**: February 12, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 15:39 UTC
- **Reserved Date**: October 23, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via a crafted PDF file that calls an insecure JavaScript method in the EScript.api plug-in. NOTE: this issue might be subsumed by CVE-2008-0655.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA08-043A](http://www.us-cert.gov/cas/techalerts/TA08-043A.html)
2. [](http://www.adobe.com/support/security/bulletins/apsb08-13.html)
3. [ADV-2008-1966](http://www.vupen.com/english/advisories/2008/1966/references)
4. [20080208 Adobe Reader and Acrobat JavaScript Insecure Method Exposure Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=656)
5. [VU#140129](http://www.kb.cert.org/vuls/id/140129)
6. [](http://www.adobe.com/support/security/advisories/apsa08-01.html)
7. [239286](http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1)
8. [GLSA-200803-01](http://security.gentoo.org/glsa/glsa-200803-01.xml)
9. [oval:org.mitre.oval:def:9928](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9928)
10. [29065](http://secunia.com/advisories/29065)
11. [30840](http://secunia.com/advisories/30840)
12. [29205](http://secunia.com/advisories/29205)
13. [RHSA-2008:0144](http://www.redhat.com/support/errata/RHSA-2008-0144.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0703, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0703 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0703
- **State**: PUBLISHED
- **Published Date**: February 15, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:41 UTC
- **Reserved Date**: February 15, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in index.php in imageVue 16.1 has unknown impact, probably a cross-site scripting (XSS) vulnerability involving the query string that is not quoted when inserted into style and body tags, as demonstrated using a bgcol parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-0570](http://www.vupen.com/english/advisories/2006/0570)
2. [20061029 Re: imageVue16.1 upload vulnerability](http://www.securityfocus.com/archive/1/450047/100/100/threaded)
3. [20060211 imageVue16.1 upload vulnerability](http://www.securityfocus.com/archive/1/424745/30/0/threaded)
4. [18802](http://secunia.com/advisories/18802)
5. [20060719 Re: imageVue16.1 upload vulnerability](http://www.securityfocus.com/archive/1/440586/100/100/threaded)
6. [16594](http://www.securityfocus.com/bid/16594)
7. [429](http://securityreason.com/securityalert/429)
8. [imagevue-index-sql-injection(24642)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24642) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12347
- **State**: PUBLISHED
- **Published Date**: November 12, 2020 at 18:55 UTC
- **Last Updated**: August 04, 2024 at 11:56 UTC
- **Reserved Date**: April 28, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable escalation of privilege via network access.
### Affected Products
**n/a - Intel(R) Data Center Manager Console**
Affected versions:
- before version 3.6.2 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00430) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3887, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3887
- **State**: PUBLISHED
- **Published Date**: September 11, 2016 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 00:10 UTC
- **Reserved Date**: March 30, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
providers/settings/SettingsProvider.java in Android 7.0 before 2016-09-01 does not properly enforce the DISALLOW_CONFIG_VPN setting, which allows attackers to bypass an intended always-on VPN state via a crafted application, aka internal bug 29899712.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://android.googlesource.com/platform/frameworks/base/+/335702d106797bce8a88044783fa1fc1d5f751d0)
2. [](http://source.android.com/security/bulletin/2016-09-01.html)
3. [1036763](http://www.securitytracker.com/id/1036763)
4. [92872](http://www.securityfocus.com/bid/92872) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32000, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32000 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32000
- **State**: PUBLISHED
- **Published Date**: June 02, 2022 at 14:45 UTC
- **Last Updated**: August 03, 2024 at 07:32 UTC
- **Reserved Date**: May 31, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Badminton Center Management System v1.0 is vulnerable to SQL Injection via /bcms/admin/?page=service_transactions/manage_service_transaction&id=.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/badminton-center-management-system/SQLi-12.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20767
- **State**: PUBLISHED
- **Published Date**: August 18, 2021 at 05:36 UTC
- **Last Updated**: August 03, 2024 at 17:53 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in Full Text Search of Cybozu Garoon 4.0.0 to 5.0.2 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
### Affected Products
**Cybozu, Inc. - Cybozu Garoon**
Affected versions:
- 4.0.0 to 5.0.2 (Status: affected)
### References
1. [](https://cs.cybozu.co.jp/2021/007206.html)
2. [](https://jvn.jp/en/jp/JVN54794245/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-49284, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-49284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-49284
- **State**: PUBLISHED
- **Published Date**: June 06, 2025 at 12:53 UTC
- **Last Updated**: June 06, 2025 at 19:24 UTC
- **Reserved Date**: June 04, 2025 at 09:41 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in wp-buy WP Maintenance Mode & Site Under Construction allows Cross Site Request Forgery. This issue affects WP Maintenance Mode & Site Under Construction: from n/a through 4.3.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**wp-buy - WP Maintenance Mode & Site Under Construction**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-maintenance-mode-site-under-construction/vulnerability/wordpress-wp-maintenance-mode-site-under-construction-4-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Skalucy (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0596, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0596
- **State**: PUBLISHED
- **Published Date**: March 08, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 18:30 UTC
- **Reserved Date**: January 12, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [52365](http://www.securityfocus.com/bid/52365)
2. [79918](http://osvdb.org/79918)
3. [1026774](http://www.securitytracker.com/id?1026774)
4. [48377](http://secunia.com/advisories/48377)
5. [APPLE-SA-2012-03-12-1](http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html)
6. [apple-webkit-cve20120596-code-execution(73815)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73815)
7. [48274](http://secunia.com/advisories/48274)
8. [oval:org.mitre.oval:def:16974](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16974)
9. [APPLE-SA-2012-03-07-1](http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html)
10. [48288](http://secunia.com/advisories/48288)
11. [APPLE-SA-2012-03-07-2](http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0984
- **State**: PUBLISHED
- **Published Date**: April 15, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 04:57 UTC
- **Reserved Date**: March 19, 2009 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Database Vault component in Oracle Database 9.2.0.8DV, 10.2.0.4, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_SYS_SQL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [34461](http://www.securityfocus.com/bid/34461)
2. [34693](http://secunia.com/advisories/34693)
3. [TA09-105A](http://www.us-cert.gov/cas/techalerts/TA09-105A.html)
4. [](http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html)
5. [1022052](http://www.securitytracker.com/id?1022052) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15482, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15482 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15482
- **State**: PUBLISHED
- **Published Date**: August 26, 2020 at 15:44 UTC
- **Last Updated**: August 04, 2024 at 13:15 UTC
- **Reserved Date**: July 01, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Nescomed Multipara Monitor M1000 devices. The device enables an unencrypted TELNET service by default, with a blank password for the admin account. This allows an attacker to gain root access to the device over the local network.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.niscomed.com/multipara-monitor.html)
2. [](https://payatu.com/advisory/unauthenticated-telnet-service-in-niscomed-patient-monitor) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57231
- **State**: PUBLISHED
- **Published Date**: May 05, 2025 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 17:17 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_do_enr_pbc_wps function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yanggao017/vuln/blob/main/NETGEAR/RAX5/CI_4_apcli_do_enr_pbc_wps/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51585, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51585 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51585
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:15 UTC
- **Last Updated**: August 02, 2024 at 22:40 UTC
- **Reserved Date**: December 20, 2023 at 20:38 UTC
- **Assigned By**: zdi
### Vulnerability Description
Voltronic Power ViewPower USBCommEx shutdown Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. User interaction is required to exploit this vulnerability in that an administrator must trigger a shutdown operation.
The specific flaw exists within the shutdown method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22071.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Voltronic Power - ViewPower**
Affected versions:
- 1.04.21353 (Status: affected)
### References
1. [ZDI-23-1890](https://www.zerodayinitiative.com/advisories/ZDI-23-1890/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36841
- **State**: PUBLISHED
- **Published Date**: October 12, 2023 at 22:58 UTC
- **Last Updated**: September 18, 2024 at 18:01 UTC
- **Reserved Date**: June 27, 2023 at 16:17 UTC
- **Assigned By**: juniper
### Vulnerability Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows a unauthenticated network-based attacker to cause an infinite loop, resulting in a Denial of Service (DoS).
An attacker who sends malformed TCP traffic via an interface configured with PPPoE, causes an infinite loop on the respective PFE. This results in consuming all resources and a manual restart is needed to recover.
This issue affects interfaces with PPPoE configured and tcp-mss enabled.
This issue affects Juniper Networks Junos OS
* All versions prior to 20.4R3-S7;
* 21.1 version 21.1R1 and later versions;
* 21.2 versions prior to 21.2R3-S6;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S3;
* 22.1 versions prior to 22.1R3-S4;
* 22.2 versions prior to 22.2R3;
* 22.3 versions prior to 22.3R2-S2;
* 22.4 versions prior to 22.4R2;
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 0 (Status: affected)
- 21.1R1 (Status: affected)
- 21.2 (Status: affected)
- 21.3 (Status: affected)
- 21.4 (Status: affected)
- 22.1 (Status: affected)
- 22.2 (Status: affected)
- 22.3 (Status: affected)
- 22.4 (Status: affected)
### References
1. [](https://supportportal.juniper.net/JSA73172) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.