System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-7740, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-7740 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7740
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-3662, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-3662 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3662
- **State**: PUBLISHED
- **Published Date**: October 29, 2021 at 11:32 UTC
- **Last Updated**: August 03, 2024 at 17:01 UTC
- **Reserved Date**: July 23, 2021 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Certain HP Enterprise LaserJet and PageWide MFPs may be vulnerable to stored cross site scripting (XSS).
### Affected Products
**n/a - HP Enterprise LaserJet MFP; HP Enterprise PageWide MFPs; HP Digital Sender**
Affected versions:
- before 4.11.2.1 (Status: affected)
- before 5.3 (Status: affected)
### References
1. [](https://support.hp.com/us-en/document/ish_4577473-4577502-16/hpsbpi03744)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-34032, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-34032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34032
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 00:16 UTC
- **Last Updated**: August 12, 2024 at 20:08 UTC
- **Reserved Date**: April 29, 2024 at 17:56 UTC
- **Assigned By**: icscert
### Vulnerability Description
Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnerability that exists in the GetDIACloudList endpoint. An authenticated attacker can exploit this issue to potentially compromise the system on which DIAEnergie is deployed.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Delta Electronics - DIAEnergie **
Affected versions:
- 1.10.00.005 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-02)
### Credits
- Michael Heinzl reported these vulnerabilities to CISA.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-41559, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-41559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41559
- **State**: PUBLISHED
- **Published Date**: June 28, 2022 at 21:27 UTC
- **Last Updated**: August 04, 2024 at 03:15 UTC
- **Reserved Date**: September 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Silverstripe silverstripe/framework 4.8.1 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.silverstripe.org/download/security-releases/)
2. [](https://github.com/silverstripe/silverstripe-framework/releases)
3. [](https://www.silverstripe.org/download/security-releases/cve-2021-41559)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-32786, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-32786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32786
- **State**: PUBLISHED
- **Published Date**: October 20, 2023 at 00:00 UTC
- **Last Updated**: September 12, 2024 at 17:54 UTC
- **Reserved Date**: May 15, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Langchain through 0.0.155, prompt injection allows an attacker to force the service to retrieve data from an arbitrary URL, essentially providing SSRF and potentially injecting content into downstream tasks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/rharang/d265f46fc3161b31ac2e81db44d662e1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-20172, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-20172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20172
- **State**: PUBLISHED
- **Published Date**: December 31, 2019 at 02:50 UTC
- **Last Updated**: August 05, 2024 at 02:39 UTC
- **Reserved Date**: December 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Kernel/VM/MemoryManager.cpp in SerenityOS before 2019-12-30 does not reject syscalls with pointers into the kernel-only virtual address space, which allows local users to gain privileges by overwriting a return address that was found on the kernel stack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/SerenityOS/serenity/commit/0fc24fe2564736689859e7edfa177a86dac36bf9)
2. [](https://github.com/Fire30/CTF-WRITEUPS/tree/master/36c3_ctf/wisdom)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-49502, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-49502 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49502
- **State**: PUBLISHED
- **Published Date**: November 28, 2024 at 09:26 UTC
- **Last Updated**: November 28, 2024 at 12:25 UTC
- **Reserved Date**: October 15, 2024 at 13:20 UTC
- **Assigned By**: suse
### Vulnerability Description
A Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in the Setup Wizard, HTTP Proxy credentials pane in spacewalk-web allows attackers to attack users by providing specially crafted URLs to click.
This issue affects Container suse/manager/5.0/x86_64/server:5.0.2.7.8.1: before 5.0.15-150600.3.10.2; SUSE Manager Server Module 4.3: before 4.3.42-150400.3.52.1.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SUSE - Container suse/manager/5.0/x86_64/server:5.0.2.7.8.1**
Affected versions:
- 0 (Status: affected)
**SUSE - SUSE Manager Server Module 4.3**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-49502)
### Credits
- Paolo Perego of SUSE
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2002-0210, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2002-0210 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0210
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
setlicense for TOLIS Group Backup and Restore Utility (BRU) 17.0 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/brutest.$$ temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3970](http://www.securityfocus.com/bid/3970)
2. [20020126 bru backup program](http://online.securityfocus.com/archive/1/252614)
3. [bru-tmp-file-symlink(8003)](http://www.iss.net/security_center/static/8003.php)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-4643, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-4643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4643
- **State**: PUBLISHED
- **Published Date**: February 15, 2010 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 04:03 UTC
- **Reserved Date**: February 15, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in dsInstallerService.dll in the Juniper Installer Service, as used in Juniper Odyssey Access Client 4.72.11421.0 and other products, allows remote attackers to execute arbitrary code via a long string in a malformed DSSETUPSERVICE_CMD_UNINSTALL command to the NeoterisSetupService named pipe.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2009-10-540&viewMode=view)
2. [20091203 Juniper Installer Service Stack Buffer Overflow Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=850)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-0085, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-0085 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0085
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 04, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-25719, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-25719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25719
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 15:40 UTC
- **Reserved Date**: September 16, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found within. The result could include total domain compromise.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**n/a - samba**
Affected versions:
- samba 4.15.2, samba 4.14.10, samba 4.13.14 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2019732)
2. [](https://www.samba.org/samba/security/CVE-2020-25719.html)
3. [GLSA-202309-06](https://security.gentoo.org/glsa/202309-06)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2003-0488, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2003-0488 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0488
- **State**: PUBLISHED
- **Published Date**: June 28, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:58 UTC
- **Reserved Date**: June 27, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Kerio MailServer 5.6.3 allow remote attackers to insert arbitrary web script via (1) the add_name parameter in the add_acl module, or (2) the alias parameter in the do_map module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7968](http://www.securityfocus.com/bid/7968)
2. [](http://nautopia.org/vulnerabilidades/kerio_mailserver.htm)
3. [7966](http://www.securityfocus.com/bid/7966)
4. [20030618 Multiple buffer overflows and XSS in Kerio MailServer](http://marc.info/?l=bugtraq&m=105596982503760&w=2)
5. [kerio-multiple-modules-xss(12367)](https://exchange.xforce.ibmcloud.com/vulnerabilities/12367)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-31802, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-31802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31802
- **State**: PUBLISHED
- **Published Date**: June 24, 2022 at 07:46 UTC
- **Last Updated**: September 17, 2024 at 00:32 UTC
- **Reserved Date**: May 30, 2022 at 00:00 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
In CODESYS Gateway Server V2 for versions prior to V2.3.9.38 only a part of the the specified password is been compared to the real CODESYS Gateway password. An attacker may perform authentication by specifying a small password that matches the corresponding part of the longer real CODESYS Gateway password.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-187: Security Weakness
### Affected Products
**CODESYS - CODESYS Gateway Server V2**
Affected versions:
- V2 (Status: affected)
### References
1. [](https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17141&token=17867e35cfd30c77ba0137f9a17b3a557a4b7b66&download=)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-39791, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-39791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39791
- **State**: PUBLISHED
- **Published Date**: March 30, 2022 at 16:02 UTC
- **Last Updated**: August 04, 2024 at 02:20 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In WallpaperManagerService, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-194112606
### Affected Products
**n/a - Android**
Affected versions:
- Android-12L (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-12l)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-12552, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-12552 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12552
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: June 18, 2018 at 00:00 UTC
- **Assigned By**: eclipse
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-3999, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-3999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3999
- **State**: PUBLISHED
- **Published Date**: September 05, 2007 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 14:37 UTC
- **Reserved Date**: July 25, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-200709-01](http://www.gentoo.org/security/en/glsa/glsa-200709-01.xml)
2. [FEDORA-2007-2017](https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00087.html)
3. [20070912 ZDI-07-052: Multiple Kerberos Implementations Authentication Context Stack Overflow Vulnerability](http://www.securityfocus.com/archive/1/479251/100/0/threaded)
4. [26713](http://secunia.com/advisories/26713)
5. [26822](http://secunia.com/advisories/26822)
6. [27043](http://secunia.com/advisories/27043)
7. [ADV-2008-0803](http://www.vupen.com/english/advisories/2008/0803/references)
8. [26699](http://secunia.com/advisories/26699)
9. [SUSE-SR:2007:019](http://www.novell.com/linux/security/advisories/2007_19_sr.html)
10. [ADV-2007-3060](http://www.vupen.com/english/advisories/2007/3060)
11. [26680](http://secunia.com/advisories/26680)
12. [26783](http://secunia.com/advisories/26783)
13. [1018647](http://www.securitytracker.com/id?1018647)
14. [26444](http://www.securityfocus.com/bid/26444)
15. [ADV-2007-3051](http://www.vupen.com/english/advisories/2007/3051)
16. [27756](http://secunia.com/advisories/27756)
17. [26684](http://secunia.com/advisories/26684)
18. [DSA-1367](http://www.debian.org/security/2007/dsa-1367)
19. [RHSA-2007:0951](http://www.redhat.com/support/errata/RHSA-2007-0951.html)
20. [26728](http://secunia.com/advisories/26728)
21. [26700](http://secunia.com/advisories/26700)
22. [oval:org.mitre.oval:def:3162](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3162)
23. [](https://bugzilla.redhat.com/show_bug.cgi?id=250973)
24. [26987](http://secunia.com/advisories/26987)
25. [2007-0026](http://www.trustix.org/errata/2007/0026/)
26. [26676](http://secunia.com/advisories/26676)
27. [oval:org.mitre.oval:def:9379](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9379)
28. [APPLE-SA-2007-11-14](http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html)
29. [](http://docs.info.apple.com/article.html?artnum=307041)
30. [USN-511-1](http://www.ubuntu.com/usn/usn-511-1)
31. [27081](http://secunia.com/advisories/27081)
32. [20070906 rPSA-2007-0179-1 krb5 krb5-server krb5-services krb5-test krb5-workstation](http://www.securityfocus.com/archive/1/478748/100/0/threaded)
33. [SUSE-SR:2007:024](http://www.novell.com/linux/security/advisories/2007_24_sr.html)
34. [29270](http://secunia.com/advisories/29270)
35. [FEDORA-2008-1017](https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00173.html)
36. [201319](http://sunsolve.sun.com/search/document.do?assetkey=1-66-201319-1)
37. [ADV-2007-3868](http://www.vupen.com/english/advisories/2007/3868)
38. [GLSA-200710-01](http://security.gentoo.org/glsa/glsa-200710-01.xml)
39. [RHSA-2007:0913](http://www.redhat.com/support/errata/RHSA-2007-0913.html)
40. [[security-announce] 20070906 rPSA-2007-0179-2 krb5 krb5-server krb5-services krb5-test krb5-workstation](http://lists.rpath.com/pipermail/security-announce/2007-September/000237.html)
41. [DSA-1368](http://www.debian.org/security/2007/dsa-1368)
42. [RHSA-2007:0858](http://www.redhat.com/support/errata/RHSA-2007-0858.html)
43. [MDKSA-2007:181](http://www.mandriva.com/security/advisories?name=MDKSA-2007:181)
44. [](http://www.zerodayinitiative.com/advisories/ZDI-07-052.html)
45. [26691](http://secunia.com/advisories/26691)
46. [26896](http://secunia.com/advisories/26896)
47. [](http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-006.txt)
48. [26697](http://secunia.com/advisories/26697)
49. [27146](http://secunia.com/advisories/27146)
50. [VU#883632](http://www.kb.cert.org/vuls/id/883632)
51. [27643](http://secunia.com/advisories/27643)
52. [ADV-2007-3052](http://www.vupen.com/english/advisories/2007/3052)
53. [kerberos-rpcsecgss-bo(36437)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36437)
54. [25534](http://www.securityfocus.com/bid/25534)
55. [TA07-319A](http://www.us-cert.gov/cas/techalerts/TA07-319A.html)
56. [26705](http://secunia.com/advisories/26705)
57. [3092](http://securityreason.com/securityalert/3092)
58. [](http://support.avaya.com/elmodocs2/security/ASA-2007-396.htm)
59. [26792](http://secunia.com/advisories/26792)
60. [29247](http://secunia.com/advisories/29247)
61. [103060](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103060-1)
62. [MDKSA-2007:174](http://www.mandriva.com/security/advisories?name=MDKSA-2007:174)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-47686, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-47686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47686
- **State**: PUBLISHED
- **Published Date**: November 16, 2023 at 22:44 UTC
- **Last Updated**: August 12, 2024 at 14:10 UTC
- **Reserved Date**: November 08, 2023 at 16:08 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Kiboko Labs Arigato Autoresponder and Newsletter plugin <= 2.7.2.2 versions.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Kiboko Labs - Arigato Autoresponder and Newsletter**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/bft-autoresponder/wordpress-arigato-autoresponder-and-newsletter-plugin-2-7-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-4891, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-4891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4891
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 16:09 UTC
- **Last Updated**: August 08, 2024 at 00:01 UTC
- **Reserved Date**: December 19, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Simple Machine Forum (SMF) versions 1.0.4 and earlier have an SQL injection vulnerability that allows remote attackers to inject arbitrary SQL statements.
### Affected Products
**Simple Machine Forum - Simple Machine Forum**
Affected versions:
- 1.0.4 and earlier (Status: affected)
### References
1. [](http://www.openwall.com/lists/oss-security/2012/11/14/10)
2. [](https://securiteam.com/exploits/5HP0N0KG0O/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-41132, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-41132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41132
- **State**: PUBLISHED
- **Published Date**: July 22, 2024 at 14:28 UTC
- **Last Updated**: August 02, 2024 at 04:46 UTC
- **Reserved Date**: July 15, 2024 at 15:53 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
ImageSharp is a 2D graphics API. A vulnerability discovered in the ImageSharp library, where the processing of specially crafted files can lead to excessive memory usage in the Gif decoder. The vulnerability is triggered when ImageSharp attempts to process image files that are designed to exploit this flaw. All users are advised to upgrade to v3.1.5 or v2.1.9.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-789: OS Command Injection
### Affected Products
**SixLabors - ImageSharp**
Affected versions:
- < 2.1.9 (Status: affected)
- >= 3.0.0, < 3.1.5 (Status: affected)
### References
1. [https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-qxrv-gp6x-rc23](https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-qxrv-gp6x-rc23)
2. [https://github.com/SixLabors/ImageSharp/pull/2759](https://github.com/SixLabors/ImageSharp/pull/2759)
3. [https://github.com/SixLabors/ImageSharp/pull/2764](https://github.com/SixLabors/ImageSharp/pull/2764)
4. [https://github.com/SixLabors/ImageSharp/pull/2770](https://github.com/SixLabors/ImageSharp/pull/2770)
5. [https://github.com/SixLabors/ImageSharp/commit/59de13c8cc47f2b402e2c43aa7024511d029d515](https://github.com/SixLabors/ImageSharp/commit/59de13c8cc47f2b402e2c43aa7024511d029d515)
6. [https://github.com/SixLabors/ImageSharp/commit/9816ca45016c5d3859986f3c600e8934bc450a56](https://github.com/SixLabors/ImageSharp/commit/9816ca45016c5d3859986f3c600e8934bc450a56)
7. [https://github.com/SixLabors/ImageSharp/commit/b496109051cc39feee1f6cde48fca6481de17f9a](https://github.com/SixLabors/ImageSharp/commit/b496109051cc39feee1f6cde48fca6481de17f9a)
8. [https://docs.sixlabors.com/articles/imagesharp.web/processingcommands.html#securing-processing-commands](https://docs.sixlabors.com/articles/imagesharp.web/processingcommands.html#securing-processing-commands)
9. [https://docs.sixlabors.com/articles/imagesharp/security.html](https://docs.sixlabors.com/articles/imagesharp/security.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-34459, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-34459 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34459
- **State**: PUBLISHED
- **Published Date**: July 16, 2021 at 20:19 UTC
- **Last Updated**: November 19, 2024 at 14:33 UTC
- **Reserved Date**: June 09, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows AppContainer Elevation Of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34459)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-7715, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-7715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7715
- **State**: PUBLISHED
- **Published Date**: October 18, 2017 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 07:58 UTC
- **Reserved Date**: October 06, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the Realtyna RPL (com_rpl) component before 8.9.5 for Joomla! allows remote attackers to hijack the authentication of administrators for requests that add a user via an add_user action to administrator/index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5271.php)
2. [38528](https://www.exploit-db.com/exploits/38528/)
3. [](http://rpl.realtyna.com/change-logs/rpl7-changelog)
4. [](http://packetstormsecurity.com/files/134067/Realtyna-RPL-8.9.2-CSRF-Cross-Site-Scripting.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-3637, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-3637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3637
- **State**: PUBLISHED
- **Published Date**: October 21, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 13:24 UTC
- **Reserved Date**: October 21, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function jlink_init of the file monitor/jlink.c of the component BlueZ. The manipulation leads to denial of service. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211936.
### CVSS Metrics
- **CVSS Base Score**: 2.6/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-404: Security Weakness
### Affected Products
**Linux - Kernel**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=1d6cfb8e625a944010956714c1802bc1e1fc6c4f)
2. [](https://vuldb.com/?id.211936)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-2675, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-2675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2675
- **State**: PUBLISHED
- **Published Date**: March 19, 2018 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 10:21 UTC
- **Reserved Date**: March 30, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in inc/AdminPage.php in the WP HTML Sitemap plugin 1.2 for WordPress allows remote attackers to hijack the authentication of administrators for requests that delete the sitemap via a request to the wp-html-sitemap page in wp-admin/options-general.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.dxw.com/advisories/csrf-vulnerability-in-wp-html-sitemap-1-2/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-6757, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-6757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6757
- **State**: PUBLISHED
- **Published Date**: December 13, 2023 at 14:00 UTC
- **Last Updated**: May 22, 2025 at 18:14 UTC
- **Reserved Date**: December 13, 2023 at 07:39 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Thecosy IceCMS 2.0.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /adplanet/PlanetUser of the component API. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247885 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Thecosy - IceCMS**
Affected versions:
- 2.0.1 (Status: affected)
### References
1. [](https://vuldb.com/?id.247885)
2. [](https://vuldb.com/?ctiid.247885)
3. [](http://124.71.147.32:8082/IceCMS3.html)
### Credits
- YuJiu (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-25372, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-25372 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25372
- **State**: PUBLISHED
- **Published Date**: March 25, 2025 at 00:00 UTC
- **Last Updated**: March 26, 2025 at 13:58 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NASA cFS (Core Flight System) Aquila is vulnerable to segmentation fault via sending a malicious telecommand to the Memory Management Module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-40143, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-40143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40143
- **State**: PUBLISHED
- **Published Date**: February 06, 2024 at 21:51 UTC
- **Last Updated**: August 02, 2024 at 18:24 UTC
- **Reserved Date**: October 12, 2023 at 20:21 UTC
- **Assigned By**: icscert
### Vulnerability Description
An attacker with access to the Westermo Lynx web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "forward.0.domain" parameter.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Westermo - Lynx**
Affected versions:
- L206-F2G1 (Status: affected)
- 4.24 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-023-04)
### Credits
- Aarón Flecha Menéndez, Iván Alonso Álvarez and Víctor Bello Cuevas reported these vulnerabilities to CISA.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-10097, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-10097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10097
- **State**: PUBLISHED
- **Published Date**: November 05, 2024 at 06:42 UTC
- **Last Updated**: February 19, 2025 at 17:41 UTC
- **Reserved Date**: October 17, 2024 at 17:04 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Loginizer Security and Loginizer plugins for WordPress are vulnerable to authentication bypass in all versions up to, and including, 1.9.2. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Softaculous - Loginizer Security**
Affected versions:
- * (Status: affected)
**softaculous - Loginizer**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5db00b22-d766-4fde-86fe-98d90936028c?source=cve)
2. [](https://loginizer.com/)
3. [](https://plugins.trac.wordpress.org/browser/loginizer/trunk/main/social-login.php?rev=3108779#L127)
4. [](https://plugins.trac.wordpress.org/changeset/3173657/)
### Credits
- wesley
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-0648, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-0648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0648
- **State**: PUBLISHED
- **Published Date**: January 16, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 09:20 UTC
- **Reserved Date**: January 02, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The RMI interface in Cisco Secure Access Control System (ACS) 5.x before 5.5 does not properly enforce authentication and authorization requirements, which allows remote attackers to obtain administrative access via a request to this interface, aka Bug ID CSCud75187.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [64962](http://www.securityfocus.com/bid/64962)
2. [56213](http://secunia.com/advisories/56213)
3. [cisco-acs-cve20140648-unauth-access(90431)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90431)
4. [102117](http://osvdb.org/102117)
5. [1029634](http://www.securitytracker.com/id/1029634)
6. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=32379)
7. [20140115 Multiple Vulnerabilities in Cisco Secure Access Control System](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140115-csacs)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-15340, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-15340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15340
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 19:50 UTC
- **Reserved Date**: October 14, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei smartphones with software of TAG-AL00C92B168 have an information disclosure vulnerability. An attacker tricks the user to install a crafted application, this application simulate click action to back up data in a non-encrypted way using an Android assist function. Successful exploit could result in information disclosure.
### Affected Products
**Huawei Technologies Co., Ltd. - TAG-AL00**
Affected versions:
- TAG-AL00C92B168 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171213-05-smartphone-en)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-0245, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-0245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0245
- **State**: PUBLISHED
- **Published Date**: September 18, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: March 19, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Index Server 2.0 in Windows NT 4.0, and Indexing Service in Windows 2000, allows remote attackers to read server-side include files via a malformed search request, aka a new variant of the "Malformed Hit-Highlighting" vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS01-025](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-025)
2. [win-indexserver-view-files(6518)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6518)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-1092, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-1092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1092
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 15:39 UTC
- **Last Updated**: February 19, 2025 at 16:49 UTC
- **Reserved Date**: February 28, 2023 at 14:30 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The OAuth Single Sign On Free WordPress plugin before 6.24.2, OAuth Single Sign On Standard WordPress plugin before 28.4.9, OAuth Single Sign On Premium WordPress plugin before 38.4.9 and OAuth Single Sign On Enterprise WordPress plugin before 48.4.9 do not have CSRF checks when deleting Identity Providers (IdP), which could allow attackers to make logged in admins delete arbitrary IdP via a CSRF attack
### Weakness Classification (CWE)
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**MiniOrange - OAuth Single Sign On Free**
Affected versions:
- 0 (Status: affected)
**MiniOrange - OAuth Single Sign On Standard**
Affected versions:
- 0 (Status: affected)
**MiniOrange - OAuth Single Sign On Premium**
Affected versions:
- 0 (Status: affected)
**MiniOrange - OAuth Single Sign On Enterprise**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/8fbf7efe-0bf2-42c6-aef1-7fcf2708b31b)
2. [](https://wpscan.com/vulnerability/f6e165d9-2193-4c76-ae2d-618a739fe4fb)
3. [](https://wpscan.com/vulnerability/52e29f16-b6dd-4132-9bb8-ad10bd3c39d7)
4. [](https://wpscan.com/vulnerability/5eb85df5-8aab-4f30-a401-f776a310b09c)
### Credits
- Nguyen Thuc Tuyen
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-24303, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-24303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24303
- **State**: PUBLISHED
- **Published Date**: March 28, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 04:07 UTC
- **Reserved Date**: February 02, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/python-pillow/Pillow/pull/3450)
2. [](https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security)
3. [FEDORA-2022-ee15b98ea1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W4ZUXPKEX72O3E5IHBPVY5ZCPMJ4GHHV/)
4. [FEDORA-2022-64332f2a7c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XR6UP2XONXOVXI4446VY72R63YRO2YTP/)
5. [GLSA-202211-10](https://security.gentoo.org/glsa/202211-10)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-5878, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-5878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5878
- **State**: PUBLISHED
- **Published Date**: February 06, 2025 at 14:10 UTC
- **Last Updated**: February 18, 2025 at 18:13 UTC
- **Reserved Date**: October 31, 2023 at 13:16 UTC
- **Assigned By**: Honeywell
### Vulnerability Description
Honeywell OneWireless
Wireless Device Manager (WDM) for the following versions R310.x, R320.x, R321.x, R322.1, R322.2, R323.x, R330.1 contains a command injection vulnerability. An attacker who is authenticated could use the firmware update process to potentially exploit the vulnerability, leading to a command injection. Honeywell recommends updating to
R322.3, R330.2 or the most recent version of this product2.
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Honeywell - OneWireless Network Wireless Device Manager**
Affected versions:
- 310.1 (Status: affected)
- 323.1 (Status: affected)
### References
1. [](https://process.honeywell.com/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-0918, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-0918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0918
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 14:04 UTC
- **Last Updated**: February 13, 2025 at 16:28 UTC
- **Reserved Date**: March 10, 2022 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over a TCP connection, no bind or other authentication is required. The message triggers a segmentation fault that results in slapd crashing.
### Affected Products
**n/a - 389-ds-base**
Affected versions:
- 1.4 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2055815)
2. [](https://access.redhat.com/security/cve/CVE-2022-0918)
3. [](https://github.com/389ds/389-ds-base/issues/5242)
4. [](https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-20421, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-20421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20421
- **State**: PUBLISHED
- **Published Date**: October 16, 2024 at 16:15 UTC
- **Last Updated**: October 31, 2024 at 13:49 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L`
### Affected Products
**Cisco - Cisco Analog Telephone Adaptor (ATA) Software**
Affected versions:
- 12.0.1 SR2 (Status: affected)
- 11.1.0 (Status: affected)
- 12.0.1 SR1 (Status: affected)
- 11.1.0 MSR1 (Status: affected)
- 12.0.1 (Status: affected)
- 11.1.0 MSR2 (Status: affected)
- 11.1.0 MSR3 (Status: affected)
- 11.1.0 MSR4 (Status: affected)
- 12.0.1 SR3 (Status: affected)
- 11.2.1 (Status: affected)
- 12.0.1 SR4 (Status: affected)
- 11.2.2 (Status: affected)
- 11.2.2 MSR1 (Status: affected)
- 12.0.1 SR5 (Status: affected)
- 11.2.3 (Status: affected)
- 11.2.4 (Status: affected)
### References
1. [cisco-sa-ata19x-multi-RDTEqRsy](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-26395, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-26395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26395
- **State**: PUBLISHED
- **Published Date**: April 12, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:07 UTC
- **Reserved Date**: February 22, 2023 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb23-24.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-2046, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-2046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2046
- **State**: PUBLISHED
- **Published Date**: June 22, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:15 UTC
- **Reserved Date**: June 22, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in DUware DUamazon Pro 3.0 and 3.1 allow remote attackers to execute arbitrary SQL commands via the (1) iCat parameter to cat.asp, (2) iSub parameter to sub.asp, (3) iSub parameter to detail.asp, (4) iPro parameter to review.asp, iCat parameter to (5) catEdit.asp, (6) catDelete.asp, (7) productEdit.asp, or (8) productDelete.asp, or (9) iType parameter to type.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050622 [ECHO_ADV_19$2005] Multiple SQL INJECTION in DUWARE Products](http://marc.info/?l=bugtraq&m=111945219205114&w=2)
2. [](http://echo.or.id/adv/adv19-theday-2005.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-39351, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-39351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-39351
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 16:30 UTC
- **Last Updated**: May 19, 2025 at 16:58 UTC
- **Reserved Date**: April 16, 2025 at 06:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Restaurant WordPress allows Cross Site Request Forgery.This issue affects Grand Restaurant WordPress: from n/a through 7.0.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**ThemeGoods - Grand Restaurant WordPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/theme/grandrestaurant/vulnerability/wordpress-grand-restaurant-wordpress-theme-7-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Ananda Dhakal (Patchstack)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-21450, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-21450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21450
- **State**: PUBLISHED
- **Published Date**: February 09, 2023 at 00:00 UTC
- **Last Updated**: March 24, 2025 at 19:05 UTC
- **Reserved Date**: November 14, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Missing Authorization vulnerability in One Hand Operation + prior to version 6.1.21 allows multi-users to access owner's widget without authorization via gesture setting.
### CVSS Metrics
- **CVSS Base Score**: 2.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Samsung Mobile - One Hand Operation +**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=02)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-3967, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-3967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3967
- **State**: PUBLISHED
- **Published Date**: June 05, 2014 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 10:57 UTC
- **Reserved Date**: June 04, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The HVMOP_inject_msi function in Xen 4.2.x, 4.3.x, and 4.4.x does not properly check the return value from the IRQ setup check, which allows local HVM guest administrators to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201504-04](https://security.gentoo.org/glsa/201504-04)
2. [](http://xenbits.xen.org/xsa/advisory-96.html)
3. [openSUSE-SU-2014:1281](http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html)
4. [openSUSE-SU-2014:1279](http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html)
5. [FEDORA-2014-7423](http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134710.html)
6. [FEDORA-2014-7408](http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134739.html)
7. [1030322](http://www.securitytracker.com/id/1030322)
8. [67794](http://www.securityfocus.com/bid/67794)
9. [[oss-security] 20140604 Re: Xen Security Advisory 96 - Vulnerabilities in HVM MSI injection](http://www.openwall.com/lists/oss-security/2014/06/04/13)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-2925, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-2925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2925
- **State**: PUBLISHED
- **Published Date**: September 09, 2022 at 05:25 UTC
- **Last Updated**: August 03, 2024 at 00:52 UTC
- **Reserved Date**: August 22, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository appwrite/appwrite prior to 1.0.0-RC1.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**appwrite - appwrite/appwrite**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/a3b4148f-165f-4583-abed-5568696d99dc)
2. [](https://github.com/appwrite/appwrite/commit/b5b4d92623c13fa8e5c71736db461e81fb7a7ade)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-6807, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-6807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6807
- **State**: PUBLISHED
- **Published Date**: September 04, 2015 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 23:20 UTC
- **Reserved Date**: September 04, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Mass Contact module 6.x-1.x before 6.x-1.6 and 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the "administer mass contact" permission to inject arbitrary web script or HTML via a category label.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2561695)
2. [](https://www.drupal.org/node/2561951)
3. [](https://www.drupal.org/node/2561699)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10413, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10413 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10413
- **State**: REJECTED
- **Published Date**: August 30, 2019 at 15:15 UTC
- **Last Updated**: August 30, 2019 at 15:15 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-0476, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-0476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0476
- **State**: PUBLISHED
- **Published Date**: April 14, 2010 at 15:44 UTC
- **Last Updated**: August 07, 2024 at 00:52 UTC
- **Reserved Date**: February 02, 2010 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The SMB client in Microsoft Windows Server 2003 SP2, Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2 allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and reboot) via a crafted SMB transaction response that uses (1) SMBv1 or (2) SMBv2, aka "SMB Client Response Parsing Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39336](http://www.securityfocus.com/bid/39336)
2. [39372](http://secunia.com/advisories/39372)
3. [MS10-020](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-020)
4. [oval:org.mitre.oval:def:6918](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6918)
5. [TA10-103A](http://www.us-cert.gov/cas/techalerts/TA10-103A.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-2729, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-2729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2729
- **State**: PUBLISHED
- **Published Date**: August 15, 2011 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 23:08 UTC
- **Reserved Date**: July 11, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [tomcat-jsvc-info-disclosure(69161)](https://exchange.xforce.ibmcloud.com/vulnerabilities/69161)
2. [openSUSE-SU-2011:1062](http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00024.html)
3. [](http://svn.apache.org/viewvc?view=revision&revision=1153824)
4. [HPSBUX02860](http://marc.info/?l=bugtraq&m=136485229118404&w=2)
5. [1025925](http://securitytracker.com/id?1025925)
6. [](http://people.apache.org/~markt/patches/2011-08-12-cve2011-2729-tc5.patch)
7. [](http://tomcat.apache.org/security-7.html)
8. [HPSBOV02762](http://marc.info/?l=bugtraq&m=133469267822771&w=2)
9. [](https://bugzilla.redhat.com/show_bug.cgi?id=730400)
10. [RHSA-2011:1291](http://www.redhat.com/support/errata/RHSA-2011-1291.html)
11. [SSRT100627](http://marc.info/?l=bugtraq&m=132215163318824&w=2)
12. [](http://svn.apache.org/viewvc?view=revision&revision=1152701)
13. [](http://svn.apache.org/viewvc?view=revision&revision=1153379)
14. [20110812 [SECURITY] CVE-2011-2729: Commons Daemon fails to drop capabilities (Apache Tomcat)](http://www.securityfocus.com/archive/1/519263/100/0/threaded)
15. [](http://tomcat.apache.org/security-6.html)
16. [57126](http://secunia.com/advisories/57126)
17. [[commons-dev] 20110812 [AANNOUNCE] Apache Commons Daemon 1.0.7 released](http://mail-archives.apache.org/mod_mbox/commons-dev/201108.mbox/%3C4E451B2B.9090108%40apache.org%3E)
18. [](https://issues.apache.org/jira/browse/DAEMON-214)
19. [49143](http://www.securityfocus.com/bid/49143)
20. [oval:org.mitre.oval:def:19450](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19450)
21. [SSRT100825](http://marc.info/?l=bugtraq&m=133469267822771&w=2)
22. [46030](http://secunia.com/advisories/46030)
23. [](http://tomcat.apache.org/security-5.html)
24. [HPSBUX02725](http://marc.info/?l=bugtraq&m=132215163318824&w=2)
25. [RHSA-2011:1292](http://www.redhat.com/support/errata/RHSA-2011-1292.html)
26. [SSRT101146](http://marc.info/?l=bugtraq&m=136485229118404&w=2)
27. [[tomcat-announce] 20110812 [SECURITY] CVE-2011-2729: Commons Daemon fails to drop capabilities (Apache Tomcat)](http://mail-archives.apache.org/mod_mbox/tomcat-announce/201108.mbox/%3C4E45221D.1020306%40apache.org%3E)
28. [HPSBST02955](http://marc.info/?l=bugtraq&m=139344343412337&w=2)
29. [oval:org.mitre.oval:def:14743](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14743)
30. [[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E)
31. [[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E)
32. [[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E)
33. [[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-25623, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-25623 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25623
- **State**: PUBLISHED
- **Published Date**: February 19, 2024 at 15:28 UTC
- **Last Updated**: August 01, 2024 at 23:44 UTC
- **Reserved Date**: February 08, 2024 at 22:26 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Mastodon is a free, open-source social network server based on ActivityPub. Prior to versions 4.2.7, 4.1.15, 4.0.15, and 3.5.19, when fetching remote statuses, Mastodon doesn't check that the response from the remote server has a `Content-Type` header value of the Activity Streams media type, which allows a threat actor to upload a crafted Activity Streams document to a remote server and make a Mastodon server fetch it, if the remote server accepts arbitrary user uploads. The vulnerability allows a threat actor to impersonate an account on a remote server that satisfies all of the following properties: allows the attacker to register an account; accepts arbitrary user-uploaded documents and places them on the same domain as the ActivityPub actors; and serves user-uploaded document in response to requests with an `Accept` header value of the Activity Streams media type. Versions 4.2.7, 4.1.15, 4.0.15, and 3.5.19 contain a fix for this issue.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**mastodon - mastodon**
Affected versions:
- < 3.5.19 (Status: affected)
- >= 4.0.0, < 4.0.15 (Status: affected)
- >= 4.1.0, < 4.1.15 (Status: affected)
- >= 4.2.0, < 4.2.7 (Status: affected)
### References
1. [https://github.com/mastodon/mastodon/security/advisories/GHSA-jhrq-qvrm-qr36](https://github.com/mastodon/mastodon/security/advisories/GHSA-jhrq-qvrm-qr36)
2. [https://github.com/mastodon/mastodon/commit/9fee5e852669e26f970e278021302e1a203fc022](https://github.com/mastodon/mastodon/commit/9fee5e852669e26f970e278021302e1a203fc022)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-2324, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-2324 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2324
- **State**: PUBLISHED
- **Published Date**: August 16, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:22 UTC
- **Reserved Date**: August 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in DotNetNuke (formerly IBuySpy Workshop) 1.0.6 through 1.0.10d allows remote attackers to modify the backend database via the (1) table and (2) field parameters in LinkClick.aspx.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [10747](http://secunia.com/advisories/10747)
2. [9518](http://www.securityfocus.com/bid/9518)
3. [3750](http://www.osvdb.org/3750)
4. [dotnetnuke-multiple-sql-injection(14973)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14973)
5. [20040128 Dotnetnuke Multiple Vulnerabilities](http://archives.neohapsis.com/archives/fulldisclosure/2004-01/1161.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-39963, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-39963 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39963
- **State**: PUBLISHED
- **Published Date**: August 10, 2023 at 17:26 UTC
- **Last Updated**: October 10, 2024 at 17:53 UTC
- **Reserved Date**: August 07, 2023 at 16:27 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 20.0.0 and prior to versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a missing password confirmation allowed an attacker, after successfully stealing a session from a logged in user, to create app passwords for the victim. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**nextcloud - security-advisories**
Affected versions:
- >= 20.0.0, < 20.0.14.15 (Status: affected)
- >= 21.0.0, < 21.0.9.13 (Status: affected)
- >= 22.0.0, < 22.2.10.14 (Status: affected)
- >= 23.0.0, < 23.0.12.9 (Status: affected)
- >= 24.0.0, < 24.0.12.5 (Status: affected)
- >= 25.0.0, < 25.0.9 (Status: affected)
- >= 26.0.0, < 26.0.4 (Status: affected)
- >= 27.0.0, < 27.0.1 (Status: affected)
### References
1. [https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j4qm-5q5x-54m5](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j4qm-5q5x-54m5)
2. [https://github.com/nextcloud/server/pull/39416](https://github.com/nextcloud/server/pull/39416)
3. [https://hackerone.com/reports/2067572](https://hackerone.com/reports/2067572)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-28180, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-28180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28180
- **State**: PUBLISHED
- **Published Date**: April 06, 2021 at 05:02 UTC
- **Last Updated**: September 16, 2024 at 23:16 UTC
- **Reserved Date**: March 12, 2021 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
The specific function in ASUS BMC’s firmware Web management page (Audit log configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**ASUS - BMC firmware for Z10PR-D16**
Affected versions:
- 1.14.51 (Status: affected)
**ASUS - BMC firmware for ASMB8-iKVM**
Affected versions:
- 1.14.51 (Status: affected)
**ASUS - BMC firmware for Z10PE-D16 WS**
Affected versions:
- 1.14.2 (Status: affected)
### References
1. [](https://www.asus.com/content/ASUS-Product-Security-Advisory/)
2. [](https://www.asus.com/tw/support/callus/)
3. [](https://www.twcert.org.tw/tw/cp-132-4550-5ee8c-1.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-9333, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-9333 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9333
- **State**: PUBLISHED
- **Published Date**: October 02, 2024 at 05:57 UTC
- **Last Updated**: October 02, 2024 at 13:36 UTC
- **Reserved Date**: September 30, 2024 at 08:59 UTC
- **Assigned By**: M-Files Corporation
### Vulnerability Description
Permissions bypass in M-Files Connector for Copilot before version 24.9.3 allows authenticated user to access limited amount of documents via incorrect access control list calculation
### Weakness Classification (CWE)
- CWE-281: Security Weakness
### Affected Products
**M-Files Corporation - M-Files Connector for Copilot**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://product.m-files.com/security-advisories/cve-2024-9333/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-32974, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-32974 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32974
- **State**: PUBLISHED
- **Published Date**: April 01, 2022 at 22:17 UTC
- **Last Updated**: April 16, 2025 at 16:33 UTC
- **Reserved Date**: May 13, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Improper input validation in the built-in web server in Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier may allow a remote attacker to execute commands.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Moxa - NPort IAW5000A-I/O series firmware**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-187-01)
2. [](https://www.moxa.com/en/support/product-support/security-advisory/nport-iaw5000a-io-serial-device-server-vulnerabilities)
### Credits
- Konstantin Kondratev, Evgeniy Druzhinin and Ilya Karpov of Rostelecom-Solar reported these vulnerabilities to Moxa.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-16995, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-16995 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16995
- **State**: PUBLISHED
- **Published Date**: December 22, 2017 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 20:43 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.
### Affected Products
**n/a - n/a**
Affected versions:
- through 4.4 (Status: affected)
### References
1. [45058](https://www.exploit-db.com/exploits/45058/)
2. [](https://github.com/torvalds/linux/commit/95a762e2c8c942780948091f8f2a4f32fce1ac6f)
3. [USN-3619-2](https://usn.ubuntu.com/3619-2/)
4. [](https://bugs.chromium.org/p/project-zero/issues/detail?id=1454)
5. [USN-3633-1](https://usn.ubuntu.com/3633-1/)
6. [102288](http://www.securityfocus.com/bid/102288)
7. [44298](https://www.exploit-db.com/exploits/44298/)
8. [45010](https://www.exploit-db.com/exploits/45010/)
9. [DSA-4073](https://www.debian.org/security/2017/dsa-4073)
10. [USN-3523-2](https://usn.ubuntu.com/usn/usn-3523-2/)
11. [](http://openwall.com/lists/oss-security/2017/12/21/2)
12. [USN-3619-1](https://usn.ubuntu.com/3619-1/)
13. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95a762e2c8c942780948091f8f2a4f32fce1ac6f)
14. [](https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=a6132276ab5dcc38b3299082efeb25b948263adb)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-36135, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-36135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36135
- **State**: PUBLISHED
- **Published Date**: December 02, 2021 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 17:16 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AOM v2.0.1 was discovered to contain a NULL pointer dereference via the component rate_hist.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.chromium.org/p/aomedia/issues/detail?id=2910&q=&can=1)
2. [[debian-lts-announce] 20230905 [SECURITY] [DLA 3556-1] aom security update](https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html)
3. [DSA-5490](https://www.debian.org/security/2023/dsa-5490)
4. [GLSA-202401-32](https://security.gentoo.org/glsa/202401-32)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-24652, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-24652 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24652
- **State**: PUBLISHED
- **Published Date**: February 27, 2023 at 00:00 UTC
- **Last Updated**: March 10, 2025 at 17:34 UTC
- **Reserved Date**: January 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the Description parameter under the Create ticket function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html)
2. [](https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip)
3. [](https://gist.github.com/y0gesh-verma/a9e83220f268f0294a611b82cf266739)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-30949, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-30949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30949
- **State**: PUBLISHED
- **Published Date**: August 24, 2021 at 18:50 UTC
- **Last Updated**: August 03, 2024 at 22:48 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A malicious application may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212975)
2. [](https://support.apple.com/en-us/HT212976)
3. [](https://support.apple.com/en-us/HT212978)
4. [](https://support.apple.com/en-us/HT212979)
5. [](https://support.apple.com/en-us/HT212981)
6. [](https://support.apple.com/en-us/HT212980)
7. [](http://packetstormsecurity.com/files/165670/XNU-Kernel-mach_msg-Use-After-Free.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-0581, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-0581 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0581
- **State**: PUBLISHED
- **Published Date**: March 02, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:21 UTC
- **Reserved Date**: February 28, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in Computer Associates (CA) License Client and Server 0.1.0.15 allow remote attackers to execute arbitrary code via (1) certain long fields in the Checksum item in a GCR request, (2) a long IP address, hostname, or netmask values in a GCR request, (3) a long last parameter in a GETCONFIG packet, or (4) long values in a request with an invalid format.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050302 License Patches Are Now Available To Address Buffer Overflows](http://marc.info/?l=bugtraq&m=110979326828704&w=2)
2. [20050302 Computer Associates License Client and Server Invalid Command Buffer Overflow](http://www.idefense.com/application/poi/display?id=210&type=vulnerabilities)
3. [20050302 Computer Associates License Client/Server GCR Checksum Buffer Overflow](http://www.idefense.com/application/poi/display?id=215&type=vulnerabilities)
4. [20050302 Computer Associates License Client/Server GETCONFIG Buffer Overflow](http://www.idefense.com/application/poi/display?id=213&type=vulnerabilities)
5. [](http://supportconnectw.ca.com/public/ca_common_docs/security_notice.asp)
6. [20050302 Computer Associates License Client/Server GCR Network Buffer Overflow](http://www.idefense.com/application/poi/display?id=214&type=vulnerabilities)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-0714, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-0714 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0714
- **State**: PUBLISHED
- **Published Date**: May 04, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 22:05 UTC
- **Reserved Date**: January 31, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Use-after-free vulnerability in a certain Red Hat patch for the RPC server sockets functionality in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 might allow remote attackers to cause a denial of service (crash) via malformed data in a packet, related to lockd and the svc_xprt_received function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110308 CVE-2011-0714 kernel: deficiency in handling of invalid data packets in lockd](http://openwall.com/lists/oss-security/2011/03/08/17)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=678144)
3. [[oss-security] 20110309 Re: CVE-2011-0714 kernel: deficiency in handling of invalid data packets in lockd](http://openwall.com/lists/oss-security/2011/03/09/1)
4. [RHSA-2011:0329](https://rhn.redhat.com/errata/RHSA-2011-0329.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-0319, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-0319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0319
- **State**: PUBLISHED
- **Published Date**: March 18, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:17 UTC
- **Reserved Date**: March 17, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the font tag in ezBoard 7.3u allows remote attackers to execute arbitrary script as other users, as demonstrated using the background:url in a (1) font color or (2) font face argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [9725](http://www.securityfocus.com/bid/9725)
2. [20040223 ezBoard Cross Site Scripting Vulnerability](http://marc.info/?l=bugtraq&m=107756639427140&w=2)
3. [ezboard-font-xss(15287)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15287)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-12550, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-12550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12550
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 19:24 UTC
- **Last Updated**: February 12, 2025 at 15:37 UTC
- **Reserved Date**: December 11, 2024 at 21:52 UTC
- **Assigned By**: zdi
### Vulnerability Description
Tungsten Automation Power PDF JP2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25566.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Tungsten Automation - Power PDF**
Affected versions:
- 5.1.0.41 (Status: affected)
### References
1. [ZDI-24-1678](https://www.zerodayinitiative.com/advisories/ZDI-24-1678/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25940, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25940 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25940
- **State**: PUBLISHED
- **Published Date**: April 04, 2023 at 10:14 UTC
- **Last Updated**: February 11, 2025 at 17:04 UTC
- **Reserved Date**: February 17, 2023 at 06:15 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell PowerScale OneFS version 9.5.0.0 contains improper link resolution before file access vulnerability in isi_gather_info. A high privileged local attacker could potentially exploit this vulnerability, leading to system takeover and it breaks the compliance mode guarantees.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**Dell - PowerScale OneFS**
Affected versions:
- 9.5.0.0 (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000211539/dell-emc-powerscale-onefs-security)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-39600, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-39600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39600
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 04:19 UTC
- **Last Updated**: August 02, 2024 at 04:26 UTC
- **Reserved Date**: June 26, 2024 at 09:58 UTC
- **Assigned By**: sap
### Vulnerability Description
Under certain conditions, the memory of SAP GUI
for Windows contains the password used to log on to an SAP system, which might
allow an attacker to get hold of the password and impersonate the affected
user. As a result, it has a high impact on the confidentiality but there is no
impact on the integrity and availability.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**SAP_SE - SAP GUI for Windows**
Affected versions:
- BC-FES-GUI 8 (Status: affected)
### References
1. [](https://url.sap/sapsecuritypatchday)
2. [](https://me.sap.com/notes/3461110)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-7477, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-7477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7477
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-3555, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-3555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3555
- **State**: PUBLISHED
- **Published Date**: July 08, 2023 at 12:31 UTC
- **Last Updated**: October 23, 2024 at 20:25 UTC
- **Reserved Date**: July 08, 2023 at 11:49 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in GZ Scripts PHP Vacation Rental Script 1.8. It has been classified as problematic. This affects an unknown part of the file /preview.php. The manipulation of the argument page/layout/sort_by/property_id leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-233349 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**GZ Scripts - PHP Vacation Rental Script**
Affected versions:
- 1.8 (Status: affected)
### References
1. [](https://vuldb.com/?id.233349)
2. [](https://vuldb.com/?ctiid.233349)
### Credits
- skalvin (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-20170, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-20170 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20170
- **State**: PUBLISHED
- **Published Date**: February 05, 2025 at 16:39 UTC
- **Last Updated**: February 05, 2025 at 16:56 UTC
- **Reserved Date**: October 10, 2024 at 19:15 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H`
### Affected Products
**Cisco - IOS**
Affected versions:
- 12.2(4)B (Status: affected)
- 12.2(15)B (Status: affected)
- 12.2(16)B1 (Status: affected)
- 12.2(2)B7 (Status: affected)
- 12.2(2)B6 (Status: affected)
- 12.2(4)B7 (Status: affected)
- 12.2(4)B2 (Status: affected)
- 12.2(2)B (Status: affected)
- 12.2(16)B2 (Status: affected)
- 12.2(4)B6 (Status: affected)
- 12.2(2)B1 (Status: affected)
- 12.2(4)B1 (Status: affected)
- 12.2(4)B4 (Status: affected)
- 12.2(4)B3 (Status: affected)
- 12.2(2)B2 (Status: affected)
- 12.2(2)B3 (Status: affected)
- 12.2(4)B8 (Status: affected)
- 12.2(2)B5 (Status: affected)
- 12.2(4)B5 (Status: affected)
- 12.2(2)B4 (Status: affected)
- 12.2(16)B (Status: affected)
- 12.2(1b)DA (Status: affected)
- 12.2(5)DA (Status: affected)
- 12.2(7)DA (Status: affected)
- 12.2(12)DA (Status: affected)
- 12.2(10)DA5 (Status: affected)
- 12.2(12)DA10 (Status: affected)
- 12.2(10)DA (Status: affected)
- 12.2(12)DA1 (Status: affected)
- 12.2(12)DA6 (Status: affected)
- 12.2(10)DA8 (Status: affected)
- 12.2(12)DA8 (Status: affected)
- 12.2(12)DA11 (Status: affected)
- 12.2(12)DA9 (Status: affected)
- 12.2(12)DA4 (Status: affected)
- 12.2(10)DA3 (Status: affected)
- 12.2(5)DA1 (Status: affected)
- 12.2(12)DA13 (Status: affected)
- 12.2(12)DA12 (Status: affected)
- 12.2(12)DA7 (Status: affected)
- 12.2(1b)DA1 (Status: affected)
- 12.2(10)DA1 (Status: affected)
- 12.2(10)DA6 (Status: affected)
- 12.2(10)DA4 (Status: affected)
- 12.2(12)DA2 (Status: affected)
- 12.2(12)DA3 (Status: affected)
- 12.2(10)DA2 (Status: affected)
- 12.2(12)DA5 (Status: affected)
- 12.2(10)DA7 (Status: affected)
- 12.2(10)DA9 (Status: affected)
- 12.2(14)S (Status: affected)
- 12.2(22)S (Status: affected)
- 12.2(20)S (Status: affected)
- 12.2(18)S (Status: affected)
- 12.2(14)S16 (Status: affected)
- 12.2(25)S (Status: affected)
- 12.2(30)S (Status: affected)
- 12.2(9)S (Status: affected)
- 12.2(20)S10 (Status: affected)
- 12.2(20)S8 (Status: affected)
- 12.2(30)S1 (Status: affected)
- 12.2(22)S2 (Status: affected)
- 12.2(14)S7 (Status: affected)
- 12.2(14)S11 (Status: affected)
- 12.2(25)S12 (Status: affected)
- 12.2(25)S4 (Status: affected)
- 12.2(14)S18 (Status: affected)
- 12.2(18)S8 (Status: affected)
- 12.2(18)S10 (Status: affected)
- 12.2(25)S15 (Status: affected)
- 12.2(20)S5 (Status: affected)
- 12.2(25)S7 (Status: affected)
- 12.2(18)S7 (Status: affected)
- 12.2(25)S14 (Status: affected)
- 12.2(14)S10 (Status: affected)
- 12.2(25)S11 (Status: affected)
- 12.2(14)S13 (Status: affected)
- 12.2(18)S1 (Status: affected)
- 12.2(18)S11 (Status: affected)
- 12.2(18)S5 (Status: affected)
- 12.2(20)S4 (Status: affected)
- 12.2(25)S10 (Status: affected)
- 12.2(20)S7 (Status: affected)
- 12.2(18)S2 (Status: affected)
- 12.2(25)S5 (Status: affected)
- 12.2(14)S17 (Status: affected)
- 12.2(18)S9 (Status: affected)
- 12.2(14)S3 (Status: affected)
- 12.2(18)S6 (Status: affected)
- 12.2(18)S12 (Status: affected)
- 12.2(25)S13 (Status: affected)
- 12.2(18)S4 (Status: affected)
- 12.2(25)S2 (Status: affected)
- 12.2(20)S2 (Status: affected)
- 12.2(20)S12 (Status: affected)
- 12.2(14)S12 (Status: affected)
- 12.2(20)S11 (Status: affected)
- 12.2(25)S8 (Status: affected)
- 12.2(20)S14 (Status: affected)
- 12.2(20)S9 (Status: affected)
- 12.2(14)S15 (Status: affected)
- 12.2(14)S1 (Status: affected)
- 12.2(14)S9 (Status: affected)
- 12.2(14)S2 (Status: affected)
- 12.2(14)S19 (Status: affected)
- 12.2(14)S8 (Status: affected)
- 12.2(18)S3 (Status: affected)
- 12.2(20)S6 (Status: affected)
- 12.2(14)S5 (Status: affected)
- 12.2(20)S3 (Status: affected)
- 12.2(25)S1 (Status: affected)
- 12.2(18)S13 (Status: affected)
- 12.2(22)S1 (Status: affected)
- 12.2(25)S9 (Status: affected)
- 12.2(14)S14 (Status: affected)
- 12.2(25)S3 (Status: affected)
- 12.2(20)S1 (Status: affected)
- 12.2(20)S13 (Status: affected)
- 12.2(25)S6 (Status: affected)
- 12.2(2)XA (Status: affected)
- 12.2(2)XA2 (Status: affected)
- 12.2(2)XA3 (Status: affected)
- 12.2(2)XA4 (Status: affected)
- 12.2(2)XA5 (Status: affected)
- 12.2(2)XA1 (Status: affected)
- 12.2(2)XB11 (Status: affected)
- 12.2(2)XB5 (Status: affected)
- 12.2(2)XB2 (Status: affected)
- 12.2(2)XB1 (Status: affected)
- 12.2(2)XB10 (Status: affected)
- 12.2(2)XB7 (Status: affected)
- 12.2(2)XB3 (Status: affected)
- 12.2(2)XB6 (Status: affected)
- 12.2(2)XB14 (Status: affected)
- 12.2(2)XB12 (Status: affected)
- 12.2(2)XB15 (Status: affected)
- 12.2(2)XB8 (Status: affected)
- 12.2(2)XG (Status: affected)
- 12.2(4)XL (Status: affected)
- 12.2(4)XL5 (Status: affected)
- 12.2(4)XL2 (Status: affected)
- 12.2(4)XL6 (Status: affected)
- 12.2(4)XL4 (Status: affected)
- 12.2(4)XL1 (Status: affected)
- 12.2(4)XL3 (Status: affected)
- 12.2(4)XM (Status: affected)
- 12.2(4)XM3 (Status: affected)
- 12.2(4)XM2 (Status: affected)
- 12.2(4)XM4 (Status: affected)
- 12.2(4)XM1 (Status: affected)
- 12.2(10a) (Status: affected)
- 12.2(1) (Status: affected)
- 12.2(21b) (Status: affected)
- 12.2(10) (Status: affected)
- 12.2(1a) (Status: affected)
- 12.2(1b) (Status: affected)
- 12.2(1c) (Status: affected)
- 12.2(1d) (Status: affected)
- 12.2(10b) (Status: affected)
- 12.2(10d) (Status: affected)
- 12.2(10g) (Status: affected)
- 12.2(3a) (Status: affected)
- 12.2(3b) (Status: affected)
- 12.2(3c) (Status: affected)
- 12.2(3d) (Status: affected)
- 12.2(3g) (Status: affected)
- 12.2(3) (Status: affected)
- 12.2(5) (Status: affected)
- 12.2(5a) (Status: affected)
- 12.2(5b) (Status: affected)
- 12.2(5c) (Status: affected)
- 12.2(5d) (Status: affected)
- 12.2(6g) (Status: affected)
- 12.2(6h) (Status: affected)
- 12.2(6i) (Status: affected)
- 12.2(6j) (Status: affected)
- 12.2(6) (Status: affected)
- 12.2(6a) (Status: affected)
- 12.2(6b) (Status: affected)
- 12.2(6c) (Status: affected)
- 12.2(6d) (Status: affected)
- 12.2(6e) (Status: affected)
- 12.2(6f) (Status: affected)
- 12.2(7a) (Status: affected)
- 12.2(7b) (Status: affected)
- 12.2(7c) (Status: affected)
- 12.2(7e) (Status: affected)
- 12.2(7g) (Status: affected)
- 12.2(7) (Status: affected)
- 12.2(37) (Status: affected)
- 12.2(19b) (Status: affected)
- 12.2(24b) (Status: affected)
- 12.2(12e) (Status: affected)
- 12.2(28) (Status: affected)
- 12.2(34) (Status: affected)
- 12.2(34a) (Status: affected)
- 12.2(46a) (Status: affected)
- 12.2(12b) (Status: affected)
- 12.2(26b) (Status: affected)
- 12.2(28a) (Status: affected)
- 12.2(12i) (Status: affected)
- 12.2(19) (Status: affected)
- 12.2(24) (Status: affected)
- 12.2(12g) (Status: affected)
- 12.2(13c) (Status: affected)
- 12.2(12f) (Status: affected)
- 12.2(12c) (Status: affected)
- 12.2(32) (Status: affected)
- 12.2(31) (Status: affected)
- 12.2(26a) (Status: affected)
- 12.2(27) (Status: affected)
- 12.2(17e) (Status: affected)
- 12.2(28d) (Status: affected)
- 12.2(17a) (Status: affected)
- 12.2(12k) (Status: affected)
- 12.2(13e) (Status: affected)
- 12.2(12a) (Status: affected)
- 12.2(19c) (Status: affected)
- 12.2(27b) (Status: affected)
- 12.2(17b) (Status: affected)
- 12.2(23) (Status: affected)
- 12.2(27a) (Status: affected)
- 12.2(16) (Status: affected)
- 12.2(12m) (Status: affected)
- 12.2(40) (Status: affected)
- 12.2(28c) (Status: affected)
- 12.2(24a) (Status: affected)
- 12.2(21a) (Status: affected)
- 12.2(13b) (Status: affected)
- 12.2(23a) (Status: affected)
- 12.2(17d) (Status: affected)
- 12.2(26) (Status: affected)
- 12.2(23c) (Status: affected)
- 12.2(16b) (Status: affected)
- 12.2(13) (Status: affected)
- 12.2(19a) (Status: affected)
- 12.2(17f) (Status: affected)
- 12.2(28b) (Status: affected)
- 12.2(23d) (Status: affected)
- 12.2(12) (Status: affected)
- 12.2(12j) (Status: affected)
- 12.2(23f) (Status: affected)
- 12.2(17) (Status: affected)
- 12.2(16c) (Status: affected)
- 12.2(16a) (Status: affected)
- 12.2(27c) (Status: affected)
- 12.2(12l) (Status: affected)
- 12.2(12h) (Status: affected)
- 12.2(16f) (Status: affected)
- 12.2(29a) (Status: affected)
- 12.2(29b) (Status: affected)
- 12.2(13a) (Status: affected)
- 12.2(40a) (Status: affected)
- 12.2(26c) (Status: affected)
- 12.2(23e) (Status: affected)
- 12.2(21) (Status: affected)
- 12.2(46) (Status: affected)
- 12.2(29) (Status: affected)
- 12.2(2)XN (Status: affected)
- 12.2(2)XR (Status: affected)
- 12.2(4)XR (Status: affected)
- 12.2(15)XR (Status: affected)
- 12.2(15)XR1 (Status: affected)
- 12.2(15)XR2 (Status: affected)
- 12.2(1)XS (Status: affected)
- 12.2(1)XS2 (Status: affected)
- 12.2(1)XS1a (Status: affected)
- 12.2(2)XT (Status: affected)
- 12.2(2)XT2 (Status: affected)
- 12.2(2)XT3 (Status: affected)
- 12.2(4)XW (Status: affected)
- 12.2(4)YA (Status: affected)
- 12.2(4)YA6 (Status: affected)
- 12.2(4)YA3 (Status: affected)
- 12.2(4)YA4 (Status: affected)
- 12.2(4)YA1 (Status: affected)
- 12.2(4)YA11 (Status: affected)
- 12.2(4)YA2 (Status: affected)
- 12.2(4)YA9 (Status: affected)
- 12.2(4)YA8 (Status: affected)
- 12.2(4)YA5 (Status: affected)
- 12.2(4)YA12 (Status: affected)
- 12.2(4)YA10 (Status: affected)
- 12.2(4)YA7 (Status: affected)
- 12.2(2)YC (Status: affected)
- 12.2(2)YC4 (Status: affected)
- 12.2(2)YC1 (Status: affected)
- 12.2(2)YC3 (Status: affected)
- 12.2(2)YC2 (Status: affected)
- 12.2(8)YD (Status: affected)
- 12.2(8)YD3 (Status: affected)
- 12.2(8)YD2 (Status: affected)
- 12.2(8)YD1 (Status: affected)
- 12.2(4)YF (Status: affected)
- 12.2(4)YG (Status: affected)
- 12.2(4)YH (Status: affected)
- 12.2(15)BC2a (Status: affected)
- 12.2(15)BC1a (Status: affected)
- 12.2(4)BC1a (Status: affected)
- 12.2(15)BC1b (Status: affected)
- 12.2(11)BC1 (Status: affected)
- 12.2(15)BC2d (Status: affected)
- 12.2(11)BC3a (Status: affected)
- 12.2(15)BC2g (Status: affected)
- 12.2(11)BC3c (Status: affected)
- 12.2(15)BC1g (Status: affected)
- 12.2(8)BC2 (Status: affected)
- 12.2(11)BC1b (Status: affected)
- 12.2(8)BC1 (Status: affected)
- 12.2(15)BC2i (Status: affected)
- 12.2(15)BC1c (Status: affected)
- 12.2(15)BC2c (Status: affected)
- 12.2(15)BC2f (Status: affected)
- 12.2(15)BC1d (Status: affected)
- 12.2(15)BC1 (Status: affected)
- 12.2(4)BC1 (Status: affected)
- 12.2(8)BC2a (Status: affected)
- 12.2(11)BC2 (Status: affected)
- 12.2(11)BC3b (Status: affected)
- 12.2(11)BC3d (Status: affected)
- 12.2(15)BC2 (Status: affected)
- 12.2(11)BC3 (Status: affected)
- 12.2(11)BC2a (Status: affected)
- 12.2(15)BC2e (Status: affected)
- 12.2(4)BC1b (Status: affected)
- 12.2(11)BC1a (Status: affected)
- 12.2(15)BC1e (Status: affected)
- 12.2(15)BC2h (Status: affected)
- 12.2(15)BC1f (Status: affected)
- 12.2(15)BC2b (Status: affected)
- 12.2(2)XF (Status: affected)
- 12.2(4)XF (Status: affected)
- 12.2(2)XF2 (Status: affected)
- 12.2(1)XF1 (Status: affected)
- 12.2(2)XF1 (Status: affected)
- 12.2(4)XF1 (Status: affected)
- 12.2(1)XF (Status: affected)
- 12.2(2)DD (Status: affected)
- 12.2(2)DD4 (Status: affected)
- 12.2(2)DD3 (Status: affected)
- 12.2(2)DD2 (Status: affected)
- 12.2(2)DD1 (Status: affected)
- 12.2(1)XD (Status: affected)
- 12.2(1)XD2 (Status: affected)
- 12.2(1)XD4 (Status: affected)
- 12.2(1)XD3 (Status: affected)
- 12.2(1)XD1 (Status: affected)
- 12.2(1)XE (Status: affected)
- 12.2(1)XE1 (Status: affected)
- 12.2(1)XE2 (Status: affected)
- 12.2(2)XH (Status: affected)
- 12.2(2)XH1 (Status: affected)
- 12.2(2)XH2 (Status: affected)
- 12.2(2)XI (Status: affected)
- 12.2(2)XI1 (Status: affected)
- 12.2(2)XI2 (Status: affected)
- 12.2(2)XJ (Status: affected)
- 12.2(2)XK (Status: affected)
- 12.2(2)XK1 (Status: affected)
- 12.2(2)XK3 (Status: affected)
- 12.2(2)XK2 (Status: affected)
- 12.2(2)XQ (Status: affected)
- 12.2(2)XQ1 (Status: affected)
- 12.2(4)BW (Status: affected)
- 12.2(4)BW1a (Status: affected)
- 12.2(4)BW2 (Status: affected)
- 12.2(4)BW1 (Status: affected)
- 12.2(2)BX (Status: affected)
- 12.2(15)BX (Status: affected)
- 12.2(16)BX (Status: affected)
- 12.2(16)BX2 (Status: affected)
- 12.2(2)BX1 (Status: affected)
- 12.2(16)BX3 (Status: affected)
- 12.2(16)BX1 (Status: affected)
- 12.2(4)BZ1 (Status: affected)
- 12.2(15)BZ2 (Status: affected)
- 12.2(4)BZ2 (Status: affected)
- 12.2(11)CX (Status: affected)
- 12.2(15)CX (Status: affected)
- 12.2(15)CX1 (Status: affected)
- 12.2(11)CX1 (Status: affected)
- 12.2(33)CX (Status: affected)
- 12.2(11)CY (Status: affected)
- 12.2(33)CY (Status: affected)
- 12.2(33)CY1 (Status: affected)
- 12.2(33)CY2 (Status: affected)
- 12.2(1)DX (Status: affected)
- 12.2(1)DX1 (Status: affected)
- 12.2(2)DX3 (Status: affected)
- 12.2(4)JA (Status: affected)
- 12.2(4)JA1 (Status: affected)
- 12.2(8)JA (Status: affected)
- 12.2(11)JA (Status: affected)
- 12.2(11)JA1 (Status: affected)
- 12.2(13)JA (Status: affected)
- 12.2(15)JA (Status: affected)
- 12.2(13)JA2 (Status: affected)
- 12.2(13)JA1 (Status: affected)
- 12.2(13)JA4 (Status: affected)
- 12.2(13)JA3 (Status: affected)
- 12.2(11)JA3 (Status: affected)
- 12.2(11)JA2 (Status: affected)
- 12.2(4)MB7 (Status: affected)
- 12.2(4)MB4 (Status: affected)
- 12.2(4)MB10 (Status: affected)
- 12.2(4)MB9 (Status: affected)
- 12.2(4)MB3 (Status: affected)
- 12.2(4)MB6 (Status: affected)
- 12.2(1)MB1 (Status: affected)
- 12.2(4)MB12 (Status: affected)
- 12.2(4)MB13a (Status: affected)
- 12.2(4)MB1 (Status: affected)
- 12.2(4)MB13 (Status: affected)
- 12.2(4)MB5 (Status: affected)
- 12.2(4)MB13c (Status: affected)
- 12.2(4)MB11 (Status: affected)
- 12.2(4)MB13b (Status: affected)
- 12.2(4)MB2 (Status: affected)
- 12.2(4)MB8 (Status: affected)
- 12.2(4)MB9a (Status: affected)
- 12.2(15)MC1c (Status: affected)
- 12.2(15)MC2g (Status: affected)
- 12.2(8)MC2 (Status: affected)
- 12.2(15)MC2k (Status: affected)
- 12.2(8)MC2d (Status: affected)
- 12.2(15)MC1b (Status: affected)
- 12.2(15)MC2b (Status: affected)
- 12.2(15)MC2a (Status: affected)
- 12.2(15)MC2m (Status: affected)
- 12.2(15)MC1 (Status: affected)
- 12.2(15)MC2 (Status: affected)
- 12.2(15)MC2f (Status: affected)
- 12.2(8)MC2b (Status: affected)
- 12.2(15)MC2j (Status: affected)
- 12.2(8)MC2c (Status: affected)
- 12.2(15)MC2e (Status: affected)
- 12.2(8)MC2a (Status: affected)
- 12.2(15)MC1a (Status: affected)
- 12.2(15)MC2c (Status: affected)
- 12.2(15)MC2i (Status: affected)
- 12.2(15)MC2h (Status: affected)
- 12.2(8)MC1 (Status: affected)
- 12.2(15)MC2l (Status: affected)
- 12.2(14)SZ (Status: affected)
- 12.2(14)SZ5 (Status: affected)
- 12.2(14)SZ6 (Status: affected)
- 12.2(14)SZ3 (Status: affected)
- 12.2(14)SZ4 (Status: affected)
- 12.2(14)SZ1 (Status: affected)
- 12.2(14)SZ2 (Status: affected)
- 12.2(2)XU (Status: affected)
- 12.2(8)YJ (Status: affected)
- 12.2(8)YJ1 (Status: affected)
- 12.2(11)YT (Status: affected)
- 12.2(11)YT1 (Status: affected)
- 12.2(11)YT2 (Status: affected)
- 12.2(8)YN (Status: affected)
- 12.2(8)YN1 (Status: affected)
- 12.2(9)YO (Status: affected)
- 12.2(9)YO3 (Status: affected)
- 12.2(9)YO2 (Status: affected)
- 12.2(9)YO1 (Status: affected)
- 12.2(9)YO4 (Status: affected)
- 12.2(1a)XC (Status: affected)
- 12.2(2)XC (Status: affected)
- 12.2(1a)XC1 (Status: affected)
- 12.2(1a)XC3 (Status: affected)
- 12.2(2)XC1 (Status: affected)
- 12.2(1a)XC2 (Status: affected)
- 12.2(2)XC2 (Status: affected)
- 12.2(11)YP3 (Status: affected)
- 12.2(2)YK (Status: affected)
- 12.2(2)YK1 (Status: affected)
- 12.2(8)YL (Status: affected)
- 12.2(8)YM (Status: affected)
- 12.2(11)YU (Status: affected)
- 12.2(11)YV (Status: affected)
- 12.2(11)YV1 (Status: affected)
- 12.2(11)YQ (Status: affected)
- 12.2(11)YR (Status: affected)
- 12.2(8)YW2 (Status: affected)
- 12.2(8)YW (Status: affected)
- 12.2(8)YW3 (Status: affected)
- 12.2(8)YW1 (Status: affected)
- 12.2(11)YX (Status: affected)
- 12.2(11)YX1 (Status: affected)
- 12.2(8)YY (Status: affected)
- 12.2(8)YY4 (Status: affected)
- 12.2(8)YY3 (Status: affected)
- 12.2(8)YY2 (Status: affected)
- 12.2(8)YY1 (Status: affected)
- 12.2(11)YZ (Status: affected)
- 12.2(11)YZ1 (Status: affected)
- 12.2(11)YZ2 (Status: affected)
- 12.2(9)ZA (Status: affected)
- 12.2(14)ZA (Status: affected)
- 12.2(14)ZA3 (Status: affected)
- 12.2(14)ZA2 (Status: affected)
- 12.2(14)ZA5 (Status: affected)
- 12.2(14)ZA4 (Status: affected)
- 12.2(14)ZA6 (Status: affected)
- 12.2(14)ZA7 (Status: affected)
- 12.2(8)ZB (Status: affected)
- 12.2(8)ZB3 (Status: affected)
- 12.2(8)ZB2 (Status: affected)
- 12.2(8)ZB7 (Status: affected)
- 12.2(8)ZB6 (Status: affected)
- 12.2(8)ZB4 (Status: affected)
- 12.2(8)ZB8 (Status: affected)
- 12.2(8)ZB1 (Status: affected)
- 12.2(8)ZB4a (Status: affected)
- 12.2(8)ZB5 (Status: affected)
- 12.2(11)ZC (Status: affected)
- 12.2(13)ZC (Status: affected)
- 12.2(13)ZD (Status: affected)
- 12.2(13)ZD3 (Status: affected)
- 12.2(13)ZD2 (Status: affected)
- 12.2(13)ZD1 (Status: affected)
- 12.2(13)ZD4 (Status: affected)
- 12.2(13)ZE (Status: affected)
- 12.2(13)ZF (Status: affected)
- 12.2(13)ZF2 (Status: affected)
- 12.2(13)ZF1 (Status: affected)
- 12.2(13)ZG (Status: affected)
- 12.2(13)ZH (Status: affected)
- 12.2(13)ZH5 (Status: affected)
- 12.2(13)ZH9 (Status: affected)
- 12.2(13)ZH2 (Status: affected)
- 12.2(13)ZH8 (Status: affected)
- 12.2(13)ZH10 (Status: affected)
- 12.2(13)ZH4 (Status: affected)
- 12.2(13)ZH3 (Status: affected)
- 12.2(13)ZH7 (Status: affected)
- 12.2(13)ZH6 (Status: affected)
- 12.2(13)ZH1 (Status: affected)
- 12.2(15)ZJ (Status: affected)
- 12.2(15)ZJ2 (Status: affected)
- 12.2(15)ZJ1 (Status: affected)
- 12.2(15)ZJ3 (Status: affected)
- 12.2(15)ZJ5 (Status: affected)
- 12.2(15)ZL (Status: affected)
- 12.2(15)ZL1 (Status: affected)
- 12.2(9)YE (Status: affected)
- 12.3(9a) (Status: affected)
- 12.3(15) (Status: affected)
- 12.3(19) (Status: affected)
- 12.3(10f) (Status: affected)
- 12.3(10a) (Status: affected)
- 12.3(1) (Status: affected)
- 12.3(1a) (Status: affected)
- 12.3(10) (Status: affected)
- 12.3(10b) (Status: affected)
- 12.3(10c) (Status: affected)
- 12.3(10d) (Status: affected)
- 12.3(10e) (Status: affected)
- 12.3(12b) (Status: affected)
- 12.3(12a) (Status: affected)
- 12.3(12c) (Status: affected)
- 12.3(12d) (Status: affected)
- 12.3(12e) (Status: affected)
- 12.3(12) (Status: affected)
- 12.3(13) (Status: affected)
- 12.3(13a) (Status: affected)
- 12.3(13b) (Status: affected)
- 12.3(15a) (Status: affected)
- 12.3(16) (Status: affected)
- 12.3(17) (Status: affected)
- 12.3(17a) (Status: affected)
- 12.3(17b) (Status: affected)
- 12.3(18) (Status: affected)
- 12.3(20) (Status: affected)
- 12.3(3f) (Status: affected)
- 12.3(3e) (Status: affected)
- 12.3(3g) (Status: affected)
- 12.3(3c) (Status: affected)
- 12.3(3b) (Status: affected)
- 12.3(3a) (Status: affected)
- 12.3(3) (Status: affected)
- 12.3(3i) (Status: affected)
- 12.3(3h) (Status: affected)
- 12.3(5c) (Status: affected)
- 12.3(5b) (Status: affected)
- 12.3(5a) (Status: affected)
- 12.3(5) (Status: affected)
- 12.3(5f) (Status: affected)
- 12.3(5e) (Status: affected)
- 12.3(5d) (Status: affected)
- 12.3(6f) (Status: affected)
- 12.3(6e) (Status: affected)
- 12.3(6c) (Status: affected)
- 12.3(6b) (Status: affected)
- 12.3(6a) (Status: affected)
- 12.3(6) (Status: affected)
- 12.3(9d) (Status: affected)
- 12.3(9e) (Status: affected)
- 12.3(9) (Status: affected)
- 12.3(9b) (Status: affected)
- 12.3(9c) (Status: affected)
- 12.3(16a) (Status: affected)
- 12.3(15b) (Status: affected)
- 12.3(21) (Status: affected)
- 12.3(22) (Status: affected)
- 12.3(21b) (Status: affected)
- 12.3(23) (Status: affected)
- 12.3(26) (Status: affected)
- 12.3(20a) (Status: affected)
- 12.3(22a) (Status: affected)
- 12.3(25) (Status: affected)
- 12.3(17c) (Status: affected)
- 12.3(24) (Status: affected)
- 12.3(19a) (Status: affected)
- 12.3(24a) (Status: affected)
- 12.3(18a) (Status: affected)
- 12.3(1a)B (Status: affected)
- 12.3(3)B (Status: affected)
- 12.3(5a)B (Status: affected)
- 12.3(3)B1 (Status: affected)
- 12.3(5a)B3 (Status: affected)
- 12.3(5a)B2 (Status: affected)
- 12.3(5a)B5 (Status: affected)
- 12.3(5a)B4 (Status: affected)
- 12.3(5a)B1 (Status: affected)
- 12.3(11)T (Status: affected)
- 12.3(7)T12 (Status: affected)
- 12.3(11)T11 (Status: affected)
- 12.3(11)T10 (Status: affected)
- 12.3(14)T7 (Status: affected)
- 12.3(14)T (Status: affected)
- 12.3(8)T (Status: affected)
- 12.3(2)T (Status: affected)
- 12.3(4)T (Status: affected)
- 12.3(7)T (Status: affected)
- 12.3(8)T9 (Status: affected)
- 12.3(2)T9 (Status: affected)
- 12.3(8)T6 (Status: affected)
- 12.3(4)T2a (Status: affected)
- 12.3(4)T9 (Status: affected)
- 12.3(4)T4 (Status: affected)
- 12.3(2)T1 (Status: affected)
- 12.3(11)T5 (Status: affected)
- 12.3(7)T3 (Status: affected)
- 12.3(2)T2 (Status: affected)
- 12.3(8)T3 (Status: affected)
- 12.3(4)T7 (Status: affected)
- 12.3(8)T7 (Status: affected)
- 12.3(11)T8 (Status: affected)
- 12.3(7)T2 (Status: affected)
- 12.3(8)T4 (Status: affected)
- 12.3(8)T8 (Status: affected)
- 12.3(14)T5 (Status: affected)
- 12.3(11)T3 (Status: affected)
- 12.3(4)T10 (Status: affected)
- 12.3(2)T4 (Status: affected)
- 12.3(8)T10 (Status: affected)
- 12.3(14)T2 (Status: affected)
- 12.3(4)T2 (Status: affected)
- 12.3(7)T7 (Status: affected)
- 12.3(7)T10 (Status: affected)
- 12.3(7)T4 (Status: affected)
- 12.3(11)T6 (Status: affected)
- 12.3(7)T11 (Status: affected)
- 12.3(4)T6 (Status: affected)
- 12.3(2)T3 (Status: affected)
- 12.3(2)T5 (Status: affected)
- 12.3(2)T6 (Status: affected)
- 12.3(4)T3 (Status: affected)
- 12.3(14)T3 (Status: affected)
- 12.3(2)T8 (Status: affected)
- 12.3(11)T4 (Status: affected)
- 12.3(7)T9 (Status: affected)
- 12.3(8)T11 (Status: affected)
- 12.3(11)T9 (Status: affected)
- 12.3(7)T8 (Status: affected)
- 12.3(4)T1 (Status: affected)
- 12.3(8)T5 (Status: affected)
- 12.3(4)T11 (Status: affected)
- 12.3(4)T8 (Status: affected)
- 12.3(14)T1 (Status: affected)
- 12.3(11)T2 (Status: affected)
- 12.3(7)T6 (Status: affected)
- 12.3(2)T7 (Status: affected)
- 12.3(11)T7 (Status: affected)
- 12.3(7)T1 (Status: affected)
- 12.3(14)T6 (Status: affected)
- 12.3(8)T1 (Status: affected)
- 12.2(15)CZ (Status: affected)
- 12.2(15)CZ1 (Status: affected)
- 12.2(15)CZ3 (Status: affected)
- 12.2(15)CZ2 (Status: affected)
- 12.2(15)JK (Status: affected)
- 12.2(15)JK3 (Status: affected)
- 12.2(15)JK5 (Status: affected)
- 12.2(15)JK2 (Status: affected)
- 12.2(15)JK1 (Status: affected)
- 12.2(15)JK4 (Status: affected)
- 12.2(13)ZP (Status: affected)
- 12.2(13)ZP1 (Status: affected)
- 12.2(13)ZP3 (Status: affected)
- 12.2(13)ZP2 (Status: affected)
- 12.2(13)ZP4 (Status: affected)
- 12.3(2)XA (Status: affected)
- 12.3(2)XA4 (Status: affected)
- 12.3(2)XA7 (Status: affected)
- 12.3(2)XA1 (Status: affected)
- 12.3(2)XA3 (Status: affected)
- 12.3(2)XA6 (Status: affected)
- 12.3(2)XA2 (Status: affected)
- 12.3(2)XA5 (Status: affected)
- 12.3(4)XQ (Status: affected)
- 12.3(4)XQ1 (Status: affected)
- 12.3(11)XL (Status: affected)
- 12.3(11)XL1 (Status: affected)
- 12.3(4)XK3 (Status: affected)
- 12.3(4)XK1 (Status: affected)
- 12.3(4)XK4 (Status: affected)
- 12.3(4)XK (Status: affected)
- 12.3(4)XK2 (Status: affected)
- 12.3(7)XJ (Status: affected)
- 12.3(7)XJ1 (Status: affected)
- 12.3(7)XJ2 (Status: affected)
- 12.3(7)XI8 (Status: affected)
- 12.3(7)XI7 (Status: affected)
- 12.3(7)XI8d (Status: affected)
- 12.3(7)XI10a (Status: affected)
- 12.3(7)XI8a (Status: affected)
- 12.3(7)XI4 (Status: affected)
- 12.3(7)XI1 (Status: affected)
- 12.3(7)XI1b (Status: affected)
- 12.3(7)XI7a (Status: affected)
- 12.3(7)XI2a (Status: affected)
- 12.3(7)XI10 (Status: affected)
- 12.3(7)XI7b (Status: affected)
- 12.3(7)XI1c (Status: affected)
- 12.3(7)XI9 (Status: affected)
- 12.3(7)XI3 (Status: affected)
- 12.3(7)XI6 (Status: affected)
- 12.3(7)XI8c (Status: affected)
- 12.3(7)XI2 (Status: affected)
- 12.3(7)XI5 (Status: affected)
- 12.3(4)XG (Status: affected)
- 12.3(4)XG3 (Status: affected)
- 12.3(4)XG1 (Status: affected)
- 12.3(4)XG4 (Status: affected)
- 12.3(4)XG2 (Status: affected)
- 12.3(4)XG5 (Status: affected)
- 12.3(2)XF (Status: affected)
- 12.3(2)XE (Status: affected)
- 12.3(2)XE5 (Status: affected)
- 12.3(2)XE2 (Status: affected)
- 12.3(2)XE1 (Status: affected)
- 12.3(2)XE4 (Status: affected)
- 12.3(2)XE3 (Status: affected)
- 12.3(4)XD (Status: affected)
- 12.3(4)XD4 (Status: affected)
- 12.3(4)XD1 (Status: affected)
- 12.3(4)XD3 (Status: affected)
- 12.3(4)XD2 (Status: affected)
- 12.3(2)XC (Status: affected)
- 12.3(2)XC4 (Status: affected)
- 12.3(2)XC3 (Status: affected)
- 12.3(2)XC2 (Status: affected)
- 12.3(2)XC1 (Status: affected)
- 12.3(2)XC5 (Status: affected)
- 12.3(2)XB2 (Status: affected)
- 12.3(2)XB (Status: affected)
- 12.3(2)XB3 (Status: affected)
- 12.3(2)XB1 (Status: affected)
- 12.2(18)EW (Status: affected)
- 12.2(20)EW (Status: affected)
- 12.2(25)EW (Status: affected)
- 12.2(20)EW2 (Status: affected)
- 12.2(18)EW5 (Status: affected)
- 12.2(18)EW1 (Status: affected)
- 12.2(20)EW1 (Status: affected)
- 12.2(20)EW4 (Status: affected)
- 12.2(18)EW2 (Status: affected)
- 12.2(18)EW6 (Status: affected)
- 12.2(18)EW4 (Status: affected)
- 12.2(18)EW7 (Status: affected)
- 12.2(18)EW3 (Status: affected)
- 12.2(20)EW3 (Status: affected)
- 12.2(20)EWA (Status: affected)
- 12.2(25)EWA (Status: affected)
- 12.2(25)EWA6 (Status: affected)
- 12.2(25)EWA5 (Status: affected)
- 12.2(25)EWA1 (Status: affected)
- 12.2(25)EWA10 (Status: affected)
- 12.2(25)EWA8 (Status: affected)
- 12.2(20)EWA1 (Status: affected)
- 12.2(25)EWA11 (Status: affected)
- 12.2(25)EWA9 (Status: affected)
- 12.2(25)EWA2 (Status: affected)
- 12.2(25)EWA14 (Status: affected)
- 12.2(25)EWA4 (Status: affected)
- 12.2(20)EWA3 (Status: affected)
- 12.2(25)EWA3 (Status: affected)
- 12.2(25)EWA7 (Status: affected)
- 12.2(20)EWA4 (Status: affected)
- 12.2(25)EWA12 (Status: affected)
- 12.2(25)EWA13 (Status: affected)
- 12.2(20)EWA2 (Status: affected)
- 12.2(14)SU (Status: affected)
- 12.2(14)SU1 (Status: affected)
- 12.2(14)SU2 (Status: affected)
- 12.2(35)SE (Status: affected)
- 12.2(18)SE (Status: affected)
- 12.2(20)SE (Status: affected)
- 12.2(25)SE (Status: affected)
- 12.2(37)SE (Status: affected)
- 12.2(53)SE1 (Status: affected)
- 12.2(55)SE (Status: affected)
- 12.2(25)SE2 (Status: affected)
- 12.2(40)SE2 (Status: affected)
- 12.2(46)SE (Status: affected)
- 12.2(46)SE2 (Status: affected)
- 12.2(50)SE2 (Status: affected)
- 12.2(35)SE5 (Status: affected)
- 12.2(50)SE1 (Status: affected)
- 12.2(44)SE2 (Status: affected)
- 12.2(20)SE3 (Status: affected)
- 12.2(35)SE1 (Status: affected)
- 12.2(50)SE5 (Status: affected)
- 12.2(35)SE4 (Status: affected)
- 12.2(44)SE1 (Status: affected)
- 12.2(53)SE (Status: affected)
- 12.2(37)SE1 (Status: affected)
- 12.2(25)SE3 (Status: affected)
- 12.2(35)SE3 (Status: affected)
- 12.2(44)SE4 (Status: affected)
- 12.2(55)SE3 (Status: affected)
- 12.2(55)SE2 (Status: affected)
- 12.2(40)SE (Status: affected)
- 12.2(44)SE (Status: affected)
- 12.2(52)SE (Status: affected)
- 12.2(58)SE (Status: affected)
- 12.2(50)SE3 (Status: affected)
- 12.2(55)SE1 (Status: affected)
- 12.2(35)SE2 (Status: affected)
- 12.2(18)SE1 (Status: affected)
- 12.2(40)SE1 (Status: affected)
- 12.2(20)SE1 (Status: affected)
- 12.2(44)SE6 (Status: affected)
- 12.2(44)SE3 (Status: affected)
- 12.2(53)SE2 (Status: affected)
- 12.2(52)SE1 (Status: affected)
- 12.2(46)SE1 (Status: affected)
- 12.2(20)SE2 (Status: affected)
- 12.2(54)SE (Status: affected)
- 12.2(44)SE5 (Status: affected)
- 12.2(50)SE4 (Status: affected)
- 12.2(50)SE (Status: affected)
- 12.2(20)SE4 (Status: affected)
- 12.2(58)SE1 (Status: affected)
- 12.2(55)SE4 (Status: affected)
- 12.2(58)SE2 (Status: affected)
- 12.2(55)SE5 (Status: affected)
- 12.2(55)SE6 (Status: affected)
- 12.2(55)SE7 (Status: affected)
- 12.2(55)SE8 (Status: affected)
- 12.2(55)SE9 (Status: affected)
- 12.2(55)SE10 (Status: affected)
- 12.2(55)SE11 (Status: affected)
- 12.2(55)SE12 (Status: affected)
- 12.2(55)SE13 (Status: affected)
- 12.2(27)SV (Status: affected)
- 12.2(28)SV (Status: affected)
- 12.2(18)SV (Status: affected)
- 12.2(22)SV (Status: affected)
- 12.2(23)SV (Status: affected)
- 12.2(24)SV (Status: affected)
- 12.2(25)SV (Status: affected)
- 12.2(26)SV (Status: affected)
- 12.2(29a)SV (Status: affected)
- 12.2(29)SV (Status: affected)
- 12.2(29)SV3 (Status: affected)
- 12.2(29b)SV (Status: affected)
- 12.2(22)SV1 (Status: affected)
- 12.2(18)SV3 (Status: affected)
- 12.2(27)SV2 (Status: affected)
- 12.2(27)SV5 (Status: affected)
- 12.2(29b)SV1 (Status: affected)
- 12.2(27)SV4 (Status: affected)
- 12.2(29a)SV1 (Status: affected)
- 12.2(24)SV1 (Status: affected)
- 12.2(28)SV1 (Status: affected)
- 12.2(29)SV1 (Status: affected)
- 12.2(27)SV1 (Status: affected)
- 12.2(18)SV1 (Status: affected)
- 12.2(18)SV2 (Status: affected)
- 12.2(23)SV1 (Status: affected)
- 12.2(25)SV2 (Status: affected)
- 12.2(25)SV3 (Status: affected)
- 12.2(29)SV2 (Status: affected)
- 12.2(27)SV3 (Status: affected)
- 12.2(28)SV2 (Status: affected)
- 12.2(26)SV1 (Status: affected)
- 12.2(25)SW (Status: affected)
- 12.2(23)SW (Status: affected)
- 12.2(18)SW (Status: affected)
- 12.2(19)SW (Status: affected)
- 12.2(20)SW (Status: affected)
- 12.2(21)SW (Status: affected)
- 12.2(25)SW9 (Status: affected)
- 12.2(25)SW2 (Status: affected)
- 12.2(25)SW11 (Status: affected)
- 12.2(25)SW10 (Status: affected)
- 12.2(25)SW3a (Status: affected)
- 12.2(25)SW5 (Status: affected)
- 12.2(25)SW4a (Status: affected)
- 12.2(25)SW4 (Status: affected)
- 12.2(25)SW12 (Status: affected)
- 12.2(25)SW7 (Status: affected)
- 12.2(23)SW1 (Status: affected)
- 12.2(25)SW6 (Status: affected)
- 12.2(25)SW1 (Status: affected)
- 12.2(21)SW1 (Status: affected)
- 12.2(25)SW8 (Status: affected)
- 12.2(25)SW3 (Status: affected)
- 12.2(17d)SXB (Status: affected)
- 12.2(17d)SXB6 (Status: affected)
- 12.2(17d)SXB11 (Status: affected)
- 12.2(17d)SXB7 (Status: affected)
- 12.2(17d)SXB4 (Status: affected)
- 12.2(17d)SXB2 (Status: affected)
- 12.2(17d)SXB3 (Status: affected)
- 12.2(17d)SXB5 (Status: affected)
- 12.2(17d)SXB10 (Status: affected)
- 12.2(17d)SXB8 (Status: affected)
- 12.2(17d)SXB11a (Status: affected)
- 12.2(17d)SXB1 (Status: affected)
- 12.2(17d)SXB9 (Status: affected)
- 12.2(17b)SXA (Status: affected)
- 12.2(17b)SXA2 (Status: affected)
- 12.2(18)SXD (Status: affected)
- 12.2(18)SXD7a (Status: affected)
- 12.2(18)SXD7b (Status: affected)
- 12.2(18)SXD1 (Status: affected)
- 12.2(18)SXD6 (Status: affected)
- 12.2(18)SXD7 (Status: affected)
- 12.2(18)SXD5 (Status: affected)
- 12.2(18)SXD4 (Status: affected)
- 12.2(18)SXD2 (Status: affected)
- 12.2(18)SXD3 (Status: affected)
- 12.3(7)XR (Status: affected)
- 12.3(7)XR4 (Status: affected)
- 12.3(7)XR3 (Status: affected)
- 12.3(7)XR5 (Status: affected)
- 12.3(7)XR6 (Status: affected)
- 12.3(7)XR2 (Status: affected)
- 12.3(7)XR7 (Status: affected)
- 12.3(7)XS (Status: affected)
- 12.3(7)XS2 (Status: affected)
- 12.3(7)XS1 (Status: affected)
- 12.3(8)XU (Status: affected)
- 12.3(8)XU5 (Status: affected)
- 12.3(8)XU2 (Status: affected)
- 12.3(8)XU1 (Status: affected)
- 12.3(8)XU4 (Status: affected)
- 12.3(8)XU3 (Status: affected)
- 12.3(8)XX (Status: affected)
- 12.3(8)XX1 (Status: affected)
- 12.3(8)XX2d (Status: affected)
- 12.3(8)XW (Status: affected)
- 12.3(8)XW2 (Status: affected)
- 12.3(8)XW3 (Status: affected)
- 12.3(8)XW1 (Status: affected)
- 12.3(8)XY (Status: affected)
- 12.3(8)XY3 (Status: affected)
- 12.3(8)XY5 (Status: affected)
- 12.3(8)XY4 (Status: affected)
- 12.3(8)XY1 (Status: affected)
- 12.3(8)XY7 (Status: affected)
- 12.3(8)XY2 (Status: affected)
- 12.3(8)XY6 (Status: affected)
- 12.3(2)XZ1 (Status: affected)
- 12.3(2)XZ2 (Status: affected)
- 12.3(8)YA (Status: affected)
- 12.3(8)YA1 (Status: affected)
- 12.3(8)YD (Status: affected)
- 12.3(8)YD1 (Status: affected)
- 12.3(11)YF (Status: affected)
- 12.3(11)YF2 (Status: affected)
- 12.3(11)YF3 (Status: affected)
- 12.3(11)YF4 (Status: affected)
- 12.3(11)YF1 (Status: affected)
- 12.3(8)YH (Status: affected)
- 12.3(8)YG (Status: affected)
- 12.3(8)YG5 (Status: affected)
- 12.3(8)YG3 (Status: affected)
- 12.3(8)YG6 (Status: affected)
- 12.3(8)YG2 (Status: affected)
- 12.3(8)YG1 (Status: affected)
- 12.3(8)YG4 (Status: affected)
- 12.2(1)M0 (Status: affected)
- 12.2(6c)M1 (Status: affected)
- 12.2(12b)M1 (Status: affected)
- 12.2(12h)M1 (Status: affected)
- 12.2(8)BY (Status: affected)
- 12.2(8)BY1 (Status: affected)
- 12.2(2)BY2 (Status: affected)
- 12.2(2)BY (Status: affected)
- 12.2(2)BY1 (Status: affected)
- 12.2(2)BY3 (Status: affected)
- 12.2(8)BY2 (Status: affected)
- 12.2(4)XV (Status: affected)
- 12.2(4)XV1 (Status: affected)
- 12.2(4)XV2 (Status: affected)
- 12.2(4)XV4 (Status: affected)
- 12.2(4)XV4a (Status: affected)
- 12.2(4)XV3 (Status: affected)
- 12.2(4)XV5 (Status: affected)
- 12.3(13a)BC6 (Status: affected)
- 12.3(17a)BC2 (Status: affected)
- 12.3(17a)BC (Status: affected)
- 12.3(13a)BC (Status: affected)
- 12.3(21)BC (Status: affected)
- 12.3(9a)BC (Status: affected)
- 12.3(21a)BC9 (Status: affected)
- 12.3(21a)BC4 (Status: affected)
- 12.3(9a)BC9 (Status: affected)
- 12.3(17b)BC6 (Status: affected)
- 12.3(13a)BC2 (Status: affected)
- 12.3(23)BC (Status: affected)
- 12.3(17b)BC3 (Status: affected)
- 12.3(9a)BC2 (Status: affected)
- 12.3(17b)BC9 (Status: affected)
- 12.3(23)BC8 (Status: affected)
- 12.3(23)BC10 (Status: affected)
- 12.3(23)BC1 (Status: affected)
- 12.3(9a)BC1 (Status: affected)
- 12.3(17b)BC8 (Status: affected)
- 12.3(9a)BC3 (Status: affected)
- 12.3(23)BC9 (Status: affected)
- 12.3(21a)BC6 (Status: affected)
- 12.3(9a)BC6 (Status: affected)
- 12.3(9a)BC5 (Status: affected)
- 12.3(23)BC7 (Status: affected)
- 12.3(13a)BC3 (Status: affected)
- 12.3(23)BC6 (Status: affected)
- 12.3(23)BC4 (Status: affected)
- 12.3(13a)BC1 (Status: affected)
- 12.3(17b)BC5 (Status: affected)
- 12.3(21a)BC8 (Status: affected)
- 12.3(9a)BC8 (Status: affected)
- 12.3(21a)BC3 (Status: affected)
- 12.3(21a)BC7 (Status: affected)
- 12.3(9a)BC7 (Status: affected)
- 12.3(23)BC5 (Status: affected)
- 12.3(13a)BC5 (Status: affected)
- 12.3(9a)BC4 (Status: affected)
- 12.3(21a)BC2 (Status: affected)
- 12.3(13a)BC4 (Status: affected)
- 12.3(17b)BC7 (Status: affected)
- 12.3(23)BC3 (Status: affected)
- 12.3(21a)BC1 (Status: affected)
- 12.3(17a)BC1 (Status: affected)
- 12.3(17b)BC4 (Status: affected)
- 12.3(23)BC2 (Status: affected)
- 12.3(21a)BC5 (Status: affected)
- 12.3(1a)BW (Status: affected)
- 12.3(11)YJ (Status: affected)
- 12.3(8)YI2 (Status: affected)
- 12.3(8)YI3 (Status: affected)
- 12.3(8)YI1 (Status: affected)
- 12.3(11)YK (Status: affected)
- 12.3(11)YK1 (Status: affected)
- 12.3(11)YK2 (Status: affected)
- 12.3(11)YK3 (Status: affected)
- 12.2(20)EU (Status: affected)
- 12.2(20)EU1 (Status: affected)
- 12.2(20)EU2 (Status: affected)
- 12.2(25)EX (Status: affected)
- 12.2(20)EX (Status: affected)
- 12.2(35)EX (Status: affected)
- 12.2(44)EX (Status: affected)
- 12.2(35)EX2 (Status: affected)
- 12.2(40)EX3 (Status: affected)
- 12.2(40)EX (Status: affected)
- 12.2(53)EX (Status: affected)
- 12.2(37)EX (Status: affected)
- 12.2(52)EX (Status: affected)
- 12.2(44)EX1 (Status: affected)
- 12.2(35)EX1 (Status: affected)
- 12.2(25)EX1 (Status: affected)
- 12.2(40)EX2 (Status: affected)
- 12.2(40)EX1 (Status: affected)
- 12.2(55)EX (Status: affected)
- 12.2(46)EX (Status: affected)
- 12.2(52)EX1 (Status: affected)
- 12.2(55)EX1 (Status: affected)
- 12.2(55)EX2 (Status: affected)
- 12.2(55)EX3 (Status: affected)
- 12.2(58)EX (Status: affected)
- 12.2(25)SEB (Status: affected)
- 12.2(25)SEB2 (Status: affected)
- 12.2(25)SEB1 (Status: affected)
- 12.2(25)SEB4 (Status: affected)
- 12.2(25)SEB3 (Status: affected)
- 12.2(25)SEA (Status: affected)
- 12.2(25)EY (Status: affected)
- 12.2(46)EY (Status: affected)
- 12.2(55)EY (Status: affected)
- 12.2(52)EY1 (Status: affected)
- 12.2(25)EY1 (Status: affected)
- 12.2(44)EY (Status: affected)
- 12.2(52)EY (Status: affected)
- 12.2(53)EY (Status: affected)
- 12.2(25)EY3 (Status: affected)
- 12.2(52)EY2 (Status: affected)
- 12.2(37)EY (Status: affected)
- 12.2(25)EY2 (Status: affected)
- 12.2(25)EY4 (Status: affected)
- 12.2(52)EY1b (Status: affected)
- 12.2(52)EY1c (Status: affected)
- 12.2(58)EY (Status: affected)
- 12.2(52)EY3 (Status: affected)
- 12.2(52)EY2a (Status: affected)
- 12.2(58)EY1 (Status: affected)
- 12.2(52)EY4 (Status: affected)
- 12.2(52)EY3a (Status: affected)
- 12.2(58)EY2 (Status: affected)
- 12.2(18)SO1 (Status: affected)
- 12.2(18)SO6 (Status: affected)
- 12.2(18)SO7 (Status: affected)
- 12.2(18)SO4 (Status: affected)
- 12.2(18)SO3 (Status: affected)
- 12.2(18)SO2 (Status: affected)
- 12.2(18)SO5 (Status: affected)
- 12.3(2)JA (Status: affected)
- 12.3(2)JA1 (Status: affected)
- 12.3(2)JA2 (Status: affected)
- 12.3(2)JA3 (Status: affected)
- 12.3(2)JA4 (Status: affected)
- 12.3(2)JA5 (Status: affected)
- 12.3(4)JA1 (Status: affected)
- 12.3(4)JA (Status: affected)
- 12.3(7)JA1 (Status: affected)
- 12.3(7)JA (Status: affected)
- 12.3(8)JA (Status: affected)
- 12.3(8)JA1 (Status: affected)
- 12.3(8)JA2 (Status: affected)
- 12.3(11)JA (Status: affected)
- 12.3(7)JA4 (Status: affected)
- 12.3(4)JA2 (Status: affected)
- 12.3(7)JA5 (Status: affected)
- 12.3(11)JA3 (Status: affected)
- 12.3(11)JA4 (Status: affected)
- 12.3(2)JA6 (Status: affected)
- 12.3(11)JA2 (Status: affected)
- 12.3(11)JA1 (Status: affected)
- 12.3(7)JA3 (Status: affected)
- 12.3(7)JA2 (Status: affected)
- 12.3(14)YQ8 (Status: affected)
- 12.3(14)YQ (Status: affected)
- 12.3(14)YQ5 (Status: affected)
- 12.3(14)YQ4 (Status: affected)
- 12.3(14)YQ7 (Status: affected)
- 12.3(14)YQ1 (Status: affected)
- 12.3(14)YQ6 (Status: affected)
- 12.3(14)YQ3 (Status: affected)
- 12.3(14)YQ2 (Status: affected)
- 12.3(11)YS (Status: affected)
- 12.3(11)YS1 (Status: affected)
- 12.3(11)YS2 (Status: affected)
- 12.4(3e) (Status: affected)
- 12.4(7b) (Status: affected)
- 12.4(8) (Status: affected)
- 12.4(5b) (Status: affected)
- 12.4(7a) (Status: affected)
- 12.4(3d) (Status: affected)
- 12.4(1) (Status: affected)
- 12.4(1a) (Status: affected)
- 12.4(1b) (Status: affected)
- 12.4(1c) (Status: affected)
- 12.4(10) (Status: affected)
- 12.4(3) (Status: affected)
- 12.4(3a) (Status: affected)
- 12.4(3b) (Status: affected)
- 12.4(3c) (Status: affected)
- 12.4(3f) (Status: affected)
- 12.4(5) (Status: affected)
- 12.4(5a) (Status: affected)
- 12.4(7c) (Status: affected)
- 12.4(7) (Status: affected)
- 12.4(8a) (Status: affected)
- 12.4(8b) (Status: affected)
- 12.4(7d) (Status: affected)
- 12.4(3g) (Status: affected)
- 12.4(8c) (Status: affected)
- 12.4(10b) (Status: affected)
- 12.4(12) (Status: affected)
- 12.4(12a) (Status: affected)
- 12.4(12b) (Status: affected)
- 12.4(13) (Status: affected)
- 12.4(13a) (Status: affected)
- 12.4(13b) (Status: affected)
- 12.4(13c) (Status: affected)
- 12.4(7e) (Status: affected)
- 12.4(17) (Status: affected)
- 12.4(25e) (Status: affected)
- 12.4(18b) (Status: affected)
- 12.4(18e) (Status: affected)
- 12.4(25g) (Status: affected)
- 12.4(3i) (Status: affected)
- 12.4(3j) (Status: affected)
- 12.4(23b) (Status: affected)
- 12.4(3h) (Status: affected)
- 12.4(7h) (Status: affected)
- 12.4(25a) (Status: affected)
- 12.4(16) (Status: affected)
- 12.4(13d) (Status: affected)
- 12.4(25) (Status: affected)
- 12.4(25c) (Status: affected)
- 12.4(19) (Status: affected)
- 12.4(13e) (Status: affected)
- 12.4(25b) (Status: affected)
- 12.4(23) (Status: affected)
- 12.4(10c) (Status: affected)
- 12.4(21) (Status: affected)
- 12.4(16b) (Status: affected)
- 12.4(19b) (Status: affected)
- 12.4(16a) (Status: affected)
- 12.4(23a) (Status: affected)
- 12.4(25d) (Status: affected)
- 12.4(7f) (Status: affected)
- 12.4(18) (Status: affected)
- 12.4(21a) (Status: affected)
- 12.4(13f) (Status: affected)
- 12.4(25f) (Status: affected)
- 12.4(18c) (Status: affected)
- 12.4(5c) (Status: affected)
- 12.4(8d) (Status: affected)
- 12.4(12c) (Status: affected)
- 12.4(17a) (Status: affected)
- 12.4(18a) (Status: affected)
- 12.4(17b) (Status: affected)
- 12.4(7g) (Status: affected)
- 12.2(25)EZ (Status: affected)
- 12.2(25)EZ1 (Status: affected)
- 12.2(58)EZ (Status: affected)
- 12.2(53)EZ (Status: affected)
- 12.2(55)EZ (Status: affected)
- 12.2(60)EZ (Status: affected)
- 12.2(60)EZ1 (Status: affected)
- 12.2(60)EZ2 (Status: affected)
- 12.2(60)EZ3 (Status: affected)
- 12.2(60)EZ4 (Status: affected)
- 12.2(60)EZ5 (Status: affected)
- 12.2(60)EZ6 (Status: affected)
- 12.2(60)EZ7 (Status: affected)
- 12.2(60)EZ8 (Status: affected)
- 12.2(60)EZ9 (Status: affected)
- 12.2(60)EZ10 (Status: affected)
- 12.2(60)EZ11 (Status: affected)
- 12.2(60)EZ12 (Status: affected)
- 12.2(60)EZ13 (Status: affected)
- 12.2(60)EZ14 (Status: affected)
- 12.2(60)EZ15 (Status: affected)
- 12.2(25)SEC (Status: affected)
- 12.2(25)SEC2 (Status: affected)
- 12.2(25)SEC1 (Status: affected)
- 12.3(2)JK (Status: affected)
- 12.3(2)JK1 (Status: affected)
- 12.3(2)JK2 (Status: affected)
- 12.3(8)JK (Status: affected)
- 12.3(8)JK1 (Status: affected)
- 12.3(2)JK3 (Status: affected)
- 12.3(14)YU (Status: affected)
- 12.3(14)YU1 (Status: affected)
- 12.4(6)MR1 (Status: affected)
- 12.4(11)MR (Status: affected)
- 12.4(2)MR (Status: affected)
- 12.4(4)MR (Status: affected)
- 12.4(6)MR (Status: affected)
- 12.4(9)MR (Status: affected)
- 12.4(12)MR (Status: affected)
- 12.4(16)MR (Status: affected)
- 12.4(16)MR1 (Status: affected)
- 12.4(19)MR2 (Status: affected)
- 12.4(19)MR1 (Status: affected)
- 12.4(19)MR (Status: affected)
- 12.4(20)MR (Status: affected)
- 12.4(4)MR1 (Status: affected)
- 12.4(19)MR3 (Status: affected)
- 12.4(12)MR1 (Status: affected)
- 12.4(20)MR2 (Status: affected)
- 12.4(16)MR2 (Status: affected)
- 12.4(12)MR2 (Status: affected)
- 12.4(2)MR1 (Status: affected)
- 12.4(20)MR1 (Status: affected)
- 12.4(4)T (Status: affected)
- 12.4(4)T1 (Status: affected)
- 12.4(4)T2 (Status: affected)
- 12.4(4)T3 (Status: affected)
- 12.4(6)T (Status: affected)
- 12.4(6)T1 (Status: affected)
- 12.4(6)T2 (Status: affected)
- 12.4(9)T (Status: affected)
- 12.4(4)T4 (Status: affected)
- 12.4(2)T5 (Status: affected)
- 12.4(6)T3 (Status: affected)
- 12.4(2)T (Status: affected)
- 12.4(11)T (Status: affected)
- 12.4(15)T (Status: affected)
- 12.4(20)T (Status: affected)
- 12.4(24)T (Status: affected)
- 12.4(24)T3 (Status: affected)
- 12.4(4)T8 (Status: affected)
- 12.4(20)T1 (Status: affected)
- 12.4(22)T1 (Status: affected)
- 12.4(15)T9 (Status: affected)
- 12.4(11)T4 (Status: affected)
- 12.4(15)T8 (Status: affected)
- 12.4(6)T5 (Status: affected)
- 12.4(15)T15 (Status: affected)
- 12.4(24)T5 (Status: affected)
- 12.4(15)T2 (Status: affected)
- 12.4(6)T8 (Status: affected)
- 12.4(15)T12 (Status: affected)
- 12.4(24)T4 (Status: affected)
- 12.4(6)T11 (Status: affected)
- 12.4(9)T5 (Status: affected)
- 12.4(20)T3 (Status: affected)
- 12.4(6)T4 (Status: affected)
- 12.4(4)T6 (Status: affected)
- 12.4(22)T (Status: affected)
- 12.4(20)T6 (Status: affected)
- 12.4(9)T3 (Status: affected)
- 12.4(24)T8 (Status: affected)
- 12.4(6)T7 (Status: affected)
- 12.4(15)T13 (Status: affected)
- 12.4(6)T10 (Status: affected)
- 12.4(15)T3 (Status: affected)
- 12.4(24)T2 (Status: affected)
- 12.4(22)T5 (Status: affected)
- 12.4(2)T3 (Status: affected)
- 12.4(15)T10 (Status: affected)
- 12.4(22)T4 (Status: affected)
- 12.4(20)T5 (Status: affected)
- 12.4(9)T6 (Status: affected)
- 12.4(15)T4 (Status: affected)
- 12.4(2)T4 (Status: affected)
- 12.4(24)T1 (Status: affected)
- 12.4(9)T4 (Status: affected)
- 12.4(24)T7 (Status: affected)
- 12.4(22)T3 (Status: affected)
- 12.4(9)T1 (Status: affected)
- 12.4(24)T6 (Status: affected)
- 12.4(6)T9 (Status: affected)
- 12.4(15)T5 (Status: affected)
- 12.4(4)T7 (Status: affected)
- 12.4(20)T2 (Status: affected)
- 12.4(2)T1 (Status: affected)
- 12.4(11)T1 (Status: affected)
- 12.4(15)T11 (Status: affected)
- 12.4(2)T6 (Status: affected)
- 12.4(2)T2 (Status: affected)
- 12.4(15)T7 (Status: affected)
- 12.4(11)T2 (Status: affected)
- 12.4(9)T7 (Status: affected)
- 12.4(15)T14 (Status: affected)
- 12.4(11)T3 (Status: affected)
- 12.4(15)T6 (Status: affected)
- 12.4(15)T16 (Status: affected)
- 12.4(15)T1 (Status: affected)
- 12.4(9)T2 (Status: affected)
- 12.4(6)T6 (Status: affected)
- 12.4(22)T2 (Status: affected)
- 12.4(4)T5 (Status: affected)
- 12.4(20)T4 (Status: affected)
- 12.4(24)T4a (Status: affected)
- 12.4(24)T4b (Status: affected)
- 12.4(24)T3e (Status: affected)
- 12.4(24)T4c (Status: affected)
- 12.4(15)T17 (Status: affected)
- 12.4(24)T4d (Status: affected)
- 12.4(24)T4e (Status: affected)
- 12.4(24)T3f (Status: affected)
- 12.4(24)T4f (Status: affected)
- 12.4(24)T4l (Status: affected)
- 12.3(14)YT (Status: affected)
- 12.3(14)YT1 (Status: affected)
- 12.2(18)SXF (Status: affected)
- 12.2(18)SXF5 (Status: affected)
- 12.2(18)SXF6 (Status: affected)
- 12.2(18)SXF15 (Status: affected)
- 12.2(18)SXF1 (Status: affected)
- 12.2(18)SXF10 (Status: affected)
- 12.2(18)SXF17b (Status: affected)
- 12.2(18)SXF4 (Status: affected)
- 12.2(18)SXF15a (Status: affected)
- 12.2(18)SXF3 (Status: affected)
- 12.2(18)SXF17 (Status: affected)
- 12.2(18)SXF12 (Status: affected)
- 12.2(18)SXF8 (Status: affected)
- 12.2(18)SXF10a (Status: affected)
- 12.2(18)SXF16 (Status: affected)
- 12.2(18)SXF7 (Status: affected)
- 12.2(18)SXF17a (Status: affected)
- 12.2(18)SXF14 (Status: affected)
- 12.2(18)SXF12a (Status: affected)
- 12.2(18)SXF9 (Status: affected)
- 12.2(18)SXF13 (Status: affected)
- 12.2(18)SXF2 (Status: affected)
- 12.2(18)SXF11 (Status: affected)
- 12.2(31)SG (Status: affected)
- 12.2(25)SG (Status: affected)
- 12.2(37)SG (Status: affected)
- 12.2(44)SG (Status: affected)
- 12.2(50)SG3 (Status: affected)
- 12.2(31)SG1 (Status: affected)
- 12.2(53)SG (Status: affected)
- 12.2(31)SG3 (Status: affected)
- 12.2(50)SG6 (Status: affected)
- 12.2(53)SG1 (Status: affected)
- 12.2(46)SG (Status: affected)
- 12.2(25)SG1 (Status: affected)
- 12.2(53)SG2 (Status: affected)
- 12.2(50)SG5 (Status: affected)
- 12.2(37)SG1 (Status: affected)
- 12.2(53)SG3 (Status: affected)
- 12.2(50)SG8 (Status: affected)
- 12.2(25)SG3 (Status: affected)
- 12.2(50)SG2 (Status: affected)
- 12.2(40)SG (Status: affected)
- 12.2(25)SG2 (Status: affected)
- 12.2(54)SG1 (Status: affected)
- 12.2(44)SG1 (Status: affected)
- 12.2(50)SG1 (Status: affected)
- 12.2(52)SG (Status: affected)
- 12.2(54)SG (Status: affected)
- 12.2(31)SG2 (Status: affected)
- 12.2(50)SG (Status: affected)
- 12.2(25)SG4 (Status: affected)
- 12.2(50)SG7 (Status: affected)
- 12.2(53)SG4 (Status: affected)
- 12.2(50)SG4 (Status: affected)
- 12.2(46)SG1 (Status: affected)
- 12.2(53)SG5 (Status: affected)
- 12.2(53)SG6 (Status: affected)
- 12.2(53)SG7 (Status: affected)
- 12.2(53)SG8 (Status: affected)
- 12.2(53)SG9 (Status: affected)
- 12.2(53)SG10 (Status: affected)
- 12.2(53)SG11 (Status: affected)
- 12.2(25)FX (Status: affected)
- 12.2(25)FY (Status: affected)
- 12.2(27)SBC (Status: affected)
- 12.2(27)SBC2 (Status: affected)
- 12.2(27)SBC3 (Status: affected)
- 12.2(27)SBC4 (Status: affected)
- 12.2(27)SBC5 (Status: affected)
- 12.2(27)SBC1 (Status: affected)
- 12.2(18)SXE (Status: affected)
- 12.2(18)SXE2 (Status: affected)
- 12.2(18)SXE6 (Status: affected)
- 12.2(18)SXE3 (Status: affected)
- 12.2(18)SXE6a (Status: affected)
- 12.2(18)SXE4 (Status: affected)
- 12.2(18)SXE6b (Status: affected)
- 12.2(18)SXE1 (Status: affected)
- 12.2(18)SXE5 (Status: affected)
- 12.2(8)TPC10a (Status: affected)
- 12.2(8)TPC10b (Status: affected)
- 12.2(8)TPC10c (Status: affected)
- 12.3(7)JX2 (Status: affected)
- 12.3(7)JX (Status: affected)
- 12.3(7)JX1 (Status: affected)
- 12.3(7)JX4 (Status: affected)
- 12.3(11)JX (Status: affected)
- 12.3(7)JX7 (Status: affected)
- 12.3(7)JX12 (Status: affected)
- 12.3(7)JX9 (Status: affected)
- 12.3(7)JX10 (Status: affected)
- 12.3(11)JX1 (Status: affected)
- 12.3(7)JX6 (Status: affected)
- 12.3(7)JX5 (Status: affected)
- 12.3(7)JX3 (Status: affected)
- 12.3(7)JX11 (Status: affected)
- 12.3(7)JX8 (Status: affected)
- 12.3(4)TPC11b (Status: affected)
- 12.3(4)TPC11a (Status: affected)
- 12.4(2)XB (Status: affected)
- 12.4(2)XB1 (Status: affected)
- 12.4(2)XB6 (Status: affected)
- 12.4(2)XB7 (Status: affected)
- 12.4(2)XB11 (Status: affected)
- 12.4(2)XB3 (Status: affected)
- 12.4(2)XB9 (Status: affected)
- 12.4(2)XB8 (Status: affected)
- 12.4(2)XB2 (Status: affected)
- 12.4(2)XB10 (Status: affected)
- 12.4(2)XB4 (Status: affected)
- 12.4(2)XB5 (Status: affected)
- 12.4(2)XB12 (Status: affected)
- 12.4(2)XA (Status: affected)
- 12.4(2)XA1 (Status: affected)
- 12.4(2)XA2 (Status: affected)
- 12.3(14)YM8 (Status: affected)
- 12.3(14)YM12 (Status: affected)
- 12.3(14)YM4 (Status: affected)
- 12.3(14)YM3 (Status: affected)
- 12.3(14)YM7 (Status: affected)
- 12.3(14)YM11 (Status: affected)
- 12.3(14)YM9 (Status: affected)
- 12.3(14)YM6 (Status: affected)
- 12.3(14)YM10 (Status: affected)
- 12.3(14)YM13 (Status: affected)
- 12.3(14)YM5 (Status: affected)
- 12.3(14)YM2 (Status: affected)
- 12.2(28)SB2 (Status: affected)
- 12.2(28)SB (Status: affected)
- 12.2(28)SB10 (Status: affected)
- 12.2(31)SB3x (Status: affected)
- 12.2(33)SB3 (Status: affected)
- 12.2(28)SB11 (Status: affected)
- 12.2(31)SB5 (Status: affected)
- 12.2(31)SB10 (Status: affected)
- 12.2(33)SB9 (Status: affected)
- 12.2(28)SB3 (Status: affected)
- 12.2(31)SB15 (Status: affected)
- 12.2(33)SB10 (Status: affected)
- 12.2(33)SB6 (Status: affected)
- 12.2(28)SB5 (Status: affected)
- 12.2(31)SB11 (Status: affected)
- 12.2(28)SB12 (Status: affected)
- 12.2(31)SB7 (Status: affected)
- 12.2(33)SB5 (Status: affected)
- 12.2(31)SB6 (Status: affected)
- 12.2(28)SB1 (Status: affected)
- 12.2(33)SB8 (Status: affected)
- 12.2(28)SB6 (Status: affected)
- 12.2(31)SB17 (Status: affected)
- 12.2(28)SB8 (Status: affected)
- 12.2(31)SB13 (Status: affected)
- 12.2(31)SB9 (Status: affected)
- 12.2(28)SB4 (Status: affected)
- 12.2(31)SB16 (Status: affected)
- 12.2(31)SB12 (Status: affected)
- 12.2(31)SB20 (Status: affected)
- 12.2(28)SB7 (Status: affected)
- 12.2(33)SB2 (Status: affected)
- 12.2(28)SB9 (Status: affected)
- 12.2(31)SB8 (Status: affected)
- 12.2(31)SB3 (Status: affected)
- 12.2(31)SB18 (Status: affected)
- 12.2(31)SB2 (Status: affected)
- 12.2(31)SB14 (Status: affected)
- 12.2(31)SB19 (Status: affected)
- 12.2(33)SB (Status: affected)
- 12.2(33)SB7 (Status: affected)
- 12.2(33)SB1 (Status: affected)
- 12.2(33)SB4 (Status: affected)
- 12.2(28)SB13 (Status: affected)
- 12.2(33)SB11 (Status: affected)
- 12.2(31)SB21 (Status: affected)
- 12.2(33)SB12 (Status: affected)
- 12.2(33)SB13 (Status: affected)
- 12.2(33)SB14 (Status: affected)
- 12.2(33)SB15 (Status: affected)
- 12.2(33)SB16 (Status: affected)
- 12.2(33)SB17 (Status: affected)
- 12.2(33)SB8a (Status: affected)
- 12.2(33)SRA (Status: affected)
- 12.2(33)SRA6 (Status: affected)
- 12.2(33)SRA7 (Status: affected)
- 12.2(33)SRA2 (Status: affected)
- 12.2(33)SRA3 (Status: affected)
- 12.2(33)SRA1 (Status: affected)
- 12.2(33)SRA4 (Status: affected)
- 12.2(33)SRA5 (Status: affected)
- 12.2(28)ZX (Status: affected)
- 12.4(4)XC (Status: affected)
- 12.4(4)XC1 (Status: affected)
- 12.4(4)XC5 (Status: affected)
- 12.4(4)XC7 (Status: affected)
- 12.4(4)XC3 (Status: affected)
- 12.4(4)XC4 (Status: affected)
- 12.4(4)XC2 (Status: affected)
- 12.4(4)XC6 (Status: affected)
- 12.4(4)XD (Status: affected)
- 12.4(4)XD4 (Status: affected)
- 12.4(4)XD10 (Status: affected)
- 12.4(4)XD12 (Status: affected)
- 12.4(4)XD2 (Status: affected)
- 12.4(4)XD8 (Status: affected)
- 12.4(4)XD11 (Status: affected)
- 12.4(4)XD1 (Status: affected)
- 12.4(4)XD5 (Status: affected)
- 12.4(4)XD7 (Status: affected)
- 12.4(4)XD9 (Status: affected)
- 12.4(6)XE (Status: affected)
- 12.4(6)XE2 (Status: affected)
- 12.4(6)XE1 (Status: affected)
- 12.2(25)SEF1 (Status: affected)
- 12.2(25)SEF2 (Status: affected)
- 12.2(25)SEF3 (Status: affected)
- 12.2(25)SEE (Status: affected)
- 12.2(25)SEE1 (Status: affected)
- 12.2(25)SEE3 (Status: affected)
- 12.2(25)SEE4 (Status: affected)
- 12.2(25)SEE2 (Status: affected)
- 12.2(25)SED (Status: affected)
- 12.2(25)SED1 (Status: affected)
- 12.3(11)YZ1 (Status: affected)
- 12.3(11)YZ (Status: affected)
- 12.3(11)YZ2 (Status: affected)
- 12.4(11)SW (Status: affected)
- 12.4(15)SW6 (Status: affected)
- 12.4(15)SW (Status: affected)
- 12.4(11)SW1 (Status: affected)
- 12.4(15)SW5 (Status: affected)
- 12.4(15)SW1 (Status: affected)
- 12.4(15)SW4 (Status: affected)
- 12.4(11)SW3 (Status: affected)
- 12.4(11)SW2 (Status: affected)
- 12.4(15)SW3 (Status: affected)
- 12.4(15)SW2 (Status: affected)
- 12.4(15)SW7 (Status: affected)
- 12.4(15)SW8 (Status: affected)
- 12.4(15)SW8a (Status: affected)
- 12.4(15)SW9 (Status: affected)
- 12.4(9)XG (Status: affected)
- 12.4(9)XG3 (Status: affected)
- 12.4(9)XG5 (Status: affected)
- 12.4(9)XG2 (Status: affected)
- 12.4(9)XG1 (Status: affected)
- 12.4(9)XG4 (Status: affected)
- 12.4(11)XJ (Status: affected)
- 12.4(11)XJ3 (Status: affected)
- 12.4(11)XJ2 (Status: affected)
- 12.4(11)XJ4 (Status: affected)
- 12.4(6)XT (Status: affected)
- 12.4(6)XT1 (Status: affected)
- 12.4(6)XT2 (Status: affected)
- 12.4(6)XP (Status: affected)
- 12.2(31)SGA (Status: affected)
- 12.2(31)SGA3 (Status: affected)
- 12.2(31)SGA2 (Status: affected)
- 12.2(31)SGA10 (Status: affected)
- 12.2(31)SGA5 (Status: affected)
- 12.2(31)SGA4 (Status: affected)
- 12.2(31)SGA11 (Status: affected)
- 12.2(31)SGA6 (Status: affected)
- 12.2(31)SGA1 (Status: affected)
- 12.2(31)SGA7 (Status: affected)
- 12.2(31)SGA8 (Status: affected)
- 12.2(31)SGA9 (Status: affected)
- 12.2(18)IXA (Status: affected)
- 12.2(18)IXB (Status: affected)
- 12.2(18)IXB2 (Status: affected)
- 12.2(18)IXB1 (Status: affected)
- 12.2(18)IXC (Status: affected)
- 12.2(18)IXD (Status: affected)
- 12.2(18)IXD1 (Status: affected)
- 12.2(25)SEG (Status: affected)
- 12.2(25)SEG5 (Status: affected)
- 12.2(25)SEG2 (Status: affected)
- 12.2(25)SEG4 (Status: affected)
- 12.2(25)SEG1 (Status: affected)
- 12.2(25)SEG3 (Status: affected)
- 12.2(25)SEG6 (Status: affected)
- 12.2(18)ZU (Status: affected)
- 12.2(18)ZU1 (Status: affected)
- 12.2(18)ZU2 (Status: affected)
- 12.2(18)ZY (Status: affected)
- 12.2(18)ZY1 (Status: affected)
- 12.2(18)ZY2 (Status: affected)
- 12.3(8)JEA (Status: affected)
- 12.3(8)JEA1 (Status: affected)
- 12.3(8)JEA3 (Status: affected)
- 12.3(8)JEA2 (Status: affected)
- 12.4(11)MD (Status: affected)
- 12.4(11)MD2 (Status: affected)
- 12.4(24)MD1 (Status: affected)
- 12.4(11)MD1 (Status: affected)
- 12.4(24)MD (Status: affected)
- 12.4(11)MD10 (Status: affected)
- 12.4(15)MD3 (Status: affected)
- 12.4(24)MD3 (Status: affected)
- 12.4(15)MD2 (Status: affected)
- 12.4(11)MD5 (Status: affected)
- 12.4(24)MD2 (Status: affected)
- 12.4(11)MD9 (Status: affected)
- 12.4(22)MD1 (Status: affected)
- 12.4(15)MD5 (Status: affected)
- 12.4(15)MD4 (Status: affected)
- 12.4(22)MD2 (Status: affected)
- 12.4(11)MD8 (Status: affected)
- 12.4(11)MD7 (Status: affected)
- 12.4(24)MD5 (Status: affected)
- 12.4(15)MD (Status: affected)
- 12.4(15)MD1 (Status: affected)
- 12.4(11)MD6 (Status: affected)
- 12.4(22)MD (Status: affected)
- 12.4(11)MD4 (Status: affected)
- 12.4(11)MD3 (Status: affected)
- 12.4(24)MD4 (Status: affected)
- 12.4(24)MD6 (Status: affected)
- 12.4(24)MD7 (Status: affected)
- 12.4(14)XK (Status: affected)
- 12.4(11)XV (Status: affected)
- 12.4(11)XV1 (Status: affected)
- 12.4(11)XW (Status: affected)
- 12.4(11)XW3 (Status: affected)
- 12.4(11)XW7 (Status: affected)
- 12.4(11)XW10 (Status: affected)
- 12.4(11)XW8 (Status: affected)
- 12.4(11)XW9 (Status: affected)
- 12.4(11)XW6 (Status: affected)
- 12.4(11)XW4 (Status: affected)
- 12.4(11)XW1 (Status: affected)
- 12.4(11)XW5 (Status: affected)
- 12.4(11)XW2 (Status: affected)
- 12.2(33)SRB (Status: affected)
- 12.2(33)SRB4 (Status: affected)
- 12.2(33)SRB5a (Status: affected)
- 12.2(33)SRB3 (Status: affected)
- 12.2(33)SRB1 (Status: affected)
- 12.2(33)SRB7 (Status: affected)
- 12.2(33)SRB6 (Status: affected)
- 12.2(33)SRB5 (Status: affected)
- 12.2(33)SRB2 (Status: affected)
- 12.2(29)SVC (Status: affected)
- 12.4(3g)JMA (Status: affected)
- 12.4(3g)JMA1 (Status: affected)
- 12.3(8)JEB (Status: affected)
- 12.3(8)JEB1 (Status: affected)
- 12.3(8)JEC2 (Status: affected)
- 12.3(8)JEC1 (Status: affected)
- 12.3(8)JEC3 (Status: affected)
- 12.3(8)JEC (Status: affected)
- 12.2(18)IXE (Status: affected)
- 12.2(25)FZ (Status: affected)
- 12.4(15)XF (Status: affected)
- 12.3(2)JL (Status: affected)
- 12.3(2)JL3 (Status: affected)
- 12.3(2)JL1 (Status: affected)
- 12.3(2)JL4 (Status: affected)
- 12.3(2)JL2 (Status: affected)
- 12.2(33)SCA2 (Status: affected)
- 12.2(33)SCA1 (Status: affected)
- 12.2(33)SCA (Status: affected)
- 12.2(33)SRC2 (Status: affected)
- 12.2(33)SRC (Status: affected)
- 12.2(33)SRC3 (Status: affected)
- 12.2(33)SRC5 (Status: affected)
- 12.2(33)SRC6 (Status: affected)
- 12.2(33)SRC4 (Status: affected)
- 12.2(33)SRC1 (Status: affected)
- 12.2(29)SVA2 (Status: affected)
- 12.2(29)SVD (Status: affected)
- 12.2(29)SVD0 (Status: affected)
- 12.2(29)SVD1 (Status: affected)
- 12.2(33)SXH3a (Status: affected)
- 12.2(33)SXH8a (Status: affected)
- 12.2(33)SXH3 (Status: affected)
- 12.2(33)SXH4 (Status: affected)
- 12.2(33)SXH7 (Status: affected)
- 12.2(33)SXH (Status: affected)
- 12.2(33)SXH8 (Status: affected)
- 12.2(33)SXH2a (Status: affected)
- 12.2(33)SXH2 (Status: affected)
- 12.2(33)SXH1 (Status: affected)
- 12.2(33)SXH5 (Status: affected)
- 12.2(33)SXH6 (Status: affected)
- 12.2(33)SXH8b (Status: affected)
- 12.4(15)XQ4 (Status: affected)
- 12.4(15)XQ1 (Status: affected)
- 12.4(15)XQ7 (Status: affected)
- 12.4(15)XQ2a (Status: affected)
- 12.4(15)XQ6 (Status: affected)
- 12.4(15)XQ2 (Status: affected)
- 12.4(15)XQ (Status: affected)
- 12.4(15)XQ3 (Status: affected)
- 12.4(15)XQ5 (Status: affected)
- 12.4(15)XQ2b (Status: affected)
- 12.4(15)XQ8 (Status: affected)
- 12.4(15)XY4 (Status: affected)
- 12.4(15)XY5 (Status: affected)
- 12.4(15)XY1 (Status: affected)
- 12.4(15)XY (Status: affected)
- 12.4(15)XY2 (Status: affected)
- 12.4(15)XY3 (Status: affected)
- 12.4(15)XZ (Status: affected)
- 12.4(15)XZ2 (Status: affected)
- 12.4(15)XZ1 (Status: affected)
- 12.4(15)XL3 (Status: affected)
- 12.4(15)XL1 (Status: affected)
- 12.4(15)XL2 (Status: affected)
- 12.4(15)XL4 (Status: affected)
- 12.4(15)XL5 (Status: affected)
- 12.4(15)XL (Status: affected)
- 12.3(8)ZA (Status: affected)
- 12.4(15)XM3 (Status: affected)
- 12.4(15)XM1 (Status: affected)
- 12.4(15)XM2 (Status: affected)
- 12.4(15)XM (Status: affected)
- 12.4(15)XN (Status: affected)
- 12.4(22)XR5 (Status: affected)
- 12.4(22)XR4 (Status: affected)
- 12.4(15)XR5 (Status: affected)
- 12.4(15)XR2 (Status: affected)
- 12.4(22)XR7 (Status: affected)
- 12.4(15)XR4 (Status: affected)
- 12.4(15)XR1 (Status: affected)
- 12.4(15)XR7 (Status: affected)
- 12.4(22)XR2 (Status: affected)
- 12.4(15)XR9 (Status: affected)
- 12.4(15)XR6 (Status: affected)
- 12.4(15)XR3 (Status: affected)
- 12.4(15)XR (Status: affected)
- 12.4(22)XR6 (Status: affected)
- 12.4(22)XR10 (Status: affected)
- 12.4(15)XR8 (Status: affected)
- 12.4(22)XR1 (Status: affected)
- 12.4(22)XR9 (Status: affected)
- 12.4(22)XR3 (Status: affected)
- 12.4(22)XR8 (Status: affected)
- 12.4(22)XR11 (Status: affected)
- 12.4(15)XR10 (Status: affected)
- 12.4(22)XR12 (Status: affected)
- 12.2(33)IRA (Status: affected)
- 12.2(33)IRB (Status: affected)
- 12.2(18)IXG (Status: affected)
- 12.2(18)IXF (Status: affected)
- 12.2(18)IXF1 (Status: affected)
- 12.2(33)SCB9 (Status: affected)
- 12.2(33)SCB (Status: affected)
- 12.2(33)SCB6 (Status: affected)
- 12.2(33)SCB3 (Status: affected)
- 12.2(33)SCB10 (Status: affected)
- 12.2(33)SCB4 (Status: affected)
- 12.2(33)SCB2 (Status: affected)
- 12.2(33)SCB7 (Status: affected)
- 12.2(33)SCB1 (Status: affected)
- 12.2(33)SCB5 (Status: affected)
- 12.2(33)SCB8 (Status: affected)
- 12.2(33)SCB11 (Status: affected)
- 12.2(33)SRD7 (Status: affected)
- 12.2(33)SRD6 (Status: affected)
- 12.2(33)SRD2a (Status: affected)
- 12.2(33)SRD4 (Status: affected)
- 12.2(33)SRD5 (Status: affected)
- 12.2(33)SRD3 (Status: affected)
- 12.2(33)SRD2 (Status: affected)
- 12.2(33)SRD1 (Status: affected)
- 12.2(33)SRD (Status: affected)
- 12.2(33)SRD8 (Status: affected)
- 12.2(33)STE0 (Status: affected)
- 12.2(29)SVE0 (Status: affected)
- 12.2(33)SXI2 (Status: affected)
- 12.2(33)SXI3 (Status: affected)
- 12.2(33)SXI5 (Status: affected)
- 12.2(33)SXI4a (Status: affected)
- 12.2(33)SXI4 (Status: affected)
- 12.2(33)SXI2a (Status: affected)
- 12.2(33)SXI (Status: affected)
- 12.2(33)SXI6 (Status: affected)
- 12.2(33)SXI7 (Status: affected)
- 12.2(33)SXI1 (Status: affected)
- 12.2(33)SXI8 (Status: affected)
- 12.2(33)SXI9 (Status: affected)
- 12.2(33)SXI8a (Status: affected)
- 12.2(33)SXI10 (Status: affected)
- 12.2(33)SXI11 (Status: affected)
- 12.2(33)SXI12 (Status: affected)
- 12.2(33)SXI13 (Status: affected)
- 12.2(33)SXI14 (Status: affected)
- 12.2(52)XO (Status: affected)
- 12.2(54)XO (Status: affected)
- 12.2(40)XO (Status: affected)
- 12.2(18)ZYA2 (Status: affected)
- 12.2(18)ZYA (Status: affected)
- 12.2(18)ZYA3a (Status: affected)
- 12.2(18)ZYA1 (Status: affected)
- 12.2(18)ZYA3 (Status: affected)
- 12.2(18)ZYA3b (Status: affected)
- 12.2(18)ZYA3c (Status: affected)
- 12.4(10b)JDA3 (Status: affected)
- 12.4(10b)JDA (Status: affected)
- 12.4(10b)JDA2 (Status: affected)
- 12.4(10b)JDA1 (Status: affected)
- 12.4(3)JL (Status: affected)
- 12.4(3)JL2 (Status: affected)
- 12.4(3)JL1 (Status: affected)
- 12.4(3)JK4 (Status: affected)
- 12.4(3)JK1 (Status: affected)
- 12.4(3)JK (Status: affected)
- 12.4(3)JK3 (Status: affected)
- 12.4(3)JK2 (Status: affected)
- 12.4(3g)JMB (Status: affected)
- 12.4(3g)JX (Status: affected)
- 12.4(3g)JX2 (Status: affected)
- 12.4(10b)JX (Status: affected)
- 12.4(21a)JX (Status: affected)
- 12.4(3g)JX1 (Status: affected)
- 12.4(25e)JX (Status: affected)
- 12.4(10b)JY (Status: affected)
- 12.4(21a)JY (Status: affected)
- 12.4(23c)JY (Status: affected)
- 12.2(44)SQ (Status: affected)
- 12.2(44)SQ2 (Status: affected)
- 12.2(50)SQ2 (Status: affected)
- 12.2(50)SQ1 (Status: affected)
- 12.2(50)SQ (Status: affected)
- 12.2(50)SQ3 (Status: affected)
- 12.2(50)SQ4 (Status: affected)
- 12.2(50)SQ5 (Status: affected)
- 12.2(50)SQ6 (Status: affected)
- 12.2(50)SQ7 (Status: affected)
- 12.4(10b)JDC (Status: affected)
- 12.4(10b)JDD (Status: affected)
- 12.2(33)IRC (Status: affected)
- 12.2(18)IXH1 (Status: affected)
- 12.2(18)IXH (Status: affected)
- 12.4(22)MDA3 (Status: affected)
- 12.4(24)MDA5 (Status: affected)
- 12.4(22)MDA5 (Status: affected)
- 12.4(24)MDA3 (Status: affected)
- 12.4(22)MDA4 (Status: affected)
- 12.4(24)MDA4 (Status: affected)
- 12.4(24)MDA1 (Status: affected)
- 12.4(22)MDA (Status: affected)
- 12.4(22)MDA2 (Status: affected)
- 12.4(22)MDA1 (Status: affected)
- 12.4(24)MDA2 (Status: affected)
- 12.4(22)MDA6 (Status: affected)
- 12.4(24)MDA6 (Status: affected)
- 12.4(24)MDA7 (Status: affected)
- 12.4(24)MDA8 (Status: affected)
- 12.4(24)MDA10 (Status: affected)
- 12.4(24)MDA9 (Status: affected)
- 12.4(24)MDA11 (Status: affected)
- 12.4(24)MDA12 (Status: affected)
- 12.4(24)MDA13 (Status: affected)
- 12.2(33)SCC (Status: affected)
- 12.2(33)SCC2 (Status: affected)
- 12.2(33)SCC6 (Status: affected)
- 12.2(33)SCC7 (Status: affected)
- 12.2(33)SCC5 (Status: affected)
- 12.2(33)SCC4 (Status: affected)
- 12.2(33)SCC3 (Status: affected)
- 12.2(33)SCC1 (Status: affected)
- 12.2(33)SCD5 (Status: affected)
- 12.2(33)SCD1 (Status: affected)
- 12.2(33)SCD7 (Status: affected)
- 12.2(33)SCD4 (Status: affected)
- 12.2(33)SCD (Status: affected)
- 12.2(33)SCD6 (Status: affected)
- 12.2(33)SCD3 (Status: affected)
- 12.2(33)SCD2 (Status: affected)
- 12.2(33)SCD8 (Status: affected)
- 12.3(8)JED (Status: affected)
- 12.3(8)JED1 (Status: affected)
- 12.4(24)YG3 (Status: affected)
- 12.4(24)YG4 (Status: affected)
- 12.4(24)YG1 (Status: affected)
- 12.4(24)YG2 (Status: affected)
- 12.4(24)YG (Status: affected)
- 15.0(1)M1 (Status: affected)
- 15.0(1)M5 (Status: affected)
- 15.0(1)M4 (Status: affected)
- 15.0(1)M3 (Status: affected)
- 15.0(1)M2 (Status: affected)
- 15.0(1)M6 (Status: affected)
- 15.0(1)M (Status: affected)
- 15.0(1)M7 (Status: affected)
- 15.0(1)M10 (Status: affected)
- 15.0(1)M9 (Status: affected)
- 15.0(1)M8 (Status: affected)
- 15.0(1)XA2 (Status: affected)
- 15.0(1)XA4 (Status: affected)
- 15.0(1)XA1 (Status: affected)
- 15.0(1)XA3 (Status: affected)
- 15.0(1)XA (Status: affected)
- 15.0(1)XA5 (Status: affected)
- 15.1(2)T (Status: affected)
- 15.1(1)T4 (Status: affected)
- 15.1(3)T2 (Status: affected)
- 15.1(1)T1 (Status: affected)
- 15.1(2)T0a (Status: affected)
- 15.1(3)T3 (Status: affected)
- 15.1(1)T3 (Status: affected)
- 15.1(2)T3 (Status: affected)
- 15.1(2)T4 (Status: affected)
- 15.1(1)T2 (Status: affected)
- 15.1(3)T (Status: affected)
- 15.1(2)T2a (Status: affected)
- 15.1(3)T1 (Status: affected)
- 15.1(1)T (Status: affected)
- 15.1(2)T2 (Status: affected)
- 15.1(2)T1 (Status: affected)
- 15.1(2)T5 (Status: affected)
- 15.1(3)T4 (Status: affected)
- 15.1(1)T5 (Status: affected)
- 15.1(1)XB (Status: affected)
- 12.2(33)SRE1 (Status: affected)
- 12.2(33)SRE2 (Status: affected)
- 12.2(33)SRE3 (Status: affected)
- 12.2(33)SRE4 (Status: affected)
- 12.2(33)SRE (Status: affected)
- 12.2(33)SRE0a (Status: affected)
- 12.2(33)SRE5 (Status: affected)
- 12.2(33)SRE6 (Status: affected)
- 12.2(33)SRE8 (Status: affected)
- 12.2(33)SRE7 (Status: affected)
- 12.2(33)SRE9 (Status: affected)
- 12.2(33)SRE7a (Status: affected)
- 12.2(33)SRE10 (Status: affected)
- 12.2(33)SRE11 (Status: affected)
- 12.2(33)SRE9a (Status: affected)
- 12.2(33)SRE12 (Status: affected)
- 12.2(33)SRE13 (Status: affected)
- 12.2(33)SRE14 (Status: affected)
- 12.2(33)SRE15 (Status: affected)
- 12.2(33)SRE15a (Status: affected)
- 15.0(1)XO1 (Status: affected)
- 15.0(1)XO (Status: affected)
- 15.0(2)XO (Status: affected)
- 15.0(1)S2 (Status: affected)
- 15.0(1)S1 (Status: affected)
- 15.0(1)S (Status: affected)
- 15.0(1)S3a (Status: affected)
- 15.0(1)S4 (Status: affected)
- 15.0(1)S5 (Status: affected)
- 15.0(1)S4a (Status: affected)
- 15.0(1)S6 (Status: affected)
- 12.2(33)IRD (Status: affected)
- 12.2(33)IRE (Status: affected)
- 12.2(33)IRE2 (Status: affected)
- 12.2(33)IRE1 (Status: affected)
- 12.2(33)MRA (Status: affected)
- 12.2(33)MRB5 (Status: affected)
- 12.2(33)MRB2 (Status: affected)
- 12.2(33)MRB1 (Status: affected)
- 12.2(33)MRB4 (Status: affected)
- 12.2(33)MRB (Status: affected)
- 12.2(33)MRB3 (Status: affected)
- 12.2(33)MRB6 (Status: affected)
- 12.4(21a)JHA (Status: affected)
- 15.2(1)S (Status: affected)
- 15.2(2)S (Status: affected)
- 15.2(1)S1 (Status: affected)
- 15.2(4)S (Status: affected)
- 15.2(1)S2 (Status: affected)
- 15.2(2)S1 (Status: affected)
- 15.2(2)S2 (Status: affected)
- 15.2(2)S0a (Status: affected)
- 15.2(2)S0c (Status: affected)
- 15.2(4)S1 (Status: affected)
- 15.2(4)S4 (Status: affected)
- 15.2(4)S6 (Status: affected)
- 15.2(4)S2 (Status: affected)
- 15.2(4)S5 (Status: affected)
- 15.2(4)S3 (Status: affected)
- 15.2(4)S3a (Status: affected)
- 15.2(4)S4a (Status: affected)
- 15.2(4)S7 (Status: affected)
- 15.3(1)T (Status: affected)
- 15.3(2)T (Status: affected)
- 15.3(1)T1 (Status: affected)
- 15.3(1)T2 (Status: affected)
- 15.3(1)T3 (Status: affected)
- 15.3(1)T4 (Status: affected)
- 15.3(2)T1 (Status: affected)
- 15.3(2)T2 (Status: affected)
- 15.3(2)T3 (Status: affected)
- 15.3(2)T4 (Status: affected)
- 12.4(10b)JDE (Status: affected)
- 15.0(1)EY (Status: affected)
- 15.0(1)EY1 (Status: affected)
- 15.0(1)EY2 (Status: affected)
- 15.0(2)EY (Status: affected)
- 15.0(2)EY1 (Status: affected)
- 15.0(2)EY2 (Status: affected)
- 15.0(2)EY3 (Status: affected)
- 12.4(20)MRB (Status: affected)
- 12.4(20)MRB1 (Status: affected)
- 12.3(8)JEE (Status: affected)
- 12.2(54)WO (Status: affected)
- 15.1(2)S (Status: affected)
- 15.1(1)S (Status: affected)
- 15.1(1)S1 (Status: affected)
- 15.1(3)S (Status: affected)
- 15.1(1)S2 (Status: affected)
- 15.1(2)S1 (Status: affected)
- 15.1(2)S2 (Status: affected)
- 15.1(3)S1 (Status: affected)
- 15.1(3)S0a (Status: affected)
- 15.1(3)S2 (Status: affected)
- 15.1(3)S4 (Status: affected)
- 15.1(3)S3 (Status: affected)
- 15.1(3)S5 (Status: affected)
- 15.1(3)S6 (Status: affected)
- 15.1(3)S5a (Status: affected)
- 15.1(4)M3 (Status: affected)
- 15.1(4)M (Status: affected)
- 15.1(4)M1 (Status: affected)
- 15.1(4)M2 (Status: affected)
- 15.1(4)M6 (Status: affected)
- 15.1(4)M5 (Status: affected)
- 15.1(4)M4 (Status: affected)
- 15.1(4)M7 (Status: affected)
- 15.1(4)M3a (Status: affected)
- 15.1(4)M10 (Status: affected)
- 15.1(4)M8 (Status: affected)
- 15.1(4)M9 (Status: affected)
- 12.2(33)IRF (Status: affected)
- 12.4(3g)JMC1 (Status: affected)
- 12.4(3g)JMC (Status: affected)
- 12.4(3g)JMC2 (Status: affected)
- 15.0(1)SE (Status: affected)
- 15.0(2)SE (Status: affected)
- 15.0(1)SE1 (Status: affected)
- 15.0(1)SE2 (Status: affected)
- 15.0(1)SE3 (Status: affected)
- 15.0(2)SE1 (Status: affected)
- 15.0(2)SE2 (Status: affected)
- 15.0(2)SE3 (Status: affected)
- 15.0(2)SE4 (Status: affected)
- 15.0(2)SE5 (Status: affected)
- 15.0(2)SE6 (Status: affected)
- 15.0(2)SE7 (Status: affected)
- 15.0(2)SE8 (Status: affected)
- 15.0(2)SE9 (Status: affected)
- 15.0(2)SE10 (Status: affected)
- 15.0(2)SE11 (Status: affected)
- 15.0(2)SE10a (Status: affected)
- 15.0(2)SE12 (Status: affected)
- 15.0(2)SE13 (Status: affected)
- 15.1(2)GC (Status: affected)
- 15.1(2)GC1 (Status: affected)
- 15.1(2)GC2 (Status: affected)
- 15.1(4)GC (Status: affected)
- 15.1(4)GC1 (Status: affected)
- 15.1(4)GC2 (Status: affected)
- 15.0(1)SY (Status: affected)
- 15.0(1)SY1 (Status: affected)
- 15.0(1)SY2 (Status: affected)
- 15.0(1)SY3 (Status: affected)
- 15.0(1)SY4 (Status: affected)
- 15.0(1)SY5 (Status: affected)
- 15.0(1)SY6 (Status: affected)
- 15.0(1)SY7 (Status: affected)
- 15.0(1)SY8 (Status: affected)
- 15.0(1)SY7a (Status: affected)
- 15.0(1)SY9 (Status: affected)
- 15.0(1)SY10 (Status: affected)
- 12.2(33)SXJ (Status: affected)
- 12.2(33)SXJ1 (Status: affected)
- 12.2(33)SXJ2 (Status: affected)
- 12.2(33)SXJ3 (Status: affected)
- 12.2(33)SXJ4 (Status: affected)
- 12.2(33)SXJ5 (Status: affected)
- 12.2(33)SXJ6 (Status: affected)
- 12.2(33)SXJ7 (Status: affected)
- 12.2(33)SXJ8 (Status: affected)
- 12.2(33)SXJ9 (Status: affected)
- 12.2(33)SXJ10 (Status: affected)
- 15.1(1)SG (Status: affected)
- 15.1(2)SG (Status: affected)
- 15.1(1)SG1 (Status: affected)
- 15.1(1)SG2 (Status: affected)
- 15.1(2)SG1 (Status: affected)
- 15.1(2)SG2 (Status: affected)
- 15.1(2)SG3 (Status: affected)
- 15.1(2)SG4 (Status: affected)
- 15.1(2)SG5 (Status: affected)
- 15.1(2)SG6 (Status: affected)
- 15.1(2)SG7 (Status: affected)
- 15.1(2)SG8 (Status: affected)
- 15.0(1)MR (Status: affected)
- 15.0(2)MR (Status: affected)
- 12.2(33)SCF (Status: affected)
- 12.2(33)SCF1 (Status: affected)
- 12.2(33)SCF2 (Status: affected)
- 12.2(33)SCF3 (Status: affected)
- 12.2(33)SCF4 (Status: affected)
- 12.2(33)SCF5 (Status: affected)
- 15.2(4)M (Status: affected)
- 15.2(4)M1 (Status: affected)
- 15.2(4)M2 (Status: affected)
- 15.2(4)M4 (Status: affected)
- 15.2(4)M3 (Status: affected)
- 15.2(4)M5 (Status: affected)
- 15.2(4)M8 (Status: affected)
- 15.2(4)M10 (Status: affected)
- 15.2(4)M7 (Status: affected)
- 15.2(4)M6 (Status: affected)
- 15.2(4)M9 (Status: affected)
- 15.2(4)M6a (Status: affected)
- 15.2(4)M11 (Status: affected)
- 12.2(33)SCE (Status: affected)
- 12.2(33)SCE1 (Status: affected)
- 12.2(33)SCE2 (Status: affected)
- 12.2(33)SCE3 (Status: affected)
- 12.2(33)SCE4 (Status: affected)
- 12.2(33)SCE5 (Status: affected)
- 12.2(33)SCE6 (Status: affected)
- 15.0(2)SG (Status: affected)
- 15.0(2)SG1 (Status: affected)
- 15.0(2)SG2 (Status: affected)
- 15.0(2)SG3 (Status: affected)
- 15.0(2)SG4 (Status: affected)
- 15.0(2)SG5 (Status: affected)
- 15.0(2)SG6 (Status: affected)
- 15.0(2)SG7 (Status: affected)
- 15.0(2)SG8 (Status: affected)
- 15.0(2)SG9 (Status: affected)
- 15.0(2)SG10 (Status: affected)
- 15.0(2)SG11 (Status: affected)
- 12.4(24)MDB (Status: affected)
- 12.4(24)MDB1 (Status: affected)
- 12.4(24)MDB3 (Status: affected)
- 12.4(24)MDB4 (Status: affected)
- 12.4(24)MDB5 (Status: affected)
- 12.4(24)MDB6 (Status: affected)
- 12.4(24)MDB7 (Status: affected)
- 12.4(24)MDB5a (Status: affected)
- 12.4(24)MDB8 (Status: affected)
- 12.4(24)MDB9 (Status: affected)
- 12.4(24)MDB10 (Status: affected)
- 12.4(24)MDB11 (Status: affected)
- 12.4(24)MDB12 (Status: affected)
- 12.4(24)MDB13 (Status: affected)
- 12.4(24)MDB14 (Status: affected)
- 12.4(24)MDB15 (Status: affected)
- 12.4(24)MDB16 (Status: affected)
- 12.4(24)MDB17 (Status: affected)
- 12.4(24)MDB18 (Status: affected)
- 12.4(24)MDB19 (Status: affected)
- 12.2(33)IRG (Status: affected)
- 12.2(33)IRG1 (Status: affected)
- 12.4(21a)JHC (Status: affected)
- 15.0(1)EX (Status: affected)
- 15.0(2)EX (Status: affected)
- 15.0(2)EX1 (Status: affected)
- 15.0(2)EX2 (Status: affected)
- 15.0(2)EX3 (Status: affected)
- 15.0(2)EX4 (Status: affected)
- 15.0(2)EX5 (Status: affected)
- 15.0(2)EX8 (Status: affected)
- 15.0(2a)EX5 (Status: affected)
- 15.0(2)EX10 (Status: affected)
- 15.0(2)EX11 (Status: affected)
- 15.0(2)EX13 (Status: affected)
- 15.0(2)EX12 (Status: affected)
- 15.2(1)GC (Status: affected)
- 15.2(1)GC1 (Status: affected)
- 15.2(1)GC2 (Status: affected)
- 15.2(2)GC (Status: affected)
- 15.2(3)GC (Status: affected)
- 15.2(3)GC1 (Status: affected)
- 15.2(4)GC (Status: affected)
- 15.2(4)GC1 (Status: affected)
- 15.2(4)GC2 (Status: affected)
- 15.2(4)GC3 (Status: affected)
- 12.4(25d)JAX (Status: affected)
- 12.4(25d)JAX1 (Status: affected)
- 12.4(25e)JAX (Status: affected)
- 12.4(25e)JAX1 (Status: affected)
- 12.4(25e)JAX2 (Status: affected)
- 12.2(33)SCG (Status: affected)
- 12.2(33)SCG1 (Status: affected)
- 12.2(33)SCG2 (Status: affected)
- 12.2(33)SCG3 (Status: affected)
- 12.2(33)SCG4 (Status: affected)
- 12.2(33)SCG5 (Status: affected)
- 12.2(33)SCG6 (Status: affected)
- 12.2(33)SCG7 (Status: affected)
- 12.2(33)IRH (Status: affected)
- 12.2(33)IRH1 (Status: affected)
- 15.1(1)SY (Status: affected)
- 15.1(1)SY1 (Status: affected)
- 15.1(2)SY (Status: affected)
- 15.1(2)SY1 (Status: affected)
- 15.1(2)SY2 (Status: affected)
- 15.1(1)SY2 (Status: affected)
- 15.1(1)SY3 (Status: affected)
- 15.1(2)SY3 (Status: affected)
- 15.1(1)SY4 (Status: affected)
- 15.1(2)SY4 (Status: affected)
- 15.1(1)SY5 (Status: affected)
- 15.1(2)SY5 (Status: affected)
- 15.1(2)SY4a (Status: affected)
- 15.1(1)SY6 (Status: affected)
- 15.1(2)SY6 (Status: affected)
- 15.1(2)SY7 (Status: affected)
- 15.1(2)SY8 (Status: affected)
- 15.1(2)SY9 (Status: affected)
- 15.1(2)SY10 (Status: affected)
- 15.1(2)SY11 (Status: affected)
- 15.1(2)SY12 (Status: affected)
- 15.1(2)SY13 (Status: affected)
- 15.1(2)SY14 (Status: affected)
- 15.1(2)SY15 (Status: affected)
- 15.1(2)SY16 (Status: affected)
- 15.3(1)S (Status: affected)
- 15.3(2)S (Status: affected)
- 15.3(3)S (Status: affected)
- 15.3(1)S2 (Status: affected)
- 15.3(1)S1 (Status: affected)
- 15.3(2)S2 (Status: affected)
- 15.3(2)S1 (Status: affected)
- 15.3(3)S1 (Status: affected)
- 15.3(3)S2 (Status: affected)
- 15.3(3)S3 (Status: affected)
- 15.3(3)S6 (Status: affected)
- 15.3(3)S4 (Status: affected)
- 15.3(3)S1a (Status: affected)
- 15.3(3)S5 (Status: affected)
- 15.3(3)S7 (Status: affected)
- 15.3(3)S8 (Status: affected)
- 15.3(3)S9 (Status: affected)
- 15.3(3)S10 (Status: affected)
- 15.3(3)S8a (Status: affected)
- 15.4(1)T (Status: affected)
- 15.4(2)T (Status: affected)
- 15.4(1)T2 (Status: affected)
- 15.4(1)T1 (Status: affected)
- 15.4(1)T3 (Status: affected)
- 15.4(2)T1 (Status: affected)
- 15.4(2)T3 (Status: affected)
- 15.4(2)T2 (Status: affected)
- 15.4(1)T4 (Status: affected)
- 15.4(2)T4 (Status: affected)
- 12.4(25e)JAZ (Status: affected)
- 12.2(33)SCH (Status: affected)
- 12.2(33)SCH1 (Status: affected)
- 12.2(33)SCH2 (Status: affected)
- 12.2(33)SCH0a (Status: affected)
- 12.2(33)SCH3 (Status: affected)
- 12.2(33)SCH2a (Status: affected)
- 12.2(33)SCH4 (Status: affected)
- 12.2(33)SCH5 (Status: affected)
- 12.2(33)SCH6 (Status: affected)
- 12.4(25e)JAL (Status: affected)
- 12.4(25e)JAL1 (Status: affected)
- 12.4(25e)JAL2 (Status: affected)
- 12.4(25e)JAL1a (Status: affected)
- 12.4(25e)JAM (Status: affected)
- 12.4(25e)JAM2 (Status: affected)
- 12.4(25e)JAM3 (Status: affected)
- 12.4(25e)JAM4 (Status: affected)
- 12.4(25e)JAM5 (Status: affected)
- 12.4(25e)JAM6 (Status: affected)
- 15.0(2)EA (Status: affected)
- 15.0(2)EA1 (Status: affected)
- 15.2(1)E (Status: affected)
- 15.2(2)E (Status: affected)
- 15.2(1)E1 (Status: affected)
- 15.2(3)E (Status: affected)
- 15.2(1)E2 (Status: affected)
- 15.2(1)E3 (Status: affected)
- 15.2(2)E1 (Status: affected)
- 15.2(4)E (Status: affected)
- 15.2(3)E1 (Status: affected)
- 15.2(2)E2 (Status: affected)
- 15.2(2a)E1 (Status: affected)
- 15.2(2)E3 (Status: affected)
- 15.2(2a)E2 (Status: affected)
- 15.2(3)E2 (Status: affected)
- 15.2(3a)E (Status: affected)
- 15.2(3)E3 (Status: affected)
- 15.2(4)E1 (Status: affected)
- 15.2(2)E4 (Status: affected)
- 15.2(2)E5 (Status: affected)
- 15.2(4)E2 (Status: affected)
- 15.2(3)E4 (Status: affected)
- 15.2(5)E (Status: affected)
- 15.2(4)E3 (Status: affected)
- 15.2(2)E6 (Status: affected)
- 15.2(5a)E (Status: affected)
- 15.2(5)E1 (Status: affected)
- 15.2(5b)E (Status: affected)
- 15.2(2)E5a (Status: affected)
- 15.2(5c)E (Status: affected)
- 15.2(2)E5b (Status: affected)
- 15.2(5a)E1 (Status: affected)
- 15.2(4)E4 (Status: affected)
- 15.2(2)E7 (Status: affected)
- 15.2(5)E2 (Status: affected)
- 15.2(6)E (Status: affected)
- 15.2(4)E5 (Status: affected)
- 15.2(5)E2c (Status: affected)
- 15.2(2)E8 (Status: affected)
- 15.2(6)E0a (Status: affected)
- 15.2(6)E1 (Status: affected)
- 15.2(6)E0c (Status: affected)
- 15.2(4)E6 (Status: affected)
- 15.2(6)E2 (Status: affected)
- 15.2(2)E9 (Status: affected)
- 15.2(4)E7 (Status: affected)
- 15.2(7)E (Status: affected)
- 15.2(2)E10 (Status: affected)
- 15.2(4)E8 (Status: affected)
- 15.2(6)E2a (Status: affected)
- 15.2(6)E2b (Status: affected)
- 15.2(7)E1 (Status: affected)
- 15.2(7)E0a (Status: affected)
- 15.2(7)E0b (Status: affected)
- 15.2(7)E0s (Status: affected)
- 15.2(6)E3 (Status: affected)
- 15.2(4)E9 (Status: affected)
- 15.2(7)E2 (Status: affected)
- 15.2(7a)E0b (Status: affected)
- 15.2(4)E10 (Status: affected)
- 15.2(7)E3 (Status: affected)
- 15.2(7)E1a (Status: affected)
- 15.2(7b)E0b (Status: affected)
- 15.2(7)E2a (Status: affected)
- 15.2(4)E10a (Status: affected)
- 15.2(7)E4 (Status: affected)
- 15.2(7)E3k (Status: affected)
- 15.2(8)E (Status: affected)
- 15.2(8)E1 (Status: affected)
- 15.2(7)E5 (Status: affected)
- 15.2(7)E6 (Status: affected)
- 15.2(8)E2 (Status: affected)
- 15.2(4)E10d (Status: affected)
- 15.2(7)E7 (Status: affected)
- 15.2(8)E3 (Status: affected)
- 15.2(7)E8 (Status: affected)
- 15.2(8)E4 (Status: affected)
- 15.2(7)E9 (Status: affected)
- 15.2(8)E5 (Status: affected)
- 15.2(8)E6 (Status: affected)
- 15.2(7)E10 (Status: affected)
- 15.2(7)E11 (Status: affected)
- 15.1(3)MRA (Status: affected)
- 15.1(3)MRA1 (Status: affected)
- 15.1(3)MRA2 (Status: affected)
- 15.1(3)MRA3 (Status: affected)
- 15.1(3)MRA4 (Status: affected)
- 15.1(3)SVB1 (Status: affected)
- 15.1(3)SVB2 (Status: affected)
- 15.2(2)JB (Status: affected)
- 15.2(2)JB2 (Status: affected)
- 15.2(4)JB (Status: affected)
- 15.2(2)JB3 (Status: affected)
- 15.2(4)JB1 (Status: affected)
- 15.2(4)JB2 (Status: affected)
- 15.2(4)JB3 (Status: affected)
- 15.2(4)JB3a (Status: affected)
- 15.2(2)JB4 (Status: affected)
- 15.2(4)JB4 (Status: affected)
- 15.2(4)JB3h (Status: affected)
- 15.2(4)JB3b (Status: affected)
- 15.2(4)JB3s (Status: affected)
- 15.2(4)JB5h (Status: affected)
- 15.2(4)JB5 (Status: affected)
- 15.2(4)JB5m (Status: affected)
- 15.2(4)JB6 (Status: affected)
- 15.2(2)JB5 (Status: affected)
- 15.2(2)JB6 (Status: affected)
- 15.4(1)S (Status: affected)
- 15.4(2)S (Status: affected)
- 15.4(3)S (Status: affected)
- 15.4(1)S1 (Status: affected)
- 15.4(1)S2 (Status: affected)
- 15.4(2)S1 (Status: affected)
- 15.4(1)S3 (Status: affected)
- 15.4(3)S1 (Status: affected)
- 15.4(2)S2 (Status: affected)
- 15.4(3)S2 (Status: affected)
- 15.4(3)S3 (Status: affected)
- 15.4(1)S4 (Status: affected)
- 15.4(2)S3 (Status: affected)
- 15.4(2)S4 (Status: affected)
- 15.4(3)S4 (Status: affected)
- 15.4(3)S5 (Status: affected)
- 15.4(3)S6 (Status: affected)
- 15.4(3)S7 (Status: affected)
- 15.4(3)S6a (Status: affected)
- 15.4(3)S8 (Status: affected)
- 15.4(3)S9 (Status: affected)
- 15.4(3)S10 (Status: affected)
- 15.2(2)JAX (Status: affected)
- 15.3(3)M (Status: affected)
- 15.3(3)M1 (Status: affected)
- 15.3(3)M2 (Status: affected)
- 15.3(3)M3 (Status: affected)
- 15.3(3)M5 (Status: affected)
- 15.3(3)M4 (Status: affected)
- 15.3(3)M6 (Status: affected)
- 15.3(3)M7 (Status: affected)
- 15.3(3)M8 (Status: affected)
- 15.3(3)M9 (Status: affected)
- 15.3(3)M10 (Status: affected)
- 15.3(3)M8a (Status: affected)
- 15.2(4)JN (Status: affected)
- 15.0(2)EZ (Status: affected)
- 15.1(3)SVD (Status: affected)
- 15.1(3)SVD1 (Status: affected)
- 15.1(3)SVD2 (Status: affected)
- 15.2(1)EY (Status: affected)
- 15.0(2)EJ (Status: affected)
- 15.0(2)EJ1 (Status: affected)
- 15.2(1)SY (Status: affected)
- 15.2(1)SY1 (Status: affected)
- 15.2(1)SY0a (Status: affected)
- 15.2(1)SY2 (Status: affected)
- 15.2(2)SY (Status: affected)
- 15.2(1)SY1a (Status: affected)
- 15.2(2)SY1 (Status: affected)
- 15.2(2)SY2 (Status: affected)
- 15.2(1)SY3 (Status: affected)
- 15.2(1)SY4 (Status: affected)
- 15.2(2)SY3 (Status: affected)
- 15.2(1)SY5 (Status: affected)
- 15.2(1)SY6 (Status: affected)
- 15.2(1)SY7 (Status: affected)
- 15.2(1)SY8 (Status: affected)
- 15.2(5)EX (Status: affected)
- 15.1(3)SVF (Status: affected)
- 15.1(3)SVF1 (Status: affected)
- 15.1(3)SVE (Status: affected)
- 12.4(25e)JAO (Status: affected)
- 12.4(25e)JAO1 (Status: affected)
- 12.4(25e)JAO2 (Status: affected)
- 12.4(25e)JAO3 (Status: affected)
- 12.4(25e)JAO4 (Status: affected)
- 12.4(25e)JAO5 (Status: affected)
- 12.4(25e)JAO6 (Status: affected)
- 15.0(2)EK (Status: affected)
- 15.0(2)EK1 (Status: affected)
- 15.4(1)CG (Status: affected)
- 15.4(1)CG1 (Status: affected)
- 15.4(2)CG (Status: affected)
- 15.5(1)S (Status: affected)
- 15.5(2)S (Status: affected)
- 15.5(1)S1 (Status: affected)
- 15.5(3)S (Status: affected)
- 15.5(1)S2 (Status: affected)
- 15.5(1)S3 (Status: affected)
- 15.5(2)S1 (Status: affected)
- 15.5(2)S2 (Status: affected)
- 15.5(3)S1 (Status: affected)
- 15.5(3)S1a (Status: affected)
- 15.5(2)S3 (Status: affected)
- 15.5(3)S2 (Status: affected)
- 15.5(3)S0a (Status: affected)
- 15.5(3)S3 (Status: affected)
- 15.5(1)S4 (Status: affected)
- 15.5(2)S4 (Status: affected)
- 15.5(3)S4 (Status: affected)
- 15.5(3)S5 (Status: affected)
- 15.5(3)S6 (Status: affected)
- 15.5(3)S6a (Status: affected)
- 15.5(3)S7 (Status: affected)
- 15.5(3)S6b (Status: affected)
- 15.5(3)S8 (Status: affected)
- 15.5(3)S9 (Status: affected)
- 15.5(3)S10 (Status: affected)
- 15.5(3)S9a (Status: affected)
- 15.1(3)SVG (Status: affected)
- 15.2(2)EB (Status: affected)
- 15.2(2)EB1 (Status: affected)
- 15.2(2)EB2 (Status: affected)
- 15.2(6)EB (Status: affected)
- 15.5(1)T (Status: affected)
- 15.5(1)T1 (Status: affected)
- 15.5(2)T (Status: affected)
- 15.5(1)T2 (Status: affected)
- 15.5(1)T3 (Status: affected)
- 15.5(2)T1 (Status: affected)
- 15.5(2)T2 (Status: affected)
- 15.5(2)T3 (Status: affected)
- 15.5(2)T4 (Status: affected)
- 15.5(1)T4 (Status: affected)
- 15.2(2)EA (Status: affected)
- 15.2(2)EA1 (Status: affected)
- 15.2(2)EA2 (Status: affected)
- 15.2(3)EA (Status: affected)
- 15.2(4)EA (Status: affected)
- 15.2(4)EA1 (Status: affected)
- 15.2(2)EA3 (Status: affected)
- 15.2(4)EA3 (Status: affected)
- 15.2(5)EA (Status: affected)
- 15.2(4)EA4 (Status: affected)
- 15.2(4)EA5 (Status: affected)
- 15.2(4)EA6 (Status: affected)
- 15.2(4)EA7 (Status: affected)
- 15.2(4)EA8 (Status: affected)
- 15.2(4)EA9 (Status: affected)
- 15.2(4)EA9a (Status: affected)
- 15.3(3)JN3 (Status: affected)
- 15.3(3)JN4 (Status: affected)
- 15.3(3)JN7 (Status: affected)
- 15.3(3)JN8 (Status: affected)
- 15.3(3)JN9 (Status: affected)
- 15.5(3)M (Status: affected)
- 15.5(3)M1 (Status: affected)
- 15.5(3)M0a (Status: affected)
- 15.5(3)M2 (Status: affected)
- 15.5(3)M3 (Status: affected)
- 15.5(3)M4 (Status: affected)
- 15.5(3)M4a (Status: affected)
- 15.5(3)M5 (Status: affected)
- 15.5(3)M6 (Status: affected)
- 15.5(3)M7 (Status: affected)
- 15.5(3)M6a (Status: affected)
- 15.5(3)M8 (Status: affected)
- 15.5(3)M9 (Status: affected)
- 15.5(3)M10 (Status: affected)
- 12.2(33)SCI (Status: affected)
- 12.2(33)SCI1 (Status: affected)
- 12.2(33)SCI1a (Status: affected)
- 12.2(33)SCI2 (Status: affected)
- 12.2(33)SCI3 (Status: affected)
- 12.2(33)SCI2a (Status: affected)
- 12.4(25e)JAP (Status: affected)
- 12.4(25e)JAP1 (Status: affected)
- 12.4(25e)JAP4 (Status: affected)
- 12.4(25e)JAP5 (Status: affected)
- 12.4(25e)JAP6 (Status: affected)
- 12.4(25e)JAP1n (Status: affected)
- 12.4(25e)JAP7 (Status: affected)
- 12.4(25e)JAP8 (Status: affected)
- 12.4(25e)JAP10 (Status: affected)
- 12.4(25e)JAP11 (Status: affected)
- 12.4(25e)JAP12 (Status: affected)
- 15.3(3)JA (Status: affected)
- 15.3(3)JA1m (Status: affected)
- 15.3(3)JA1 (Status: affected)
- 15.3(3)JA4 (Status: affected)
- 15.3(3)JA5 (Status: affected)
- 15.3(3)JA6 (Status: affected)
- 15.3(3)JA7 (Status: affected)
- 15.3(3)JA8 (Status: affected)
- 15.3(3)JA10 (Status: affected)
- 15.3(3)JA11 (Status: affected)
- 15.3(3)JA12 (Status: affected)
- 15.3(3)JAA (Status: affected)
- 15.3(3)JAA11 (Status: affected)
- 15.3(3)JAA12 (Status: affected)
- 15.3(3)JAB (Status: affected)
- 15.3(3)JB (Status: affected)
- 15.5(3)SN (Status: affected)
- 15.0(2)SQD (Status: affected)
- 15.0(2)SQD1 (Status: affected)
- 15.0(2)SQD2 (Status: affected)
- 15.0(2)SQD3 (Status: affected)
- 15.0(2)SQD4 (Status: affected)
- 15.0(2)SQD5 (Status: affected)
- 15.0(2)SQD6 (Status: affected)
- 15.0(2)SQD7 (Status: affected)
- 15.0(2)SQD8 (Status: affected)
- 15.6(1)S (Status: affected)
- 15.6(2)S (Status: affected)
- 15.6(2)S1 (Status: affected)
- 15.6(1)S1 (Status: affected)
- 15.6(1)S2 (Status: affected)
- 15.6(2)S2 (Status: affected)
- 15.6(1)S3 (Status: affected)
- 15.6(2)S3 (Status: affected)
- 15.6(1)S4 (Status: affected)
- 15.6(2)S4 (Status: affected)
- 15.6(1)T (Status: affected)
- 15.6(2)T (Status: affected)
- 15.6(1)T0a (Status: affected)
- 15.6(1)T1 (Status: affected)
- 15.6(2)T1 (Status: affected)
- 15.6(1)T2 (Status: affected)
- 15.6(2)T2 (Status: affected)
- 15.6(1)T3 (Status: affected)
- 15.6(2)T3 (Status: affected)
- 15.3(3)JNB (Status: affected)
- 15.3(3)JNB1 (Status: affected)
- 15.3(3)JNB2 (Status: affected)
- 15.3(3)JNB3 (Status: affected)
- 15.3(3)JNB4 (Status: affected)
- 15.3(3)JNB6 (Status: affected)
- 15.3(3)JNB5 (Status: affected)
- 15.3(3)JAX (Status: affected)
- 15.3(3)JAX1 (Status: affected)
- 15.3(3)JAX2 (Status: affected)
- 15.3(3)JBB (Status: affected)
- 15.3(3)JBB1 (Status: affected)
- 15.3(3)JBB2 (Status: affected)
- 15.3(3)JBB4 (Status: affected)
- 15.3(3)JBB5 (Status: affected)
- 15.3(3)JBB6 (Status: affected)
- 15.3(3)JBB8 (Status: affected)
- 15.3(3)JBB6a (Status: affected)
- 15.3(3)JC (Status: affected)
- 15.3(3)JC1 (Status: affected)
- 15.3(3)JC2 (Status: affected)
- 15.3(3)JC3 (Status: affected)
- 15.3(3)JC4 (Status: affected)
- 15.3(3)JC5 (Status: affected)
- 15.3(3)JC6 (Status: affected)
- 15.3(3)JC8 (Status: affected)
- 15.3(3)JC9 (Status: affected)
- 15.3(3)JC14 (Status: affected)
- 15.3(1)SY (Status: affected)
- 15.3(1)SY1 (Status: affected)
- 15.3(1)SY2 (Status: affected)
- 15.3(3)JNC (Status: affected)
- 15.3(3)JNC1 (Status: affected)
- 15.3(3)JNC2 (Status: affected)
- 15.3(3)JNC3 (Status: affected)
- 15.3(3)JNC4 (Status: affected)
- 12.2(33)SCJ (Status: affected)
- 12.2(33)SCJ1a (Status: affected)
- 12.2(33)SCJ2 (Status: affected)
- 12.2(33)SCJ2a (Status: affected)
- 12.2(33)SCJ2b (Status: affected)
- 12.2(33)SCJ2c (Status: affected)
- 12.2(33)SCJ3 (Status: affected)
- 12.2(33)SCJ4 (Status: affected)
- 15.3(3)JNP (Status: affected)
- 15.3(3)JNP1 (Status: affected)
- 15.3(3)JNP3 (Status: affected)
- 15.6(2)SP (Status: affected)
- 15.6(2)SP1 (Status: affected)
- 15.6(2)SP2 (Status: affected)
- 15.6(2)SP3 (Status: affected)
- 15.6(2)SP4 (Status: affected)
- 15.6(2)SP5 (Status: affected)
- 15.6(2)SP6 (Status: affected)
- 15.6(2)SP7 (Status: affected)
- 15.6(2)SP8 (Status: affected)
- 15.6(2)SP9 (Status: affected)
- 15.6(2)SN (Status: affected)
- 15.3(3)JPB (Status: affected)
- 15.3(3)JPB1 (Status: affected)
- 15.3(3)JD (Status: affected)
- 15.3(3)JD2 (Status: affected)
- 15.3(3)JD3 (Status: affected)
- 15.3(3)JD4 (Status: affected)
- 15.3(3)JD5 (Status: affected)
- 15.3(3)JD6 (Status: affected)
- 15.3(3)JD7 (Status: affected)
- 15.3(3)JD8 (Status: affected)
- 15.3(3)JD9 (Status: affected)
- 15.3(3)JD11 (Status: affected)
- 15.3(3)JD13 (Status: affected)
- 15.3(3)JD14 (Status: affected)
- 15.3(3)JD16 (Status: affected)
- 15.3(3)JD17 (Status: affected)
- 15.6(3)M (Status: affected)
- 15.6(3)M1 (Status: affected)
- 15.6(3)M0a (Status: affected)
- 15.6(3)M1b (Status: affected)
- 15.6(3)M2 (Status: affected)
- 15.6(3)M2a (Status: affected)
- 15.6(3)M3 (Status: affected)
- 15.6(3)M3a (Status: affected)
- 15.6(3)M4 (Status: affected)
- 15.6(3)M5 (Status: affected)
- 15.6(3)M6 (Status: affected)
- 15.6(3)M7 (Status: affected)
- 15.6(3)M6a (Status: affected)
- 15.6(3)M6b (Status: affected)
- 15.6(3)M8 (Status: affected)
- 15.6(3)M9 (Status: affected)
- 15.1(3)SVJ2 (Status: affected)
- 15.2(4)EC1 (Status: affected)
- 15.2(4)EC2 (Status: affected)
- 15.3(3)JPC (Status: affected)
- 15.3(3)JPC1 (Status: affected)
- 15.3(3)JPC2 (Status: affected)
- 15.3(3)JPC3 (Status: affected)
- 15.3(3)JPC100 (Status: affected)
- 15.3(3)JPC5 (Status: affected)
- 15.3(3)JND (Status: affected)
- 15.3(3)JND1 (Status: affected)
- 15.3(3)JND2 (Status: affected)
- 15.3(3)JND3 (Status: affected)
- 15.4(1)SY (Status: affected)
- 15.4(1)SY1 (Status: affected)
- 15.4(1)SY2 (Status: affected)
- 15.4(1)SY3 (Status: affected)
- 15.4(1)SY4 (Status: affected)
- 15.3(3)JE (Status: affected)
- 15.3(3)JPD (Status: affected)
- 15.3(3)JDA7 (Status: affected)
- 15.3(3)JDA8 (Status: affected)
- 15.3(3)JDA9 (Status: affected)
- 15.3(3)JDA11 (Status: affected)
- 15.3(3)JDA13 (Status: affected)
- 15.3(3)JDA14 (Status: affected)
- 15.3(3)JDA16 (Status: affected)
- 15.3(3)JDA17 (Status: affected)
- 15.5(1)SY (Status: affected)
- 15.5(1)SY1 (Status: affected)
- 15.5(1)SY2 (Status: affected)
- 15.5(1)SY3 (Status: affected)
- 15.5(1)SY4 (Status: affected)
- 15.5(1)SY5 (Status: affected)
- 15.5(1)SY6 (Status: affected)
- 15.5(1)SY7 (Status: affected)
- 15.5(1)SY8 (Status: affected)
- 15.5(1)SY9 (Status: affected)
- 15.5(1)SY10 (Status: affected)
- 15.5(1)SY11 (Status: affected)
- 15.5(1)SY12 (Status: affected)
- 15.5(1)SY13 (Status: affected)
- 15.5(1)SY14 (Status: affected)
- 15.3(3)JF (Status: affected)
- 15.3(3)JF1 (Status: affected)
- 15.3(3)JF2 (Status: affected)
- 15.3(3)JF4 (Status: affected)
- 15.3(3)JF5 (Status: affected)
- 15.3(3)JF6 (Status: affected)
- 15.3(3)JF7 (Status: affected)
- 15.3(3)JF8 (Status: affected)
- 15.3(3)JF9 (Status: affected)
- 15.3(3)JF10 (Status: affected)
- 15.3(3)JF11 (Status: affected)
- 15.3(3)JF12 (Status: affected)
- 15.3(3)JF12i (Status: affected)
- 15.3(3)JF14 (Status: affected)
- 15.3(3)JF14i (Status: affected)
- 15.3(3)JF15 (Status: affected)
- 15.3(3)JCA7 (Status: affected)
- 15.3(3)JCA8 (Status: affected)
- 15.3(3)JCA9 (Status: affected)
- 15.7(3)M (Status: affected)
- 15.7(3)M1 (Status: affected)
- 15.7(3)M0a (Status: affected)
- 15.7(3)M3 (Status: affected)
- 15.7(3)M2 (Status: affected)
- 15.7(3)M4 (Status: affected)
- 15.7(3)M5 (Status: affected)
- 15.7(3)M4a (Status: affected)
- 15.7(3)M4b (Status: affected)
- 15.7(3)M6 (Status: affected)
- 15.7(3)M7 (Status: affected)
- 15.7(3)M8 (Status: affected)
- 15.7(3)M9 (Status: affected)
- 15.3(3)JG (Status: affected)
- 15.3(3)JG1 (Status: affected)
- 15.3(3)JH (Status: affected)
- 15.3(3)JH1 (Status: affected)
- 15.3(3)JI1 (Status: affected)
- 15.3(3)JI3 (Status: affected)
- 15.3(3)JI4 (Status: affected)
- 15.3(3)JI5 (Status: affected)
- 15.3(3)JI6 (Status: affected)
- 15.8(3)M (Status: affected)
- 15.8(3)M1 (Status: affected)
- 15.8(3)M0a (Status: affected)
- 15.8(3)M0b (Status: affected)
- 15.8(3)M2 (Status: affected)
- 15.8(3)M1a (Status: affected)
- 15.8(3)M3 (Status: affected)
- 15.8(3)M2a (Status: affected)
- 15.8(3)M4 (Status: affected)
- 15.8(3)M3a (Status: affected)
- 15.8(3)M3b (Status: affected)
- 15.8(3)M5 (Status: affected)
- 15.8(3)M6 (Status: affected)
- 15.8(3)M7 (Status: affected)
- 15.8(3)M8 (Status: affected)
- 15.8(3)M9 (Status: affected)
- 15.9(3)M (Status: affected)
- 15.9(3)M1 (Status: affected)
- 15.9(3)M0a (Status: affected)
- 15.9(3)M2 (Status: affected)
- 15.9(3)M3 (Status: affected)
- 15.9(3)M2a (Status: affected)
- 15.9(3)M3a (Status: affected)
- 15.9(3)M4 (Status: affected)
- 15.9(3)M3b (Status: affected)
- 15.9(3)M5 (Status: affected)
- 15.9(3)M4a (Status: affected)
- 15.9(3)M6 (Status: affected)
- 15.9(3)M7 (Status: affected)
- 15.9(3)M6a (Status: affected)
- 15.9(3)M6b (Status: affected)
- 15.9(3)M8 (Status: affected)
- 15.9(3)M7a (Status: affected)
- 15.9(3)M9 (Status: affected)
- 15.9(3)M8b (Status: affected)
- 15.9(3)M10 (Status: affected)
- 15.3(3)JK (Status: affected)
- 15.3(3)JK1 (Status: affected)
- 15.3(3)JK2 (Status: affected)
- 15.3(3)JK3 (Status: affected)
- 15.3(3)JK2a (Status: affected)
- 15.3(3)JK1t (Status: affected)
- 15.3(3)JK4 (Status: affected)
- 15.3(3)JK5 (Status: affected)
- 15.3(3)JK6 (Status: affected)
- 15.3(3)JK7 (Status: affected)
- 15.3(3)JK8 (Status: affected)
- 15.3(3)JK8a (Status: affected)
- 15.3(3)JK8b (Status: affected)
- 15.3(3)JK9 (Status: affected)
- 15.3(3)JK10 (Status: affected)
- 15.3(3)JK11 (Status: affected)
- 15.3(3)JJ (Status: affected)
- 15.3(3)JJ1 (Status: affected)
- 15.3(3)JPI1 (Status: affected)
- 15.3(3)JPI4 (Status: affected)
- 15.3(3)JPI1t (Status: affected)
- 15.3(3)JPI5 (Status: affected)
- 15.3(3)JPI7 (Status: affected)
- 15.3(3)JPI6a (Status: affected)
- 15.3(3)JPI8a (Status: affected)
- 15.3(3)JPI9 (Status: affected)
- 15.3(3)JPI10 (Status: affected)
- 15.3(3)JPJ2 (Status: affected)
- 15.3(3)JPJ3 (Status: affected)
- 15.3(3)JPJ2t (Status: affected)
- 15.3(3)JPJ3a (Status: affected)
- 15.3(3)JPJ4 (Status: affected)
- 15.3(3)JPJ5 (Status: affected)
- 15.3(3)JPJ6 (Status: affected)
- 15.3(3)JPJ7 (Status: affected)
- 15.3(3)JPJ7c (Status: affected)
- 15.3(3)JPJ8a (Status: affected)
- 15.3(3)JPJ9 (Status: affected)
- 15.3(3)JPJ10 (Status: affected)
- 15.3(3)JPJ11 (Status: affected)
- 15.3(3)JPK (Status: affected)
- 15.3(3)JPK1 (Status: affected)
- 15.3(3)JPK2 (Status: affected)
- 15.3(3)JPK3 (Status: affected)
- 15.3(3)JPK4 (Status: affected)
- 15.3(3)JPK5 (Status: affected)
- 15.3(3)JPK6 (Status: affected)
- 15.3(3)JPK7 (Status: affected)
- 15.3(3)JPK8 (Status: affected)
- 15.3(3)JPK9 (Status: affected)
- 15.3(3)JPL (Status: affected)
- 15.3(3)JPM (Status: affected)
- 15.3(3)JPN (Status: affected)
- 15.3(3)JPN1 (Status: affected)
- 15.3(3)JPN2 (Status: affected)
- 15.3(3)JPN3 (Status: affected)
- 15.3(3)JPN4 (Status: affected)
- 15.3(3)JPN5 (Status: affected)
- 15.3(3)JPN6 (Status: affected)
- 15.3(3)JPO (Status: affected)
- 15.3(3)JPP (Status: affected)
- 15.3(3)JPQ (Status: affected)
- 15.3(3)JPQ1 (Status: affected)
- 15.3(3)JPQ2 (Status: affected)
- 15.3(3)JPQ3 (Status: affected)
- 15.3(3)JPQ4 (Status: affected)
- 15.3(3)JPR (Status: affected)
- 15.3(3)JPS (Status: affected)
- 15.3(3)JPT (Status: affected)
- 15.3(3)JPT1 (Status: affected)
- 15.3(3)JPU (Status: affected)
**Cisco - Cisco IOS XE Software**
Affected versions:
- 3.2.0SG (Status: affected)
- 3.2.1SG (Status: affected)
- 3.2.2SG (Status: affected)
- 3.2.3SG (Status: affected)
- 3.2.4SG (Status: affected)
- 3.2.5SG (Status: affected)
- 3.2.6SG (Status: affected)
- 3.2.7SG (Status: affected)
- 3.2.8SG (Status: affected)
- 3.2.9SG (Status: affected)
- 3.2.10SG (Status: affected)
- 3.2.11SG (Status: affected)
- 3.7.0S (Status: affected)
- 3.7.1S (Status: affected)
- 3.7.2S (Status: affected)
- 3.7.3S (Status: affected)
- 3.7.4S (Status: affected)
- 3.7.5S (Status: affected)
- 3.7.6S (Status: affected)
- 3.7.7S (Status: affected)
- 3.7.4aS (Status: affected)
- 3.7.2tS (Status: affected)
- 3.7.0bS (Status: affected)
- 3.7.1aS (Status: affected)
- 3.3.0SG (Status: affected)
- 3.3.2SG (Status: affected)
- 3.3.1SG (Status: affected)
- 3.8.0S (Status: affected)
- 3.8.1S (Status: affected)
- 3.8.2S (Status: affected)
- 3.9.1S (Status: affected)
- 3.9.0S (Status: affected)
- 3.9.2S (Status: affected)
- 3.9.1aS (Status: affected)
- 3.9.0aS (Status: affected)
- 3.2.0SE (Status: affected)
- 3.2.1SE (Status: affected)
- 3.2.2SE (Status: affected)
- 3.2.3SE (Status: affected)
- 3.3.0SE (Status: affected)
- 3.3.1SE (Status: affected)
- 3.3.2SE (Status: affected)
- 3.3.3SE (Status: affected)
- 3.3.4SE (Status: affected)
- 3.3.5SE (Status: affected)
- 3.4.0SG (Status: affected)
- 3.4.2SG (Status: affected)
- 3.4.1SG (Status: affected)
- 3.4.3SG (Status: affected)
- 3.4.4SG (Status: affected)
- 3.4.5SG (Status: affected)
- 3.4.6SG (Status: affected)
- 3.4.7SG (Status: affected)
- 3.4.8SG (Status: affected)
- 3.5.0E (Status: affected)
- 3.5.1E (Status: affected)
- 3.5.2E (Status: affected)
- 3.5.3E (Status: affected)
- 3.10.0S (Status: affected)
- 3.10.1S (Status: affected)
- 3.10.2S (Status: affected)
- 3.10.3S (Status: affected)
- 3.10.4S (Status: affected)
- 3.10.5S (Status: affected)
- 3.10.6S (Status: affected)
- 3.10.2tS (Status: affected)
- 3.10.7S (Status: affected)
- 3.10.1xbS (Status: affected)
- 3.10.8S (Status: affected)
- 3.10.8aS (Status: affected)
- 3.10.9S (Status: affected)
- 3.10.10S (Status: affected)
- 3.11.1S (Status: affected)
- 3.11.2S (Status: affected)
- 3.11.0S (Status: affected)
- 3.11.3S (Status: affected)
- 3.11.4S (Status: affected)
- 3.12.0S (Status: affected)
- 3.12.1S (Status: affected)
- 3.12.2S (Status: affected)
- 3.12.3S (Status: affected)
- 3.12.0aS (Status: affected)
- 3.12.4S (Status: affected)
- 3.13.0S (Status: affected)
- 3.13.1S (Status: affected)
- 3.13.2S (Status: affected)
- 3.13.3S (Status: affected)
- 3.13.4S (Status: affected)
- 3.13.5S (Status: affected)
- 3.13.2aS (Status: affected)
- 3.13.0aS (Status: affected)
- 3.13.5aS (Status: affected)
- 3.13.6S (Status: affected)
- 3.13.7S (Status: affected)
- 3.13.6aS (Status: affected)
- 3.13.7aS (Status: affected)
- 3.13.8S (Status: affected)
- 3.13.9S (Status: affected)
- 3.13.10S (Status: affected)
- 3.6.0E (Status: affected)
- 3.6.1E (Status: affected)
- 3.6.2aE (Status: affected)
- 3.6.2E (Status: affected)
- 3.6.3E (Status: affected)
- 3.6.4E (Status: affected)
- 3.6.5E (Status: affected)
- 3.6.6E (Status: affected)
- 3.6.5aE (Status: affected)
- 3.6.5bE (Status: affected)
- 3.6.7E (Status: affected)
- 3.6.8E (Status: affected)
- 3.6.7bE (Status: affected)
- 3.6.9E (Status: affected)
- 3.6.10E (Status: affected)
- 3.14.0S (Status: affected)
- 3.14.1S (Status: affected)
- 3.14.2S (Status: affected)
- 3.14.3S (Status: affected)
- 3.14.4S (Status: affected)
- 3.15.0S (Status: affected)
- 3.15.1S (Status: affected)
- 3.15.2S (Status: affected)
- 3.15.1cS (Status: affected)
- 3.15.3S (Status: affected)
- 3.15.4S (Status: affected)
- 3.3.0SQ (Status: affected)
- 3.3.1SQ (Status: affected)
- 3.4.0SQ (Status: affected)
- 3.4.1SQ (Status: affected)
- 3.7.0E (Status: affected)
- 3.7.1E (Status: affected)
- 3.7.2E (Status: affected)
- 3.7.3E (Status: affected)
- 3.7.4E (Status: affected)
- 3.7.5E (Status: affected)
- 3.5.0SQ (Status: affected)
- 3.5.1SQ (Status: affected)
- 3.5.2SQ (Status: affected)
- 3.5.3SQ (Status: affected)
- 3.5.4SQ (Status: affected)
- 3.5.5SQ (Status: affected)
- 3.5.6SQ (Status: affected)
- 3.5.7SQ (Status: affected)
- 3.5.8SQ (Status: affected)
- 3.16.0S (Status: affected)
- 3.16.1S (Status: affected)
- 3.16.1aS (Status: affected)
- 3.16.2S (Status: affected)
- 3.16.2aS (Status: affected)
- 3.16.0cS (Status: affected)
- 3.16.3S (Status: affected)
- 3.16.2bS (Status: affected)
- 3.16.3aS (Status: affected)
- 3.16.4S (Status: affected)
- 3.16.4aS (Status: affected)
- 3.16.4bS (Status: affected)
- 3.16.5S (Status: affected)
- 3.16.4dS (Status: affected)
- 3.16.6S (Status: affected)
- 3.16.7S (Status: affected)
- 3.16.6bS (Status: affected)
- 3.16.7aS (Status: affected)
- 3.16.7bS (Status: affected)
- 3.16.8S (Status: affected)
- 3.16.9S (Status: affected)
- 3.16.10S (Status: affected)
- 3.17.0S (Status: affected)
- 3.17.1S (Status: affected)
- 3.17.2S (Status: affected)
- 3.17.1aS (Status: affected)
- 3.17.3S (Status: affected)
- 3.17.4S (Status: affected)
- 16.1.1 (Status: affected)
- 16.1.2 (Status: affected)
- 16.1.3 (Status: affected)
- 16.2.1 (Status: affected)
- 16.2.2 (Status: affected)
- 3.8.0E (Status: affected)
- 3.8.1E (Status: affected)
- 3.8.2E (Status: affected)
- 3.8.3E (Status: affected)
- 3.8.4E (Status: affected)
- 3.8.5E (Status: affected)
- 3.8.5aE (Status: affected)
- 3.8.6E (Status: affected)
- 3.8.7E (Status: affected)
- 3.8.8E (Status: affected)
- 3.8.9E (Status: affected)
- 3.8.10E (Status: affected)
- 16.3.1 (Status: affected)
- 16.3.2 (Status: affected)
- 16.3.3 (Status: affected)
- 16.3.1a (Status: affected)
- 16.3.4 (Status: affected)
- 16.3.5 (Status: affected)
- 16.3.5b (Status: affected)
- 16.3.6 (Status: affected)
- 16.3.7 (Status: affected)
- 16.3.8 (Status: affected)
- 16.3.9 (Status: affected)
- 16.3.10 (Status: affected)
- 16.3.11 (Status: affected)
- 16.4.1 (Status: affected)
- 16.4.2 (Status: affected)
- 16.4.3 (Status: affected)
- 16.5.1 (Status: affected)
- 16.5.1a (Status: affected)
- 16.5.1b (Status: affected)
- 16.5.2 (Status: affected)
- 16.5.3 (Status: affected)
- 3.18.0aS (Status: affected)
- 3.18.0S (Status: affected)
- 3.18.1S (Status: affected)
- 3.18.2S (Status: affected)
- 3.18.3S (Status: affected)
- 3.18.4S (Status: affected)
- 3.18.0SP (Status: affected)
- 3.18.1SP (Status: affected)
- 3.18.1aSP (Status: affected)
- 3.18.1bSP (Status: affected)
- 3.18.1cSP (Status: affected)
- 3.18.2SP (Status: affected)
- 3.18.2aSP (Status: affected)
- 3.18.3SP (Status: affected)
- 3.18.4SP (Status: affected)
- 3.18.3aSP (Status: affected)
- 3.18.3bSP (Status: affected)
- 3.18.5SP (Status: affected)
- 3.18.6SP (Status: affected)
- 3.18.7SP (Status: affected)
- 3.18.8aSP (Status: affected)
- 3.18.9SP (Status: affected)
- 3.9.0E (Status: affected)
- 3.9.1E (Status: affected)
- 3.9.2E (Status: affected)
- 16.6.1 (Status: affected)
- 16.6.2 (Status: affected)
- 16.6.3 (Status: affected)
- 16.6.4 (Status: affected)
- 16.6.5 (Status: affected)
- 16.6.4a (Status: affected)
- 16.6.5a (Status: affected)
- 16.6.6 (Status: affected)
- 16.6.7 (Status: affected)
- 16.6.8 (Status: affected)
- 16.6.9 (Status: affected)
- 16.6.10 (Status: affected)
- 16.7.1 (Status: affected)
- 16.7.1a (Status: affected)
- 16.7.1b (Status: affected)
- 16.7.2 (Status: affected)
- 16.7.3 (Status: affected)
- 16.7.4 (Status: affected)
- 16.8.1 (Status: affected)
- 16.8.1a (Status: affected)
- 16.8.1b (Status: affected)
- 16.8.1s (Status: affected)
- 16.8.1c (Status: affected)
- 16.8.1d (Status: affected)
- 16.8.2 (Status: affected)
- 16.8.1e (Status: affected)
- 16.8.3 (Status: affected)
- 16.9.1 (Status: affected)
- 16.9.2 (Status: affected)
- 16.9.1a (Status: affected)
- 16.9.1b (Status: affected)
- 16.9.1s (Status: affected)
- 16.9.3 (Status: affected)
- 16.9.4 (Status: affected)
- 16.9.3a (Status: affected)
- 16.9.5 (Status: affected)
- 16.9.6 (Status: affected)
- 16.9.7 (Status: affected)
- 16.9.8 (Status: affected)
- 16.10.1 (Status: affected)
- 16.10.1a (Status: affected)
- 16.10.1b (Status: affected)
- 16.10.1s (Status: affected)
- 16.10.1c (Status: affected)
- 16.10.1e (Status: affected)
- 16.10.1d (Status: affected)
- 16.10.2 (Status: affected)
- 16.10.1f (Status: affected)
- 16.10.1g (Status: affected)
- 16.10.3 (Status: affected)
- 3.10.0E (Status: affected)
- 3.10.1E (Status: affected)
- 3.10.0cE (Status: affected)
- 3.10.2E (Status: affected)
- 3.10.3E (Status: affected)
- 16.11.1 (Status: affected)
- 16.11.1a (Status: affected)
- 16.11.1b (Status: affected)
- 16.11.2 (Status: affected)
- 16.11.1s (Status: affected)
- 16.12.1 (Status: affected)
- 16.12.1s (Status: affected)
- 16.12.1a (Status: affected)
- 16.12.1c (Status: affected)
- 16.12.1w (Status: affected)
- 16.12.2 (Status: affected)
- 16.12.1y (Status: affected)
- 16.12.2a (Status: affected)
- 16.12.3 (Status: affected)
- 16.12.8 (Status: affected)
- 16.12.2s (Status: affected)
- 16.12.1x (Status: affected)
- 16.12.1t (Status: affected)
- 16.12.4 (Status: affected)
- 16.12.3s (Status: affected)
- 16.12.3a (Status: affected)
- 16.12.4a (Status: affected)
- 16.12.5 (Status: affected)
- 16.12.6 (Status: affected)
- 16.12.1z1 (Status: affected)
- 16.12.5a (Status: affected)
- 16.12.5b (Status: affected)
- 16.12.1z2 (Status: affected)
- 16.12.6a (Status: affected)
- 16.12.7 (Status: affected)
- 16.12.9 (Status: affected)
- 16.12.10 (Status: affected)
- 16.12.10a (Status: affected)
- 16.12.11 (Status: affected)
- 16.12.12 (Status: affected)
- 3.11.0E (Status: affected)
- 3.11.1E (Status: affected)
- 3.11.2E (Status: affected)
- 3.11.3E (Status: affected)
- 3.11.1aE (Status: affected)
- 3.11.4E (Status: affected)
- 3.11.3aE (Status: affected)
- 3.11.5E (Status: affected)
- 3.11.6E (Status: affected)
- 3.11.7E (Status: affected)
- 3.11.8E (Status: affected)
- 3.11.9E (Status: affected)
- 3.11.10E (Status: affected)
- 3.11.11E (Status: affected)
- 17.1.1 (Status: affected)
- 17.1.1a (Status: affected)
- 17.1.1s (Status: affected)
- 17.1.1t (Status: affected)
- 17.1.3 (Status: affected)
- 17.2.1 (Status: affected)
- 17.2.1r (Status: affected)
- 17.2.1a (Status: affected)
- 17.2.1v (Status: affected)
- 17.2.2 (Status: affected)
- 17.2.3 (Status: affected)
- 17.3.1 (Status: affected)
- 17.3.2 (Status: affected)
- 17.3.3 (Status: affected)
- 17.3.1a (Status: affected)
- 17.3.1w (Status: affected)
- 17.3.2a (Status: affected)
- 17.3.1x (Status: affected)
- 17.3.1z (Status: affected)
- 17.3.4 (Status: affected)
- 17.3.5 (Status: affected)
- 17.3.4a (Status: affected)
- 17.3.6 (Status: affected)
- 17.3.4b (Status: affected)
- 17.3.4c (Status: affected)
- 17.3.5a (Status: affected)
- 17.3.5b (Status: affected)
- 17.3.7 (Status: affected)
- 17.3.8 (Status: affected)
- 17.3.8a (Status: affected)
- 17.4.1 (Status: affected)
- 17.4.2 (Status: affected)
- 17.4.1a (Status: affected)
- 17.4.1b (Status: affected)
- 17.4.2a (Status: affected)
- 17.5.1 (Status: affected)
- 17.5.1a (Status: affected)
- 17.6.1 (Status: affected)
- 17.6.2 (Status: affected)
- 17.6.1w (Status: affected)
- 17.6.1a (Status: affected)
- 17.6.1x (Status: affected)
- 17.6.3 (Status: affected)
- 17.6.1y (Status: affected)
- 17.6.1z (Status: affected)
- 17.6.3a (Status: affected)
- 17.6.4 (Status: affected)
- 17.6.1z1 (Status: affected)
- 17.6.5 (Status: affected)
- 17.6.6 (Status: affected)
- 17.6.6a (Status: affected)
- 17.6.5a (Status: affected)
- 17.6.7 (Status: affected)
- 17.6.8 (Status: affected)
- 17.6.8a (Status: affected)
- 17.7.1 (Status: affected)
- 17.7.1a (Status: affected)
- 17.7.1b (Status: affected)
- 17.7.2 (Status: affected)
- 17.10.1 (Status: affected)
- 17.10.1a (Status: affected)
- 17.10.1b (Status: affected)
- 17.8.1 (Status: affected)
- 17.8.1a (Status: affected)
- 17.9.1 (Status: affected)
- 17.9.1w (Status: affected)
- 17.9.2 (Status: affected)
- 17.9.1a (Status: affected)
- 17.9.1x (Status: affected)
- 17.9.1y (Status: affected)
- 17.9.3 (Status: affected)
- 17.9.2a (Status: affected)
- 17.9.1x1 (Status: affected)
- 17.9.3a (Status: affected)
- 17.9.4 (Status: affected)
- 17.9.1y1 (Status: affected)
- 17.9.5 (Status: affected)
- 17.9.4a (Status: affected)
- 17.9.5a (Status: affected)
- 17.9.5b (Status: affected)
- 17.9.6 (Status: affected)
- 17.9.6a (Status: affected)
- 17.9.5e (Status: affected)
- 17.11.1 (Status: affected)
- 17.11.1a (Status: affected)
- 17.12.1 (Status: affected)
- 17.12.1w (Status: affected)
- 17.12.1a (Status: affected)
- 17.12.1x (Status: affected)
- 17.12.2 (Status: affected)
- 17.12.3 (Status: affected)
- 17.12.2a (Status: affected)
- 17.12.1y (Status: affected)
- 17.12.1z (Status: affected)
- 17.12.4 (Status: affected)
- 17.12.3a (Status: affected)
- 17.12.1z1 (Status: affected)
- 17.12.4a (Status: affected)
- 17.12.4b (Status: affected)
- 17.13.1 (Status: affected)
- 17.13.1a (Status: affected)
- 17.14.1 (Status: affected)
- 17.14.1a (Status: affected)
- 17.11.99SW (Status: affected)
- 17.15.1 (Status: affected)
- 17.15.1a (Status: affected)
- 17.15.1b (Status: affected)
### References
1. [cisco-sa-snmp-dos-sdxnSUcW](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-2517, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-2517 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2517
- **State**: PUBLISHED
- **Published Date**: September 09, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 05:17 UTC
- **Reserved Date**: March 19, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2518, and CVE-2015-2546.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1033485](http://www.securitytracker.com/id/1033485)
2. [MS15-097](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097)
3. [38278](https://www.exploit-db.com/exploits/38278/)
4. [76606](http://www.securityfocus.com/bid/76606)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-1806, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-1806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1806
- **State**: PUBLISHED
- **Published Date**: May 26, 2011 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 22:37 UTC
- **Reserved Date**: April 20, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Google Chrome before 11.0.696.71 does not properly implement the GPU command buffer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2011/05/stable-channel-update_24.html)
2. [47964](http://www.securityfocus.com/bid/47964)
3. [oval:org.mitre.oval:def:14389](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14389)
4. [](http://code.google.com/p/chromium/issues/detail?id=82873)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-4966, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-4966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4966
- **State**: PUBLISHED
- **Published Date**: October 21, 2011 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 23:35 UTC
- **Reserved Date**: October 20, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in default.asp in ATCOM Netvolution allows remote attackers to inject arbitrary web script or HTML via the query parameter in a Search action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://1337day.com/exploits/13067)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-10142, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-10142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10142
- **State**: PUBLISHED
- **Published Date**: August 08, 2017 at 15:00 UTC
- **Last Updated**: October 04, 2024 at 18:59 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality Reporting and Analytics component of Oracle Hospitality Applications (subcomponent: Mobile Apps). Supported versions that are affected are 8.5.1 and 9.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Reporting and Analytics. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Reporting and Analytics accessible data as well as unauthorized read access to a subset of Oracle Hospitality Reporting and Analytics accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - Hospitality Reporting and Analytics**
Affected versions:
- 8.5.1 (Status: affected)
- 9.0.0 (Status: affected)
### References
1. [1038941](http://www.securitytracker.com/id/1038941)
2. [99710](http://www.securityfocus.com/bid/99710)
3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-1568, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-1568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1568
- **State**: PUBLISHED
- **Published Date**: March 22, 2023 at 14:00 UTC
- **Last Updated**: August 02, 2024 at 05:49 UTC
- **Reserved Date**: March 22, 2023 at 10:52 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file /admin/reports/index.php of the component GET Parameter Handler. The manipulation of the argument date_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223560.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - Student Study Center Desk Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.223560)
2. [](https://vuldb.com/?ctiid.223560)
3. [](https://github.com/E1CHO/cve_hub/blob/main/Student%20Study%20Center%20Desk%20Management%20System/Student%20Study%20Center%20Desk%20Management%20System%20-%20vlun2.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-38671, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-38671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38671
- **State**: PUBLISHED
- **Published Date**: July 26, 2023 at 10:59 UTC
- **Last Updated**: October 23, 2024 at 14:18 UTC
- **Reserved Date**: July 24, 2023 at 07:55 UTC
- **Assigned By**: Baidu
### Vulnerability Description
Heap buffer overflow in paddle.trace in PaddlePaddle before 2.5.0. This flaw can lead to a denial of service, information disclosure, or more damage is possible.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**PaddlePaddle - PaddlePaddle**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-003.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2000-0127, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2000-0127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0127
- **State**: PUBLISHED
- **Published Date**: October 13, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:05 UTC
- **Reserved Date**: February 08, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Webspeed configuration program does not properly disable access to the WSMadmin utility, which allows remote attackers to gain privileges via wsisa.dll.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.progress.com/services/support/cgi-bin/techweb-kbase.cgi/webkb.html?kbid=19412&keywords=security%20Webspeed)
2. [969](http://www.securityfocus.com/bid/969)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-4408, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-4408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4408
- **State**: PUBLISHED
- **Published Date**: December 11, 2022 at 00:00 UTC
- **Last Updated**: April 14, 2025 at 17:59 UTC
- **Reserved Date**: December 11, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.9.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**thorsten - thorsten/phpmyfaq**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/2ec4ddd4-de22-4f2d-ba92-3382b452bfea)
2. [](https://github.com/thorsten/phpmyfaq/commit/e2ea332a2b5e798f2c39203b2489a2dabe831751)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-24931, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-24931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24931
- **State**: PUBLISHED
- **Published Date**: February 12, 2024 at 05:52 UTC
- **Last Updated**: August 01, 2024 at 23:36 UTC
- **Reserved Date**: February 01, 2024 at 15:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in swadeshswain Before After Image Slider WP allows Stored XSS.This issue affects Before After Image Slider WP: from n/a through 2.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**swadeshswain - Before After Image Slider WP**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/before-after-image-slider/wordpress-before-after-image-slider-wp-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- NGÔ THIÊN AN / ancorn_ from VNPT-VCI (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-45341, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-45341 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45341
- **State**: PUBLISHED
- **Published Date**: November 02, 2023 at 13:58 UTC
- **Last Updated**: August 02, 2024 at 20:21 UTC
- **Reserved Date**: October 06, 2023 at 21:35 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_price' parameter of the routers/menu-router.php resource does not validate the characters received and they are sent unfiltered to the database.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Projectworlds Pvt. Limited - Online Food Ordering System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://fluidattacks.com/advisories/hann)
2. [](https://projectworlds.in/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-33666, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-33666 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33666
- **State**: PUBLISHED
- **Published Date**: June 09, 2021 at 13:32 UTC
- **Last Updated**: August 03, 2024 at 23:58 UTC
- **Reserved Date**: May 28, 2021 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
When SAP Commerce Cloud version 100, hosts a JavaScript storefront, it is vulnerable to MIME sniffing, which, in certain circumstances, could be used to facilitate an XSS attack or malware proliferation.
### Affected Products
**SAP SE - SAP Commerce Cloud**
Affected versions:
- < 100 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999)
2. [](https://launchpad.support.sap.com/#/notes/2985562)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-1095, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-1095 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1095
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19971006 KSR[T] Advisory #3: updatedb / crontabs](http://marc.info/?l=bugtraq&m=87619953510834&w=2)
2. [19980302 overwrite any file with updatedb](http://marc.info/?l=bugtraq&m=88886870129518&w=2)
3. [19980303 updatedb stuff](http://marc.info/?l=bugtraq&m=88890116304676&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-4290, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-4290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4290
- **State**: PUBLISHED
- **Published Date**: October 16, 2023 at 19:22 UTC
- **Last Updated**: April 23, 2025 at 16:15 UTC
- **Reserved Date**: August 10, 2023 at 11:54 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP Matterport Shortcode WordPress plugin before 2.1.7 does not escape the PHP_SELF server variable when outputting it in attributes, leading to Reflected Cross-Site Scripting issues which could be used against high privilege users such as admin
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - WP Matterport Shortcode**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/5fad5245-a089-4ba3-9958-1e2c3d066eea)
### Credits
- Erwan LR (WPScan)
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-18572, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-18572 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18572
- **State**: PUBLISHED
- **Published Date**: August 22, 2019 at 12:31 UTC
- **Last Updated**: August 05, 2024 at 21:28 UTC
- **Reserved Date**: August 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The gnucommerce plugin before 1.4.2 for WordPress has XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/gnucommerce/#developers)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-51831, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-51831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51831
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 16:31 UTC
- **Last Updated**: November 20, 2024 at 14:26 UTC
- **Reserved Date**: November 04, 2024 at 09:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aboutorab Pourhaghani Persian Nested Show/Hide Text allows Stored XSS.This issue affects Persian Nested Show/Hide Text: from n/a through 1.5.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Aboutorab Pourhaghani - Persian Nested Show/Hide Text**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/persian-nested-showhide-text/wordpress-persian-nested-show-hide-text-plugin-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-3398, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-3398 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3398
- **State**: PUBLISHED
- **Published Date**: February 10, 2022 at 16:13 UTC
- **Last Updated**: August 03, 2024 at 16:53 UTC
- **Reserved Date**: February 03, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stormshield Network Security (SNS) 3.x has an Integer Overflow in the high-availability component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.stormshield.com/category/alert/)
2. [](https://advisories.stormshield.eu/2021-001/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-2542, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-2542 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2542
- **State**: PUBLISHED
- **Published Date**: February 24, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: February 23, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in Flexera InstallShield through 2015 SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory of a setup-launcher executable file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1035097](http://www.securitytracker.com/id/1035097)
2. [84213](http://www.securityfocus.com/bid/84213)
3. [](https://www.tenable.com/security/tns-2019-08)
4. [](https://www.oracle.com/security-alerts/cpuApr2021.html)
5. [](https://flexeracommunity.force.com/customer/articles/INFO/Best-Practices-to-Avoid-Windows-Setup-Launcher-Executable-Issues)
6. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-287-03)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-48089, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-48089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48089
- **State**: PUBLISHED
- **Published Date**: November 15, 2023 at 00:00 UTC
- **Last Updated**: August 29, 2024 at 20:06 UTC
- **Reserved Date**: November 13, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
xxl-job-admin 2.4.0 is vulnerable to Remote Code Execution (RCE) via /xxl-job-admin/jobcode/save.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/xuxueli/xxl-job/issues/3333)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-7422, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-7422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7422
- **State**: PUBLISHED
- **Published Date**: August 21, 2017 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 00:32 UTC
- **Reserved Date**: April 05, 2017 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
Reflected and stored Cross-Site Scripting (XSS, CWE-79) vulnerabilities in esfadmingui in Micro Focus Enterprise Developer and Enterprise Server 2.3, 2.3 Update 1 before Hotfix 8, and 2.3 Update 2 before Hotfix 9 allow remote authenticated attackers to bypass protection mechanisms (CWE-693) and other security features, if this component is configured. Note esfadmingui is not enabled by default.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Micro Focus - Micro Focus Enterprise Developer, Micro Focus Enterprise Server**
Affected versions:
- 2.3 before 2.3 Update 1, 2.3 Update 1 before Hotfix 8, 2.3 Update 2 before Hotfix 9 (Status: affected)
### References
1. [](https://community.microfocus.com/microfocus/mainframe_solutions/enterprise_server/w/knowledge_base/29131/enterprise-server-security-fixes-july-2017)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-3500, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-3500 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3500
- **State**: PUBLISHED
- **Published Date**: August 17, 2020 at 18:00 UTC
- **Last Updated**: November 13, 2024 at 18:16 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the IPv6 implementation of Cisco StarOS could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet to an affected device with the goal of reaching the vulnerable section of the input buffer. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Cisco - Cisco ASR 5000 Series Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20200805 Cisco StarOS IPv6 Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr5k-ipv6-dos-ce3zhF8m)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-10095, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-10095 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10095
- **State**: PUBLISHED
- **Published Date**: May 22, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 07:32 UTC
- **Reserved Date**: April 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Dolibarr before 7.0.2 allows remote attackers to inject arbitrary web script or HTML via the foruserlogin parameter to adherents/cartes/carte.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20180521 Dolibarr XSS Injection vulnerability](http://www.openwall.com/lists/oss-security/2018/05/21/3)
2. [](https://sysdream.com/news/lab/2018-05-21-cve-2018-10095-dolibarr-xss-injection-vulnerability/)
3. [](https://github.com/Dolibarr/dolibarr/blob/7.0.2/ChangeLog)
4. [](https://github.com/Dolibarr/dolibarr/commit/1dc466e1fb687cfe647de4af891720419823ed56)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-0811, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-0811 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0811
- **State**: PUBLISHED
- **Published Date**: January 23, 2024 at 23:53 UTC
- **Last Updated**: February 13, 2025 at 17:27 UTC
- **Reserved Date**: January 23, 2024 at 00:47 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Extensions API in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension. (Chromium security severity: Low)
### Affected Products
**Google - Chrome**
Affected versions:
- 121.0.6167.85 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html)
2. [](https://crbug.com/1494490)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/)
5. [](http://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-4933, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-4933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4933
- **State**: PUBLISHED
- **Published Date**: July 29, 2013 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 16:59 UTC
- **Reserved Date**: July 26, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [54371](http://secunia.com/advisories/54371)
2. [openSUSE-SU-2013:1300](http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html)
3. [](http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673)
4. [oval:org.mitre.oval:def:17412](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17412)
5. [54178](http://secunia.com/advisories/54178)
6. [RHSA-2014:0341](http://rhn.redhat.com/errata/RHSA-2014-0341.html)
7. [54425](http://secunia.com/advisories/54425)
8. [DSA-2734](http://www.debian.org/security/2013/dsa-2734)
9. [](http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html)
10. [](https://www.wireshark.org/security/wnpa-sec-2013-51.html)
11. [GLSA-201308-05](http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml)
12. [openSUSE-SU-2013:1295](http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html)
13. [54296](http://secunia.com/advisories/54296)
14. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742)
15. [](http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673)
16. [](http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-29531, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-29531 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29531
- **State**: PUBLISHED
- **Published Date**: April 20, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 06:26 UTC
- **Reserved Date**: April 20, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in MISP before 2.4.158. There is stored XSS in the event graph via a tag name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/MISP/MISP/compare/v2.4.157...v2.4.158)
2. [](https://github.com/MISP/MISP/commit/bb3b7a7e91862742cae228c43b3091bad476dcc0)
3. [](https://zigrin.com/cakephp-application-cybersecurity-research-protect-your-website-from-stored-xss-attacks-understanding-and-preventing-vulnerabilities-in-open-source-applications/)
4. [](https://zigrin.com/advisories/misp-stored-xss-in-the-event-graph/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-46766, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-46766 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46766
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 18:51 UTC
- **Last Updated**: August 04, 2024 at 05:17 UTC
- **Reserved Date**: March 31, 2022 at 16:50 UTC
- **Assigned By**: AMD
### Vulnerability Description
Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.
### CVSS Metrics
- **CVSS Base Score**: 2.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N`
### Affected Products
**AMD - Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS**
Affected versions:
- various (Status: affected)
**AMD - 4th Gen AMD EPYC™ Processors**
Affected versions:
- various (Status: affected)
**AMD - AMD EPYC™ Embedded 9003**
Affected versions:
- various (Status: affected)
### References
1. [](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002)
2. [](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002)
3. [](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-5971, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-5971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5971
- **State**: PUBLISHED
- **Published Date**: June 10, 2025 at 18:00 UTC
- **Last Updated**: June 10, 2025 at 18:20 UTC
- **Reserved Date**: June 10, 2025 at 11:35 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects School Fees Payment System 1.0. It has been classified as critical. This affects an unknown part of the file /ajx.php. The manipulation of the argument name_startsWith leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**code-projects - School Fees Payment System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-311847 | code-projects School Fees Payment System ajx.php sql injection](https://vuldb.com/?id.311847)
2. [VDB-311847 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311847)
3. [Submit #592339 | code-projects SCHOOL FEES PAYMENT SYSTEM 1.0 SQL Injection](https://vuldb.com/?submit.592339)
4. [Submit #592441 | code-projects School Fees Payment System 1.0 SQL Injection (Duplicate)](https://vuldb.com/?submit.592441)
5. [](https://github.com/qingchuana/q1ngchuan/issues/6)
6. [](https://code-projects.org/)
### Credits
- Q1ngchuan (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-1853, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-1853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1853
- **State**: PUBLISHED
- **Published Date**: August 15, 2012 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 19:08 UTC
- **Reserved Date**: March 22, 2012 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Stack-based buffer overflow in the Remote Administration Protocol (RAP) implementation in the LanmanWorkstation service in Microsoft Windows XP SP3 allows remote attackers to execute arbitrary code via crafted RAP response packets, aka "Remote Administration Protocol Stack Overflow Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:15408](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15408)
2. [TA12-227A](http://www.us-cert.gov/cas/techalerts/TA12-227A.html)
3. [MS12-054](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-054)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2003-0172, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2003-0172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0172
- **State**: PUBLISHED
- **Published Date**: March 29, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 01:43 UTC
- **Reserved Date**: March 28, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in openlog function for PHP 4.3.1 on Windows operating system, and possibly other OSes, allows remote attackers to cause a crash and possibly execute arbitrary code via a long filename argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20030402 Inaccurate Reports Concerning PHP Vulnerabilities](http://marc.info/?l=bugtraq&m=104931415307111&w=2)
2. [20030327 Re: @(#)Mordred Labs advisory - PHP for Win32: buffer overflow in openlog() function](http://www.securityfocus.com/archive/1/316583)
3. [2113](http://www.osvdb.org/2113)
4. [20030327 @(#)Mordred Labs advisory - PHP for Win32: buffer overflow in openlog() function](http://marc.info/?l=bugtraq&m=104878149020152&w=2)
5. [7210](http://www.securityfocus.com/bid/7210)
6. [20041222 PHP v4.3.x exploit for Windows.](http://www.securityfocus.com/archive/1/385238)
7. [php-openlog-stack-bo(11637)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11637)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-1441, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-1441 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1441
- **State**: PUBLISHED
- **Published Date**: May 07, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 05:13 UTC
- **Reserved Date**: April 27, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the ParamTraits<SkBitmap>::Read function in Google Chrome before 1.0.154.64 allows attackers to leverage renderer access to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to a large bitmap that arrives over the IPC channel.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://code.google.com/p/chromium/issues/detail?id=10869)
2. [ADV-2009-1266](http://www.vupen.com/english/advisories/2009/1266)
3. [chrome-paramtraitsskbitmapread-bo(50362)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50362)
4. [1022174](http://www.securitytracker.com/id?1022174)
5. [54288](http://osvdb.org/54288)
6. [](http://googlechromereleases.blogspot.com/2009/05/stable-update-security-fix.html)
7. [35014](http://secunia.com/advisories/35014)
8. [34859](http://www.securityfocus.com/bid/34859)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-4521, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-4521 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4521
- **State**: PUBLISHED
- **Published Date**: October 09, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 10:17 UTC
- **Reserved Date**: October 09, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in thisraidprogress.php in the World of Warcraft tracker infusion (raidtracker_panel) module 2.0 for PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the INFO_RAID_ID parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6682](https://www.exploit-db.com/exploits/6682)
2. [raidtrackerpanel-thisraidprog-sql-injection(45675)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45675)
3. [31579](http://www.securityfocus.com/bid/31579)
4. [4384](http://securityreason.com/securityalert/4384)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-14947, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-14947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14947
- **State**: PUBLISHED
- **Published Date**: June 30, 2020 at 20:44 UTC
- **Last Updated**: August 04, 2024 at 13:00 UTC
- **Reserved Date**: June 21, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OCS Inventory NG 2.7 allows Remote Command Execution via shell metacharacters to require/commandLine/CommandLine.php because mib_file in plugins/main_sections/ms_config/ms_snmp_config.php is mishandled in get_mib_oid.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/mhaskar/233436d3096d4a7beafe36ff61dc2c73)
2. [](https://drive.google.com/file/d/1-LVfL5ui5m2QfQxr0fDopzSECd4fTNrQ/view?usp=sharing)
3. [](https://shells.systems/ocs-inventory-ng-v2-7-remote-command-execution-cve-2020-14947/)
4. [](http://packetstormsecurity.com/files/158293/OCS-Inventory-NG-2.7-Remote-Code-Execution.html)
5. [](https://github.com/OCSInventory-NG/OCSInventory-ocsreports/commit/da72e0fddaeceee44fbbd7241e07e5d53d1eee64)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-50840, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-50840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50840
- **State**: PUBLISHED
- **Published Date**: December 28, 2023 at 18:54 UTC
- **Last Updated**: August 02, 2024 at 22:23 UTC
- **Reserved Date**: December 14, 2023 at 17:18 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpdevelop, oplugins Booking Manager.This issue affects Booking Manager: from n/a through 2.1.5.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**wpdevelop, oplugins - Booking Manager**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/booking-manager/wordpress-booking-manager-plugin-2-1-5-sql-injection-vulnerability?_s_id=cve)
### Credits
- NGÔ THIÊN AN / ancorn_ from VNPT-VCI (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-31230, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-31230 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31230
- **State**: PUBLISHED
- **Published Date**: April 10, 2024 at 17:46 UTC
- **Last Updated**: August 02, 2024 at 01:46 UTC
- **Reserved Date**: March 29, 2024 at 16:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in ShortPixel ShortPixel Adaptive Images.This issue affects ShortPixel Adaptive Images: from n/a through 3.8.2.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**ShortPixel - ShortPixel Adaptive Images**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/shortpixel-adaptive-images/wordpress-shortpixel-adaptive-images-plugin-3-8-2-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-20488, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-20488 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20488
- **State**: PUBLISHED
- **Published Date**: March 02, 2020 at 15:06 UTC
- **Last Updated**: August 05, 2024 at 02:39 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. Multiple actions within the web management interface (setup.cgi) are vulnerable to command injection, allowing remote attackers to execute arbitrary commands, as demonstrated by shell metacharacters in the sysDNSHost parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-netgear-wnr1000v4-round-2/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-5287, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-5287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5287
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 00:53 UTC
- **Reserved Date**: June 03, 2016 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A potentially exploitable use-after-free crash during actor destruction with service workers. This issue does not affect releases earlier than Firefox 49. This vulnerability affects Firefox < 49.0.2.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2016-87/)
2. [93811](http://www.securityfocus.com/bid/93811)
3. [1037077](http://www.securitytracker.com/id/1037077)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1309823)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-2371, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-2371 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2371
- **State**: PUBLISHED
- **Published Date**: April 30, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 13:33 UTC
- **Reserved Date**: April 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
admin/index.php in Gregory Kokanosky phpMyNewsletter 0.8 beta5 and earlier provides access to configuration modification before login, which allows remote attackers to cause a denial of service (loss of configuration data), and possibly perform direct static code injection, via a saveGlobalconfig action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23342](http://www.securityfocus.com/bid/23342)
2. [3671](https://www.exploit-db.com/exploits/3671)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.