System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-1403, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-1403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1403
- **State**: PUBLISHED
- **Published Date**: August 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:51 UTC
- **Reserved Date**: August 30, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Bugzilla before 2.14 includes the username and password in URLs, which could allow attackers to gain privileges by reading the information from the web server logs, or by "shoulder-surfing" and observing the web browser's location bar.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugzilla.mozilla.org/show_bug.cgi?id=15980)
2. [20010829 Security Advisory for Bugzilla v2.13 and older](http://marc.info/?l=bugtraq&m=99912899900567)
3. [RHSA-2001:107](http://www.redhat.com/support/errata/RHSA-2001-107.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-1696, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-1696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1696
- **State**: PUBLISHED
- **Published Date**: May 13, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 04:47 UTC
- **Reserved Date**: February 17, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted Journal file, aka "Windows Journal Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-1675, CVE-2015-1695, CVE-2015-1697, CVE-2015-1698, and CVE-2015-1699.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032280](http://www.securitytracker.com/id/1032280)
2. [20150501 Microsoft Windows Journal File Parsing "CEPMRCFormatReader" Out-of-Bounds Access Vulnerability](https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1095)
3. [MS15-045](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-045)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-37222, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-37222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37222
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 10:30 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Parsers in the open source project RCDCAP before 1.0.5 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via specially crafted packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://hg.code.sf.net/p/rcdcap/code/rev/0af05606c55b#l2.10)
2. [](https://www.openhub.net/p/rcdcap)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-21267, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-21267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21267
- **State**: PUBLISHED
- **Published Date**: October 15, 2024 at 19:52 UTC
- **Last Updated**: October 15, 2024 at 21:50 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Cost Management product of Oracle E-Business Suite (component: Cost Planning). Supported versions that are affected are 12.2.12-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Cost Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Cost Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Cost Management accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Oracle Corporation - Oracle Cost Management**
Affected versions:
- 12.2.12 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2024.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-40817, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-40817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40817
- **State**: PUBLISHED
- **Published Date**: November 18, 2023 at 00:00 UTC
- **Last Updated**: August 14, 2024 at 18:03 UTC
- **Reserved Date**: August 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenCRX version 5.2.0 is vulnerable to HTML injection via the Product Configuration Name Field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.esecforte.com/cve-2023-40817-html-injection-product-configuration/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-3495, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-3495 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3495
- **State**: PUBLISHED
- **Published Date**: September 16, 2011 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 23:37 UTC
- **Reserved Date**: September 16, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in service.exe in Measuresoft ScadaPro 4.0.0 and earlier allow remote attackers to read, modify, or delete arbitrary files via the (1) RF, (2) wF, (3) UF, or (4) NF command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8382](http://securityreason.com/securityalert/8382)
2. [](http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-04.pdf)
3. [](http://aluigi.altervista.org/adv/scadapro_1-adv.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-1003090, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-1003090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1003090
- **State**: PUBLISHED
- **Published Date**: April 04, 2019 at 15:38 UTC
- **Last Updated**: August 05, 2024 at 03:07 UTC
- **Reserved Date**: April 03, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A cross-site request forgery vulnerability in Jenkins SOASTA CloudTest Plugin in the CloudTestServer.DescriptorImpl#doValidate form validation method allows attackers to initiate a connection to an attacker-specified server.
### Affected Products
**Jenkins project - Jenkins SOASTA CloudTest Plugin**
Affected versions:
- all versions as of 2019-04-03 (Status: affected)
### References
1. [107790](http://www.securityfocus.com/bid/107790)
2. [[oss-security] 20190413 Re: Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/04/12/2)
3. [](https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1054)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-0984, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-0984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0984
- **State**: PUBLISHED
- **Published Date**: March 31, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 04:26 UTC
- **Reserved Date**: January 10, 2015 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Directory traversal vulnerability in the FTP server on Honeywell Excel Web XL1000C50 52 I/O, XL1000C100 104 I/O, XL1000C500 300 I/O, XL1000C1000 600 I/O, XL1000C50U 52 I/O UUKL, XL1000C100U 104 I/O UUKL, XL1000C500U 300 I/O UUKL, and XL1000C1000U 600 I/O UUKL controllers before 2.04.01 allows remote attackers to read files under the web root, and consequently obtain administrative login access, via a crafted pathname.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-076-02)
2. [20150422 CVE-2015-0984 SCADA - Gaining remote shell on Honeywell Falcon XLWEB](http://seclists.org/fulldisclosure/2015/Apr/79)
3. [](https://www.outpost24.com/hacking-industrial-control-systems-case-study-falcon/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-43793, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-43793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43793
- **State**: REJECTED
- **Last Updated**: November 15, 2023 at 06:43 UTC
- **Reserved Date**: October 26, 2022 at 14:49 UTC
- **Assigned By**: atlassian
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-41866, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-41866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41866
- **State**: PUBLISHED
- **Published Date**: August 14, 2024 at 15:05 UTC
- **Last Updated**: August 14, 2024 at 17:01 UTC
- **Reserved Date**: July 22, 2024 at 17:16 UTC
- **Assigned By**: adobe
### Vulnerability Description
InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS). An attacker could exploit this vulnerability to crash the application, resulting in a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Adobe - InDesign Desktop**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/indesign/apsb24-56.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-20216, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-20216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20216
- **State**: PUBLISHED
- **Published Date**: August 03, 2023 at 21:18 UTC
- **Last Updated**: August 02, 2024 at 09:05 UTC
- **Reserved Date**: October 27, 2022 at 18:47 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system.
This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system. A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions.
There are workarounds that address this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N`
### Affected Products
**Cisco - Cisco BroadWorks**
Affected versions:
- 23.0 (Status: affected)
- 23.0 ap380391 (Status: affected)
- 23.0 ap380396 (Status: affected)
- 23.0 ap379795 (Status: affected)
- 23.0 ap373098 (Status: affected)
- 23.0 ap382358 (Status: affected)
- 23.0 ap382281 (Status: affected)
- 23.0 ap367434 (Status: affected)
- 23.0 ap376661 (Status: affected)
- 23.0 ap380691 (Status: affected)
- 23.0 ap383569 (Status: affected)
- 23.0 ap375601 (Status: affected)
- 23.0 ap375218 (Status: affected)
- 23.0 ap383519 (Status: affected)
- 23.0 ap375345 (Status: affected)
- 23.0 ap371300 (Status: affected)
- 23.0 ap380771 (Status: affected)
- 23.0 ap351263 (Status: affected)
- 23.0 ap376010 (Status: affected)
- 23.0 ap382487 (Status: affected)
- 23.0 ap383710 (Status: affected)
- 23.0 ap375383 (Status: affected)
- 23.0 ap375465 (Status: affected)
- 23.0 ap380041 (Status: affected)
- 23.0 ap379201 (Status: affected)
- 23.0 ap377147 (Status: affected)
- 23.0 ap378864 (Status: affected)
- 23.0 ap381243 (Status: affected)
- 23.0 ap381271 (Status: affected)
- 23.0 ap382195 (Status: affected)
- 23.0 ap383716 (Status: affected)
- 23.0 ap383943 (Status: affected)
- 23.0 ap383955 (Status: affected)
- 23.0 ap383838 (Status: affected)
- 23.0 ap384023 (Status: affected)
- 23.0 ap383717 (Status: affected)
- 23.0 ap383797 (Status: affected)
- 23.0 ap383815 (Status: affected)
- 23.0 ap384015 (Status: affected)
- 23.0 ap384127 (Status: affected)
- 23.0 ap384173 (Status: affected)
- 23.0 ap384185 (Status: affected)
- 23.0 ap384211 (Status: affected)
- 23.0 ap384245 (Status: affected)
- 23.0 ap363366 (Status: affected)
- 23.0 ap365170 (Status: affected)
- 23.0 ap365858 (Status: affected)
- 23.0 ap366221 (Status: affected)
- 23.0 ap366294 (Status: affected)
- 23.0 ap365801 (Status: affected)
- 23.0 ap366170 (Status: affected)
- 23.0 ap364925 (Status: affected)
- 23.0 ap366295 (Status: affected)
- 23.0 ap366346 (Status: affected)
- 23.0 ap366348 (Status: affected)
- 23.0 ap364295 (Status: affected)
- 23.0 ap364559 (Status: affected)
- 23.0 ap366118 (Status: affected)
- 23.0 ap363815 (Status: affected)
- 23.0 ap363729 (Status: affected)
- 23.0 ap365390 (Status: affected)
- 23.0 ap364932 (Status: affected)
- 23.0 ap365239 (Status: affected)
- 23.0 ap365759 (Status: affected)
- 23.0 ap366211 (Status: affected)
- 23.0 ap366290 (Status: affected)
- 23.0 ap365223 (Status: affected)
- 23.0 ap366117 (Status: affected)
- 23.0 ap365730 (Status: affected)
- 23.0 ap366261 (Status: affected)
- 23.0 ap365889 (Status: affected)
- 23.0 ap366181 (Status: affected)
- 23.0 ap365115 (Status: affected)
- 23.0 ap364048 (Status: affected)
- 23.0 ap366298 (Status: affected)
- 23.0 ap364699 (Status: affected)
- 23.0 ap345032 (Status: affected)
- 23.0 ap363361 (Status: affected)
- 23.0 ap352969 (Status: affected)
- 23.0 ap359103 (Status: affected)
- 23.0 ap366375 (Status: affected)
- 23.0 ap366912 (Status: affected)
- 23.0 ap367109 (Status: affected)
- 23.0 ap366397 (Status: affected)
- 23.0 ap354354 (Status: affected)
- 23.0 ap349850 (Status: affected)
- 23.0 ap366880 (Status: affected)
- 23.0 ap360007 (Status: affected)
- 23.0 ap366744 (Status: affected)
- 23.0 ap366747 (Status: affected)
- 23.0 ap362771 (Status: affected)
- 23.0 ap367291 (Status: affected)
- 23.0 ap366916 (Status: affected)
- 23.0 ap367207 (Status: affected)
- 23.0 ap363363 (Status: affected)
- 23.0 ap366959 (Status: affected)
- 23.0 ap351530 (Status: affected)
- 23.0 ap366898 (Status: affected)
- 23.0 ap361533 (Status: affected)
- 23.0 ap366827 (Status: affected)
- 23.0 ap352962 (Status: affected)
- 23.0 ap369295 (Status: affected)
- 23.0 ap366358 (Status: affected)
- 23.0 ap366677 (Status: affected)
- 23.0 ap366882 (Status: affected)
- 23.0 ap366972 (Status: affected)
- 23.0 ap366486 (Status: affected)
- 23.0 ap366803 (Status: affected)
- 23.0 ap363265 (Status: affected)
- 23.0 ap363128 (Status: affected)
- 23.0 ap366701 (Status: affected)
- 23.0 ap366373 (Status: affected)
- 23.0 ap369674 (Status: affected)
- 23.0 ap369206 (Status: affected)
- 23.0 ap369065 (Status: affected)
- 23.0 ap368327 (Status: affected)
- 23.0 ap368632 (Status: affected)
- 23.0 ap367290 (Status: affected)
- 23.0 ap369302 (Status: affected)
- 23.0 ap368419 (Status: affected)
- 23.0 ap369501 (Status: affected)
- 23.0 ap369219 (Status: affected)
- 23.0 ap368604 (Status: affected)
- 23.0 ap368706 (Status: affected)
- 23.0 ap368461 (Status: affected)
- 23.0 ap368552 (Status: affected)
- 23.0 ap369529 (Status: affected)
- 23.0 ap369748 (Status: affected)
- 23.0 ap368218 (Status: affected)
- 23.0 ap368913 (Status: affected)
- 23.0 ap369607 (Status: affected)
- 23.0 ap369693 (Status: affected)
- 23.0 ap368510 (Status: affected)
- 23.0 ap368445 (Status: affected)
- 23.0 ap369106 (Status: affected)
- 23.0 ap369257 (Status: affected)
- 23.0 ap368987 (Status: affected)
- 23.0 ap369150 (Status: affected)
- 23.0 ap368695 (Status: affected)
- 23.0 ap368167 (Status: affected)
- 23.0 ap370361 (Status: affected)
- 23.0 ap367969 (Status: affected)
- 23.0 ap367367 (Status: affected)
- 23.0 ap369434 (Status: affected)
- 23.0 ap369132 (Status: affected)
- 23.0 ap367678 (Status: affected)
- 23.0 ap367517 (Status: affected)
- 23.0 ap369863 (Status: affected)
- 23.0 ap369227 (Status: affected)
- 23.0 ap369454 (Status: affected)
- 23.0 ap367332 (Status: affected)
- 23.0 ap367794 (Status: affected)
- 23.0 ap369934 (Status: affected)
- 23.0 ap370196 (Status: affected)
- 23.0 ap367358 (Status: affected)
- 23.0 ap367453 (Status: affected)
- 23.0 ap367732 (Status: affected)
- 23.0 ap367646 (Status: affected)
- 23.0 ap367874 (Status: affected)
- 23.0 ap367524 (Status: affected)
- 23.0 ap368153 (Status: affected)
- 23.0 ap368087 (Status: affected)
- 23.0 ap368180 (Status: affected)
- 23.0 ap367726 (Status: affected)
- 23.0 ap370103 (Status: affected)
- 23.0 ap367396 (Status: affected)
- 23.0 ap367340 (Status: affected)
- 23.0 ap368140 (Status: affected)
- 23.0 ap367998 (Status: affected)
- 23.0 ap372337 (Status: affected)
- 23.0 ap372706 (Status: affected)
- 23.0 ap368032 (Status: affected)
- 23.0 ap370138 (Status: affected)
- 23.0 ap372380 (Status: affected)
- 23.0 ap372246 (Status: affected)
- 23.0 ap370193 (Status: affected)
- 23.0 ap372643 (Status: affected)
- 23.0 ap372560 (Status: affected)
- 23.0 ap367513 (Status: affected)
- 23.0 ap369931 (Status: affected)
- 23.0 ap372243 (Status: affected)
- 23.0 ap368216 (Status: affected)
- 23.0 ap369929 (Status: affected)
- 23.0 ap367782 (Status: affected)
- 23.0 ap367675 (Status: affected)
- 23.0 ap372757 (Status: affected)
- 23.0 ap372641 (Status: affected)
- 23.0 ap371050 (Status: affected)
- 23.0 ap372338 (Status: affected)
- 23.0 ap372422 (Status: affected)
- 23.0 ap372033 (Status: affected)
- 23.0 ap371516 (Status: affected)
- 23.0 ap372351 (Status: affected)
- 23.0 ap372708 (Status: affected)
- 23.0 ap372100 (Status: affected)
- 23.0 ap372504 (Status: affected)
- 23.0 ap371961 (Status: affected)
- 23.0 ap370590 (Status: affected)
- 23.0 ap370544 (Status: affected)
- 23.0 ap371836 (Status: affected)
- 23.0 ap372674 (Status: affected)
- 23.0 ap370911 (Status: affected)
- 23.0 ap370817 (Status: affected)
- 23.0 ap372043 (Status: affected)
- 23.0 ap370802 (Status: affected)
- 23.0 ap370926 (Status: affected)
- 23.0 ap370884 (Status: affected)
- 23.0 ap371366 (Status: affected)
- 23.0 ap370952 (Status: affected)
- 23.0 ap371281 (Status: affected)
- 23.0 ap371436 (Status: affected)
- 23.0 ap371153 (Status: affected)
- 23.0 ap371033 (Status: affected)
- 23.0 ap371627 (Status: affected)
- 23.0 ap371155 (Status: affected)
- 23.0 ap371295 (Status: affected)
- 23.0 ap372152 (Status: affected)
- 23.0 ap371760 (Status: affected)
- 23.0 ap370627 (Status: affected)
- 23.0 ap371583 (Status: affected)
- 23.0 ap371770 (Status: affected)
- 23.0 ap371437 (Status: affected)
- 23.0 ap372091 (Status: affected)
- 23.0 ap372163 (Status: affected)
- 23.0 ap370737 (Status: affected)
- 23.0 ap370465 (Status: affected)
- 23.0 ap371587 (Status: affected)
- 23.0 ap375133 (Status: affected)
- 23.0 ap375266 (Status: affected)
- 23.0 ap375254 (Status: affected)
- 23.0 ap372016 (Status: affected)
- 23.0 ap372177 (Status: affected)
- 23.0 ap375242 (Status: affected)
- 23.0 ap375291 (Status: affected)
- 23.0 ap371775 (Status: affected)
- 23.0 ap375688 (Status: affected)
- 23.0 ap375634 (Status: affected)
- 23.0 ap375449 (Status: affected)
- 23.0 ap375321 (Status: affected)
- 23.0 ap375685 (Status: affected)
- 23.0 ap375509 (Status: affected)
- 23.0 ap375719 (Status: affected)
- 23.0 ap375720 (Status: affected)
- 23.0 ap375343 (Status: affected)
- 23.0 ap375533 (Status: affected)
- 23.0 ap375672 (Status: affected)
- 23.0 ap375545 (Status: affected)
- 23.0 ap375264 (Status: affected)
- 23.0 ap375646 (Status: affected)
- 23.0 ap375304 (Status: affected)
- 23.0 ap375097 (Status: affected)
- 23.0 ap373664 (Status: affected)
- 23.0 ap373562 (Status: affected)
- 23.0 ap372932 (Status: affected)
- 23.0 ap374339 (Status: affected)
- 23.0 ap374265 (Status: affected)
- 23.0 ap374230 (Status: affected)
- 23.0 ap374430 (Status: affected)
- 23.0 ap373102 (Status: affected)
- 23.0 ap375655 (Status: affected)
- 23.0 ap373777 (Status: affected)
- 23.0 ap374113 (Status: affected)
- 23.0 ap373015 (Status: affected)
- 23.0 ap374971 (Status: affected)
- 23.0 ap374803 (Status: affected)
- 23.0 ap372974 (Status: affected)
- 23.0 ap373117 (Status: affected)
- 23.0 ap374312 (Status: affected)
- 23.0 ap375018 (Status: affected)
- 23.0 ap373018 (Status: affected)
- 23.0 ap374506 (Status: affected)
- 23.0 ap374588 (Status: affected)
- 23.0 ap373950 (Status: affected)
- 23.0 ap375038 (Status: affected)
- 23.0 ap373480 (Status: affected)
- 23.0 ap372845 (Status: affected)
- 23.0 ap373564 (Status: affected)
- 23.0 ap372994 (Status: affected)
- 23.0 ap373034 (Status: affected)
- 23.0 ap374324 (Status: affected)
- 23.0 ap374031 (Status: affected)
- 23.0 ap374093 (Status: affected)
- 23.0 ap374507 (Status: affected)
- 23.0 ap373684 (Status: affected)
- 23.0 ap374356 (Status: affected)
- 23.0 ap373820 (Status: affected)
- 23.0 ap373104 (Status: affected)
- 23.0 ap373954 (Status: affected)
- 23.0 ap373644 (Status: affected)
- 23.0 ap373899 (Status: affected)
- 23.0 ap374822 (Status: affected)
- 23.0 ap374254 (Status: affected)
- 23.0 ap375069 (Status: affected)
- 23.0 ap373918 (Status: affected)
- 23.0 ap374557 (Status: affected)
- 23.0 ap372854 (Status: affected)
- 23.0 ap373647 (Status: affected)
- 23.0 ap374838 (Status: affected)
- 23.0 ap374330 (Status: affected)
- 23.0 ap374799 (Status: affected)
- 23.0 ap374428 (Status: affected)
- 23.0 ap375936 (Status: affected)
- 23.0 ap376041 (Status: affected)
- 23.0 ap374895 (Status: affected)
- 23.0 ap373046 (Status: affected)
- 23.0 ap376181 (Status: affected)
- 23.0 ap375003 (Status: affected)
- 23.0 ap373539 (Status: affected)
- 23.0 ap373111 (Status: affected)
- 23.0 ap375734 (Status: affected)
- 23.0 ap375743 (Status: affected)
- 23.0 ap376087 (Status: affected)
- 23.0 ap376179 (Status: affected)
- 23.0 ap373303 (Status: affected)
- 23.0 ap375908 (Status: affected)
- 23.0 ap376356 (Status: affected)
- 23.0 ap375865 (Status: affected)
- 23.0 ap373257 (Status: affected)
- 23.0 ap376218 (Status: affected)
- 23.0 ap373212 (Status: affected)
- 23.0 ap373271 (Status: affected)
- 23.0 ap376509 (Status: affected)
- 23.0 ap376252 (Status: affected)
- 23.0 ap376602 (Status: affected)
- 23.0 ap373452 (Status: affected)
- 23.0 ap376429 (Status: affected)
- 23.0 ap376860 (Status: affected)
- 23.0 ap376710 (Status: affected)
- 23.0 ap376410 (Status: affected)
- 23.0 ap376298 (Status: affected)
- 23.0 ap373189 (Status: affected)
- 23.0 ap376426 (Status: affected)
- 23.0 ap376668 (Status: affected)
- 23.0 ap376670 (Status: affected)
- 23.0 ap376485 (Status: affected)
- 23.0 ap376652 (Status: affected)
- 23.0 ap376523 (Status: affected)
- 23.0 ap376656 (Status: affected)
- 23.0 ap376620 (Status: affected)
- 23.0 ap376531 (Status: affected)
- 23.0 ap377412 (Status: affected)
- 23.0 ap376541 (Status: affected)
- 23.0 ap376671 (Status: affected)
- 23.0 ap376701 (Status: affected)
- 23.0 ap376614 (Status: affected)
- 23.0 ap377578 (Status: affected)
- 23.0 ap377496 (Status: affected)
- 23.0 ap377508 (Status: affected)
- 23.0 ap376416 (Status: affected)
- 23.0 ap377778 (Status: affected)
- 23.0 ap377644 (Status: affected)
- 23.0 ap377755 (Status: affected)
- 23.0 ap377523 (Status: affected)
- 23.0 ap377581 (Status: affected)
- 23.0 ap377727 (Status: affected)
- 23.0 ap378436 (Status: affected)
- 23.0 ap377515 (Status: affected)
- 23.0 ap378400 (Status: affected)
- 23.0 ap377566 (Status: affected)
- 23.0 ap377494 (Status: affected)
- 23.0 ap377799 (Status: affected)
- 23.0 ap377779 (Status: affected)
- 23.0 ap378165 (Status: affected)
- 23.0 ap378332 (Status: affected)
- 23.0 ap377757 (Status: affected)
- 23.0 ap377908 (Status: affected)
- 23.0 ap377802 (Status: affected)
- 23.0 ap378134 (Status: affected)
- 23.0 ap378545 (Status: affected)
- 23.0 ap378863 (Status: affected)
- 23.0 ap378882 (Status: affected)
- 23.0 ap379016 (Status: affected)
- 23.0 ap378599 (Status: affected)
- 23.0 ap378218 (Status: affected)
- 23.0 ap378164 (Status: affected)
- 23.0 ap379085 (Status: affected)
- 23.0 ap378880 (Status: affected)
- 23.0 ap378862 (Status: affected)
- 23.0 ap378425 (Status: affected)
- 23.0 ap378259 (Status: affected)
- 23.0 ap378970 (Status: affected)
- 23.0 ap378153 (Status: affected)
- 23.0 ap378585 (Status: affected)
- 23.0 ap378509 (Status: affected)
- 23.0 ap378471 (Status: affected)
- 23.0 ap378966 (Status: affected)
- 23.0 ap379049 (Status: affected)
- 23.0 ap379012 (Status: affected)
- 23.0 ap379080 (Status: affected)
- 23.0 ap378865 (Status: affected)
- 23.0 ap378140 (Status: affected)
- 23.0 ap378440 (Status: affected)
- 23.0 ap378823 (Status: affected)
- 23.0 ap378603 (Status: affected)
- 23.0 ap379397 (Status: affected)
- 23.0 ap378953 (Status: affected)
- 23.0 ap378866 (Status: affected)
- 23.0 ap379008 (Status: affected)
- 23.0 ap378924 (Status: affected)
- 23.0 ap378581 (Status: affected)
- 23.0 ap378999 (Status: affected)
- 23.0 ap378080 (Status: affected)
- 23.0 ap380161 (Status: affected)
- 23.0 ap379046 (Status: affected)
- 23.0 ap379874 (Status: affected)
- 23.0 ap378391 (Status: affected)
- 23.0 ap380239 (Status: affected)
- 23.0 ap379772 (Status: affected)
- 23.0 ap379531 (Status: affected)
- 23.0 ap379888 (Status: affected)
- 23.0 ap379167 (Status: affected)
- 23.0 ap380167 (Status: affected)
- 23.0 ap380099 (Status: affected)
- 23.0 ap379847 (Status: affected)
- 23.0 ap379098 (Status: affected)
- 23.0 ap379972 (Status: affected)
- 23.0 ap379438 (Status: affected)
- 23.0 ap380143 (Status: affected)
- 23.0 ap380187 (Status: affected)
- 23.0 ap380045 (Status: affected)
- 23.0 ap379848 (Status: affected)
- 23.0 ap377384 (Status: affected)
- 23.0 ap376984 (Status: affected)
- 23.0 ap380128 (Status: affected)
- 23.0 ap377149 (Status: affected)
- 23.0 ap379694 (Status: affected)
- 23.0 ap379780 (Status: affected)
- 23.0 ap380371 (Status: affected)
- 23.0 ap380180 (Status: affected)
- 23.0 ap380042 (Status: affected)
- 23.0 ap379487 (Status: affected)
- 23.0 ap379934 (Status: affected)
- 23.0 ap379833 (Status: affected)
- 23.0 ap380473 (Status: affected)
- 23.0 ap380535 (Status: affected)
- 23.0 ap377068 (Status: affected)
- 23.0 ap379853 (Status: affected)
- 23.0 ap380998 (Status: affected)
- 23.0 ap380626 (Status: affected)
- 23.0 ap377079 (Status: affected)
- 23.0 ap377329 (Status: affected)
- 23.0 ap381091 (Status: affected)
- 23.0 ap380751 (Status: affected)
- 23.0 ap381270 (Status: affected)
- 23.0 ap380817 (Status: affected)
- 23.0 ap380739 (Status: affected)
- 23.0 ap380783 (Status: affected)
- 23.0 ap380537 (Status: affected)
- 23.0 ap380697 (Status: affected)
- 23.0 ap380936 (Status: affected)
- 23.0 ap380486 (Status: affected)
- 23.0 ap380512 (Status: affected)
- 23.0 ap380737 (Status: affected)
- 23.0 ap381118 (Status: affected)
- 23.0 ap381072 (Status: affected)
- 23.0 ap381584 (Status: affected)
- 23.0 ap382053 (Status: affected)
- 23.0 ap381523 (Status: affected)
- 23.0 ap381732 (Status: affected)
- 23.0 ap382252 (Status: affected)
- 23.0 ap383002 (Status: affected)
- 23.0 ap382857 (Status: affected)
- 23.0 ap382846 (Status: affected)
- 23.0 ap382253 (Status: affected)
- 23.0 ap381322 (Status: affected)
- 23.0 ap382057 (Status: affected)
- 23.0 ap382386 (Status: affected)
- 23.0 ap382709 (Status: affected)
- 23.0 ap382954 (Status: affected)
- 23.0 ap382717 (Status: affected)
- 23.0 ap381594 (Status: affected)
- 23.0 ap381410 (Status: affected)
- 23.0 ap382463 (Status: affected)
- 23.0 ap382198 (Status: affected)
- 23.0 ap381526 (Status: affected)
- 23.0 ap381498 (Status: affected)
- 23.0 ap381418 (Status: affected)
- 23.0 ap383573 (Status: affected)
- 23.0 ap381609 (Status: affected)
- 23.0 ap381548 (Status: affected)
- 23.0 ap383706 (Status: affected)
- 23.0 ap382945 (Status: affected)
- 23.0 ap382300 (Status: affected)
- 23.0 ap382977 (Status: affected)
- 23.0 ap383547 (Status: affected)
- 23.0 ap382158 (Status: affected)
- 23.0 ap382240 (Status: affected)
- 23.0 ap383515 (Status: affected)
- 23.0 ap383754 (Status: affected)
- 23.0 ap381961 (Status: affected)
- 23.0 ap382951 (Status: affected)
- 23.0 ap382824 (Status: affected)
- 23.0 ap383536 (Status: affected)
- 23.0 ap383247 (Status: affected)
- 23.0 ap383170 (Status: affected)
- 23.0 ap382032 (Status: affected)
- 23.0 ap383365 (Status: affected)
- 23.0 ap381569 (Status: affected)
- 23.0 ap381348 (Status: affected)
- 23.0 ap382192 (Status: affected)
- 23.0 ap381367 (Status: affected)
- 23.0 ap383597 (Status: affected)
- 23.0 ap383309 (Status: affected)
- 23.0 ap383064 (Status: affected)
- 23.0 ap383168 (Status: affected)
- 23.0 ap382434 (Status: affected)
- 23.0 ap384431 (Status: affected)
- 23.0 ap383514 (Status: affected)
- 23.0 ap384441 (Status: affected)
- 23.0 ap352264 (Status: affected)
- 23.0 ap355907 (Status: affected)
- 23.0 ap356752 (Status: affected)
- 23.0 ap358046 (Status: affected)
- 23.0 ap361930 (Status: affected)
- 23.0 ap363247 (Status: affected)
- 23.0 ap363431 (Status: affected)
- 23.0 ap363672 (Status: affected)
- 23.0 ap364532 (Status: affected)
- 23.0 ap365646 (Status: affected)
- 23.0 ap365661 (Status: affected)
- 23.0 ap365770 (Status: affected)
- 23.0 ap365984 (Status: affected)
- 23.0 ap366661 (Status: affected)
- 23.0 ap366835 (Status: affected)
- 23.0 ap366836 (Status: affected)
- 23.0 ap366905 (Status: affected)
- 23.0 ap366940 (Status: affected)
- 23.0 ap367112 (Status: affected)
- 23.0 ap367113 (Status: affected)
- 23.0 ap367781 (Status: affected)
- 23.0 ap367991 (Status: affected)
- 23.0 ap368485 (Status: affected)
- 23.0 ap368605 (Status: affected)
- 23.0 ap368933 (Status: affected)
- 23.0 ap369052 (Status: affected)
- 23.0 ap369103 (Status: affected)
- 23.0 ap369127 (Status: affected)
- 23.0 ap369211 (Status: affected)
- 23.0 ap369300 (Status: affected)
- 23.0 ap369469 (Status: affected)
- 23.0 ap369535 (Status: affected)
- 23.0 ap369595 (Status: affected)
- 23.0 ap369619 (Status: affected)
- 23.0 ap369680 (Status: affected)
- 23.0 ap369878 (Status: affected)
- 23.0 ap369885 (Status: affected)
- 23.0 ap369902 (Status: affected)
- 23.0 ap369903 (Status: affected)
- 23.0 ap370093 (Status: affected)
- 23.0 ap370199 (Status: affected)
- 23.0 ap370222 (Status: affected)
- 23.0 ap370244 (Status: affected)
- 23.0 ap370300 (Status: affected)
- 23.0 ap370326 (Status: affected)
- 23.0 ap370347 (Status: affected)
- 23.0 ap370539 (Status: affected)
- 23.0 ap370578 (Status: affected)
- 23.0 ap370662 (Status: affected)
- 23.0 ap370720 (Status: affected)
- 23.0 ap370735 (Status: affected)
- 23.0 ap370907 (Status: affected)
- 23.0 ap370918 (Status: affected)
- 23.0 ap371056 (Status: affected)
- 23.0 ap371080 (Status: affected)
- 23.0 ap371151 (Status: affected)
- 23.0 ap371254 (Status: affected)
- 23.0 ap371301 (Status: affected)
- 23.0 ap371423 (Status: affected)
- 23.0 ap371490 (Status: affected)
- 23.0 ap371529 (Status: affected)
- 23.0 ap371539 (Status: affected)
- 23.0 ap371557 (Status: affected)
- 23.0 ap371733 (Status: affected)
- 23.0 ap371768 (Status: affected)
- 23.0 ap371772 (Status: affected)
- 23.0 ap371886 (Status: affected)
- 23.0 ap371917 (Status: affected)
- 23.0 ap371922 (Status: affected)
- 23.0 ap372011 (Status: affected)
- 23.0 ap372077 (Status: affected)
- 23.0 ap372286 (Status: affected)
- 23.0 ap372293 (Status: affected)
- 23.0 ap372432 (Status: affected)
- 23.0 ap372475 (Status: affected)
- 23.0 ap372502 (Status: affected)
- 23.0 ap372505 (Status: affected)
- 23.0 ap372617 (Status: affected)
- 23.0 ap372655 (Status: affected)
- 23.0 ap372890 (Status: affected)
- 23.0 ap372943 (Status: affected)
- 23.0 ap372989 (Status: affected)
- 23.0 ap373146 (Status: affected)
- 23.0 ap373197 (Status: affected)
- 23.0 ap373284 (Status: affected)
- 23.0 ap373340 (Status: affected)
- 23.0 ap373412 (Status: affected)
- 23.0 ap373521 (Status: affected)
- 23.0 ap373872 (Status: affected)
- 23.0 ap374211 (Status: affected)
- 23.0 ap375804 (Status: affected)
- 23.0 ap381734 (Status: affected)
- 23.0 ap381809 (Status: affected)
- 23.0 ap384622 (Status: affected)
- 23.0 ap384639 (Status: affected)
- 23.0 ap384650 (Status: affected)
- 23.0 ap384591 (Status: affected)
- 23.0 ap384745 (Status: affected)
- 23.0 ap384876 (Status: affected)
- 23.0 ap384901 (Status: affected)
- 23.0 ap384930 (Status: affected)
- 23.0 ap384931 (Status: affected)
- 23.0 ap385048 (Status: affected)
- 23.0 ap385072 (Status: affected)
- 23.0 ap362738 (Status: affected)
- 23.0 ap364904 (Status: affected)
- 23.0 ap365813 (Status: affected)
- 23.0 ap366965 (Status: affected)
- 23.0 ap368128 (Status: affected)
- 23.0 ap369581 (Status: affected)
- 23.0 ap370476 (Status: affected)
- 23.0 ap377960 (Status: affected)
- 23.0 ap381844 (Status: affected)
- 23.0 ap384217 (Status: affected)
- 23.0 ap384772 (Status: affected)
- 23.0 ap384793 (Status: affected)
- 23.0 ap384879 (Status: affected)
- 23.0 ap384920 (Status: affected)
- 23.0 ap384947 (Status: affected)
- 23.0 ap385046 (Status: affected)
- 23.0 ap385052 (Status: affected)
- 23.0 ap385071 (Status: affected)
- 23.0 ap385104 (Status: affected)
- 23.0 ap385107 (Status: affected)
- 23.0 ap385115 (Status: affected)
- 23.0 ap385117 (Status: affected)
- 23.0 ap385136 (Status: affected)
- 23.0 ap385236 (Status: affected)
- 23.0 ap385244 (Status: affected)
- 23.0 ap385247 (Status: affected)
- 23.0 ap385251 (Status: affected)
- 23.0 ap385266 (Status: affected)
- 23.0 ap385268 (Status: affected)
- 23.0 ap385276 (Status: affected)
- 23.0 ap385280 (Status: affected)
- 23.0 ap385274 (Status: affected)
- 22.0 (Status: affected)
- 22.0 ap379636 (Status: affected)
- 22.0 ap375345 (Status: affected)
- 22.0 ap355095 (Status: affected)
- 22.0 ap352969 (Status: affected)
- 22.0 ap349872 (Status: affected)
- 22.0 ap375197 (Status: affected)
- 22.0 ap382358 (Status: affected)
- 22.0 ap356705 (Status: affected)
- 22.0 ap347741 (Status: affected)
- 22.0 ap375601 (Status: affected)
- 22.0 ap383686 (Status: affected)
- 22.0 ap374901 (Status: affected)
- 22.0 ap377577 (Status: affected)
- 22.0 ap383600 (Status: affected)
- 22.0 ap382057 (Status: affected)
- 22.0 ap383720 (Status: affected)
- 22.0 ap339395 (Status: affected)
- 22.0 ap366268 (Status: affected)
- 22.0 ap372620 (Status: affected)
- 22.0 ap372243 (Status: affected)
- 22.0 ap365170 (Status: affected)
- 22.0 ap372504 (Status: affected)
- 22.0 ap356317 (Status: affected)
- 22.0 ap366181 (Status: affected)
- 22.0 ap366290 (Status: affected)
- 22.0 ap354474 (Status: affected)
- 22.0 ap353530 (Status: affected)
- 22.0 ap339206 (Status: affected)
- 22.0 ap351160 (Status: affected)
- 22.0 ap366373 (Status: affected)
- 22.0 ap366298 (Status: affected)
- 22.0 ap360116 (Status: affected)
- 22.0 ap368497 (Status: affected)
- 22.0 ap368125 (Status: affected)
- 22.0 ap352359 (Status: affected)
- 22.0 ap364168 (Status: affected)
- 22.0 ap368419 (Status: affected)
- 22.0 ap364925 (Status: affected)
- 22.0 ap367732 (Status: affected)
- 22.0 ap357506 (Status: affected)
- 22.0 ap380486 (Status: affected)
- 22.0 ap379780 (Status: affected)
- 22.0 ap359119 (Status: affected)
- 22.0 ap364384 (Status: affected)
- 22.0 ap351263 (Status: affected)
- 22.0 ap360568 (Status: affected)
- 22.0 ap361308 (Status: affected)
- 22.0 ap364369 (Status: affected)
- 22.0 ap365341 (Status: affected)
- 22.0 ap383754 (Status: affected)
- 22.0 ap364879 (Status: affected)
- 22.0 ap363366 (Status: affected)
- 22.0 ap366916 (Status: affected)
- 22.0 ap363363 (Status: affected)
- 22.0 ap374557 (Status: affected)
- 22.0 ap374507 (Status: affected)
- 22.0 ap375533 (Status: affected)
- 22.0 ap372845 (Status: affected)
- 22.0 ap373708 (Status: affected)
- 22.0 ap373684 (Status: affected)
- 22.0 ap367794 (Status: affected)
- 22.0 ap366898 (Status: affected)
- 22.0 ap369778 (Status: affected)
- 22.0 ap368180 (Status: affected)
- 22.0 ap373969 (Status: affected)
- 22.0 ap366882 (Status: affected)
- 22.0 ap358889 (Status: affected)
- 22.0 ap369774 (Status: affected)
- 22.0 ap348431 (Status: affected)
- 22.0 ap358699 (Status: affected)
- 22.0 ap348100 (Status: affected)
- 22.0 ap353184 (Status: affected)
- 22.0 ap352248 (Status: affected)
- 22.0 ap361590 (Status: affected)
- 22.0 ap355907 (Status: affected)
- 22.0 ap363730 (Status: affected)
- 22.0 ap356817 (Status: affected)
- 22.0 ap356375 (Status: affected)
- 22.0 ap373015 (Status: affected)
- 22.0 ap374269 (Status: affected)
- 22.0 ap355114 (Status: affected)
- 22.0 ap365239 (Status: affected)
- 22.0 ap367782 (Status: affected)
- 22.0 ap365223 (Status: affected)
- 22.0 ap359972 (Status: affected)
- 22.0 ap360306 (Status: affected)
- 22.0 ap359433 (Status: affected)
- 22.0 ap359991 (Status: affected)
- 22.0 ap359729 (Status: affected)
- 22.0 ap358357 (Status: affected)
- 22.0 ap381513 (Status: affected)
- 22.0 ap365889 (Status: affected)
- 22.0 ap367349 (Status: affected)
- 22.0 ap360244 (Status: affected)
- 22.0 ap369931 (Status: affected)
- 22.0 ap367874 (Status: affected)
- 22.0 ap360966 (Status: affected)
- 22.0 ap377079 (Status: affected)
- 22.0 ap376710 (Status: affected)
- 22.0 ap357166 (Status: affected)
- 22.0 ap380691 (Status: affected)
- 22.0 ap383716 (Status: affected)
- 22.0 ap383797 (Status: affected)
- 22.0 ap384211 (Status: affected)
- 22.0 ap348078 (Status: affected)
- 22.0 ap342836 (Status: affected)
- 22.0 ap343616 (Status: affected)
- 22.0 ap346307 (Status: affected)
- 22.0 ap345032 (Status: affected)
- 22.0 ap339371 (Status: affected)
- 22.0 ap354355 (Status: affected)
- 22.0 ap353903 (Status: affected)
- 22.0 ap354070 (Status: affected)
- 22.0 ap354354 (Status: affected)
- 22.0 ap349850 (Status: affected)
- 22.0 ap354027 (Status: affected)
- 22.0 ap354069 (Status: affected)
- 22.0 ap353915 (Status: affected)
- 22.0 ap348472 (Status: affected)
- 22.0 ap350217 (Status: affected)
- 22.0 ap353841 (Status: affected)
- 22.0 ap350179 (Status: affected)
- 22.0 ap354313 (Status: affected)
- 22.0 ap354098 (Status: affected)
- 22.0 ap353975 (Status: affected)
- 22.0 ap348945 (Status: affected)
- 22.0 ap354090 (Status: affected)
- 22.0 ap352325 (Status: affected)
- 22.0 ap350176 (Status: affected)
- 22.0 ap352402 (Status: affected)
- 22.0 ap350405 (Status: affected)
- 22.0 ap352928 (Status: affected)
- 22.0 ap350573 (Status: affected)
- 22.0 ap353357 (Status: affected)
- 22.0 ap352516 (Status: affected)
- 22.0 ap352109 (Status: affected)
- 22.0 ap352330 (Status: affected)
- 22.0 ap353120 (Status: affected)
- 22.0 ap351250 (Status: affected)
- 22.0 ap353384 (Status: affected)
- 22.0 ap353490 (Status: affected)
- 22.0 ap352421 (Status: affected)
- 22.0 ap352766 (Status: affected)
- 22.0 ap351924 (Status: affected)
- 22.0 ap353676 (Status: affected)
- 22.0 ap352178 (Status: affected)
- 22.0 ap352962 (Status: affected)
- 22.0 ap351721 (Status: affected)
- 22.0 ap352795 (Status: affected)
- 22.0 ap352703 (Status: affected)
- 22.0 ap353549 (Status: affected)
- 22.0 ap353418 (Status: affected)
- 22.0 ap353358 (Status: affected)
- 22.0 ap353179 (Status: affected)
- 22.0 ap351960 (Status: affected)
- 22.0 ap353162 (Status: affected)
- 22.0 ap353520 (Status: affected)
- 22.0 ap353390 (Status: affected)
- 22.0 ap351700 (Status: affected)
- 22.0 ap351973 (Status: affected)
- 22.0 ap352372 (Status: affected)
- 22.0 ap352205 (Status: affected)
- 22.0 ap352515 (Status: affected)
- 22.0 ap353360 (Status: affected)
- 22.0 ap352932 (Status: affected)
- 22.0 ap354921 (Status: affected)
- 22.0 ap352726 (Status: affected)
- 22.0 ap355000 (Status: affected)
- 22.0 ap352896 (Status: affected)
- 22.0 ap355757 (Status: affected)
- 22.0 ap352972 (Status: affected)
- 22.0 ap353577 (Status: affected)
- 22.0 ap352493 (Status: affected)
- 22.0 ap356603 (Status: affected)
- 22.0 ap354784 (Status: affected)
- 22.0 ap354448 (Status: affected)
- 22.0 ap355894 (Status: affected)
- 22.0 ap355385 (Status: affected)
- 22.0 ap353458 (Status: affected)
- 22.0 ap354646 (Status: affected)
- 22.0 ap353372 (Status: affected)
- 22.0 ap355083 (Status: affected)
- 22.0 ap357047 (Status: affected)
- 22.0 ap353681 (Status: affected)
- 22.0 ap356164 (Status: affected)
- 22.0 ap355027 (Status: affected)
- 22.0 ap356848 (Status: affected)
- 22.0 ap356706 (Status: affected)
- 22.0 ap356474 (Status: affected)
- 22.0 ap354750 (Status: affected)
- 22.0 ap356799 (Status: affected)
- 22.0 ap356432 (Status: affected)
- 22.0 ap354927 (Status: affected)
- 22.0 ap353699 (Status: affected)
- 22.0 ap355443 (Status: affected)
- 22.0 ap356330 (Status: affected)
- 22.0 ap356512 (Status: affected)
- 22.0 ap357083 (Status: affected)
- 22.0 ap355647 (Status: affected)
- 22.0 ap356328 (Status: affected)
- 22.0 ap355774 (Status: affected)
- 22.0 ap354519 (Status: affected)
- 22.0 ap355343 (Status: affected)
- 22.0 ap355091 (Status: affected)
- 22.0 ap354785 (Status: affected)
- 22.0 ap354793 (Status: affected)
- 22.0 ap354374 (Status: affected)
- 22.0 ap355905 (Status: affected)
- 22.0 ap354764 (Status: affected)
- 22.0 ap355672 (Status: affected)
- 22.0 ap355080 (Status: affected)
- 22.0 ap355070 (Status: affected)
- 22.0 ap355365 (Status: affected)
- 22.0 ap355353 (Status: affected)
- 22.0 ap355286 (Status: affected)
- 22.0 ap356434 (Status: affected)
- 22.0 ap356000 (Status: affected)
- 22.0 ap354964 (Status: affected)
- 22.0 ap355916 (Status: affected)
- 22.0 ap355555 (Status: affected)
- 22.0 ap355775 (Status: affected)
- 22.0 ap354936 (Status: affected)
- 22.0 ap356271 (Status: affected)
- 22.0 ap355285 (Status: affected)
- 22.0 ap355616 (Status: affected)
- 22.0 ap355674 (Status: affected)
- 22.0 ap356538 (Status: affected)
- 22.0 ap356960 (Status: affected)
- 22.0 ap355922 (Status: affected)
- 22.0 ap355812 (Status: affected)
- 22.0 ap356458 (Status: affected)
- 22.0 ap353701 (Status: affected)
- 22.0 ap356140 (Status: affected)
- 22.0 ap354413 (Status: affected)
- 22.0 ap357378 (Status: affected)
- 22.0 ap357395 (Status: affected)
- 22.0 ap357400 (Status: affected)
- 22.0 ap357632 (Status: affected)
- 22.0 ap356390 (Status: affected)
- 22.0 ap357607 (Status: affected)
- 22.0 ap357525 (Status: affected)
- 22.0 ap354769 (Status: affected)
- 22.0 ap358893 (Status: affected)
- 22.0 ap357560 (Status: affected)
- 22.0 ap357645 (Status: affected)
- 22.0 ap359029 (Status: affected)
- 22.0 ap357768 (Status: affected)
- 22.0 ap357859 (Status: affected)
- 22.0 ap358578 (Status: affected)
- 22.0 ap359145 (Status: affected)
- 22.0 ap357471 (Status: affected)
- 22.0 ap358092 (Status: affected)
- 22.0 ap357571 (Status: affected)
- 22.0 ap359111 (Status: affected)
- 22.0 ap357769 (Status: affected)
- 22.0 ap358469 (Status: affected)
- 22.0 ap359525 (Status: affected)
- 22.0 ap357795 (Status: affected)
- 22.0 ap358399 (Status: affected)
- 22.0 ap358493 (Status: affected)
- 22.0 ap359049 (Status: affected)
- 22.0 ap358971 (Status: affected)
- 22.0 ap358246 (Status: affected)
- 22.0 ap358234 (Status: affected)
- 22.0 ap358345 (Status: affected)
- 22.0 ap359112 (Status: affected)
- 22.0 ap358059 (Status: affected)
- 22.0 ap358582 (Status: affected)
- 22.0 ap359589 (Status: affected)
- 22.0 ap358453 (Status: affected)
- 22.0 ap357791 (Status: affected)
- 22.0 ap359156 (Status: affected)
- 22.0 ap358034 (Status: affected)
- 22.0 ap357718 (Status: affected)
- 22.0 ap358454 (Status: affected)
- 22.0 ap357775 (Status: affected)
- 22.0 ap358132 (Status: affected)
- 22.0 ap358603 (Status: affected)
- 22.0 ap358515 (Status: affected)
- 22.0 ap358563 (Status: affected)
- 22.0 ap359103 (Status: affected)
- 22.0 ap359227 (Status: affected)
- 22.0 ap359127 (Status: affected)
- 22.0 ap358887 (Status: affected)
- 22.0 ap359106 (Status: affected)
- 22.0 ap363144 (Status: affected)
- 22.0 ap359829 (Status: affected)
- 22.0 ap359649 (Status: affected)
- 22.0 ap358995 (Status: affected)
- 22.0 ap361101 (Status: affected)
- 22.0 ap359470 (Status: affected)
- 22.0 ap359465 (Status: affected)
- 22.0 ap360164 (Status: affected)
- 22.0 ap360007 (Status: affected)
- 22.0 ap359001 (Status: affected)
- 22.0 ap359748 (Status: affected)
- 22.0 ap360495 (Status: affected)
- 22.0 ap360931 (Status: affected)
- 22.0 ap360817 (Status: affected)
- 22.0 ap360459 (Status: affected)
- 22.0 ap359911 (Status: affected)
- 22.0 ap363146 (Status: affected)
- 22.0 ap360201 (Status: affected)
- 22.0 ap360586 (Status: affected)
- 22.0 ap359974 (Status: affected)
- 22.0 ap361054 (Status: affected)
- 22.0 ap361153 (Status: affected)
- 22.0 ap360904 (Status: affected)
- 22.0 ap359644 (Status: affected)
- 22.0 ap360265 (Status: affected)
- 22.0 ap359765 (Status: affected)
- 22.0 ap363145 (Status: affected)
- 22.0 ap360816 (Status: affected)
- 22.0 ap361116 (Status: affected)
- 22.0 ap360600 (Status: affected)
- 22.0 ap360362 (Status: affected)
- 22.0 ap362247 (Status: affected)
- 22.0 ap360912 (Status: affected)
- 22.0 ap360960 (Status: affected)
- 22.0 ap360184 (Status: affected)
- 22.0 ap360740 (Status: affected)
- 22.0 ap361696 (Status: affected)
- 22.0 ap361076 (Status: affected)
- 22.0 ap362532 (Status: affected)
- 22.0 ap361520 (Status: affected)
- 22.0 ap361974 (Status: affected)
- 22.0 ap362771 (Status: affected)
- 22.0 ap361598 (Status: affected)
- 22.0 ap361445 (Status: affected)
- 22.0 ap361833 (Status: affected)
- 22.0 ap361560 (Status: affected)
- 22.0 ap362143 (Status: affected)
- 22.0 ap362848 (Status: affected)
- 22.0 ap362610 (Status: affected)
- 22.0 ap361559 (Status: affected)
- 22.0 ap361820 (Status: affected)
- 22.0 ap360325 (Status: affected)
- 22.0 ap361835 (Status: affected)
- 22.0 ap361533 (Status: affected)
- 22.0 ap361883 (Status: affected)
- 22.0 ap362150 (Status: affected)
- 22.0 ap362163 (Status: affected)
- 22.0 ap361854 (Status: affected)
- 22.0 ap362548 (Status: affected)
- 22.0 ap362001 (Status: affected)
- 22.0 ap362276 (Status: affected)
- 22.0 ap362825 (Status: affected)
- 22.0 ap362298 (Status: affected)
- 22.0 ap362637 (Status: affected)
- 22.0 ap362619 (Status: affected)
- 22.0 ap362490 (Status: affected)
- 22.0 ap362373 (Status: affected)
- 22.0 ap362553 (Status: affected)
- 22.0 ap362710 (Status: affected)
- 22.0 ap362799 (Status: affected)
- 22.0 ap362088 (Status: affected)
- 22.0 ap364194 (Status: affected)
- 22.0 ap361834 (Status: affected)
- 22.0 ap361666 (Status: affected)
- 22.0 ap363430 (Status: affected)
- 22.0 ap362713 (Status: affected)
- 22.0 ap362182 (Status: affected)
- 22.0 ap362644 (Status: affected)
- 22.0 ap363584 (Status: affected)
- 22.0 ap363815 (Status: affected)
- 22.0 ap362328 (Status: affected)
- 22.0 ap364223 (Status: affected)
- 22.0 ap363332 (Status: affected)
- 22.0 ap363867 (Status: affected)
- 22.0 ap362831 (Status: affected)
- 22.0 ap363361 (Status: affected)
- 22.0 ap368026 (Status: affected)
- 22.0 ap363521 (Status: affected)
- 22.0 ap364048 (Status: affected)
- 22.0 ap367675 (Status: affected)
- 22.0 ap364199 (Status: affected)
- 22.0 ap363233 (Status: affected)
- 22.0 ap363666 (Status: affected)
- 22.0 ap364256 (Status: affected)
- 22.0 ap363831 (Status: affected)
- 22.0 ap364278 (Status: affected)
- 22.0 ap367969 (Status: affected)
- 22.0 ap363372 (Status: affected)
- 22.0 ap363759 (Status: affected)
- 22.0 ap363218 (Status: affected)
- 22.0 ap363596 (Status: affected)
- 22.0 ap368015 (Status: affected)
- 22.0 ap366118 (Status: affected)
- 22.0 ap364291 (Status: affected)
- 22.0 ap363213 (Status: affected)
- 22.0 ap366397 (Status: affected)
- 22.0 ap363582 (Status: affected)
- 22.0 ap364125 (Status: affected)
- 22.0 ap363234 (Status: affected)
- 22.0 ap366701 (Status: affected)
- 22.0 ap366221 (Status: affected)
- 22.0 ap366301 (Status: affected)
- 22.0 ap366174 (Status: affected)
- 22.0 ap363846 (Status: affected)
- 22.0 ap364258 (Status: affected)
- 22.0 ap365970 (Status: affected)
- 22.0 ap363729 (Status: affected)
- 22.0 ap363265 (Status: affected)
- 22.0 ap363770 (Status: affected)
- 22.0 ap366784 (Status: affected)
- 22.0 ap366348 (Status: affected)
- 22.0 ap366803 (Status: affected)
- 22.0 ap366358 (Status: affected)
- 22.0 ap366744 (Status: affected)
- 22.0 ap366180 (Status: affected)
- 22.0 ap366649 (Status: affected)
- 22.0 ap364500 (Status: affected)
- 22.0 ap365172 (Status: affected)
- 22.0 ap365995 (Status: affected)
- 22.0 ap366486 (Status: affected)
- 22.0 ap366261 (Status: affected)
- 22.0 ap366490 (Status: affected)
- 22.0 ap366375 (Status: affected)
- 22.0 ap366211 (Status: affected)
- 22.0 ap365115 (Status: affected)
- 22.0 ap366295 (Status: affected)
- 22.0 ap366656 (Status: affected)
- 22.0 ap364670 (Status: affected)
- 22.0 ap366117 (Status: affected)
- 22.0 ap364905 (Status: affected)
- 22.0 ap364471 (Status: affected)
- 22.0 ap364699 (Status: affected)
- 22.0 ap364922 (Status: affected)
- 22.0 ap364745 (Status: affected)
- 22.0 ap364781 (Status: affected)
- 22.0 ap365146 (Status: affected)
- 22.0 ap366747 (Status: affected)
- 22.0 ap364898 (Status: affected)
- 22.0 ap364797 (Status: affected)
- 22.0 ap364651 (Status: affected)
- 22.0 ap364932 (Status: affected)
- 22.0 ap364860 (Status: affected)
- 22.0 ap366677 (Status: affected)
- 22.0 ap365545 (Status: affected)
- 22.0 ap367513 (Status: affected)
- 22.0 ap365390 (Status: affected)
- 22.0 ap364805 (Status: affected)
- 22.0 ap365800 (Status: affected)
- 22.0 ap365173 (Status: affected)
- 22.0 ap364761 (Status: affected)
- 22.0 ap364924 (Status: affected)
- 22.0 ap365167 (Status: affected)
- 22.0 ap364473 (Status: affected)
- 22.0 ap365584 (Status: affected)
- 22.0 ap365400 (Status: affected)
- 22.0 ap367396 (Status: affected)
- 22.0 ap365632 (Status: affected)
- 22.0 ap365905 (Status: affected)
- 22.0 ap367109 (Status: affected)
- 22.0 ap365449 (Status: affected)
- 22.0 ap367338 (Status: affected)
- 22.0 ap367001 (Status: affected)
- 22.0 ap365685 (Status: affected)
- 22.0 ap367207 (Status: affected)
- 22.0 ap367434 (Status: affected)
- 22.0 ap365597 (Status: affected)
- 22.0 ap365801 (Status: affected)
- 22.0 ap365815 (Status: affected)
- 22.0 ap365759 (Status: affected)
- 22.0 ap365730 (Status: affected)
- 22.0 ap365662 (Status: affected)
- 22.0 ap365920 (Status: affected)
- 22.0 ap365556 (Status: affected)
- 22.0 ap367290 (Status: affected)
- 22.0 ap367517 (Status: affected)
- 22.0 ap367183 (Status: affected)
- 22.0 ap370911 (Status: affected)
- 22.0 ap367340 (Status: affected)
- 22.0 ap371050 (Status: affected)
- 22.0 ap371313 (Status: affected)
- 22.0 ap371436 (Status: affected)
- 22.0 ap367291 (Status: affected)
- 22.0 ap365727 (Status: affected)
- 22.0 ap371470 (Status: affected)
- 22.0 ap365511 (Status: affected)
- 22.0 ap367524 (Status: affected)
- 22.0 ap370802 (Status: affected)
- 22.0 ap365379 (Status: affected)
- 22.0 ap365944 (Status: affected)
- 22.0 ap371587 (Status: affected)
- 22.0 ap366959 (Status: affected)
- 22.0 ap365372 (Status: affected)
- 22.0 ap367453 (Status: affected)
- 22.0 ap365601 (Status: affected)
- 22.0 ap371836 (Status: affected)
- 22.0 ap365779 (Status: affected)
- 22.0 ap365858 (Status: affected)
- 22.0 ap366972 (Status: affected)
- 22.0 ap372163 (Status: affected)
- 22.0 ap371871 (Status: affected)
- 22.0 ap367461 (Status: affected)
- 22.0 ap370948 (Status: affected)
- 22.0 ap371437 (Status: affected)
- 22.0 ap372043 (Status: affected)
- 22.0 ap372016 (Status: affected)
- 22.0 ap371999 (Status: affected)
- 22.0 ap370817 (Status: affected)
- 22.0 ap367367 (Status: affected)
- 22.0 ap372072 (Status: affected)
- 22.0 ap372338 (Status: affected)
- 22.0 ap372177 (Status: affected)
- 22.0 ap370952 (Status: affected)
- 22.0 ap371455 (Status: affected)
- 22.0 ap371926 (Status: affected)
- 22.0 ap372351 (Status: affected)
- 22.0 ap370884 (Status: affected)
- 22.0 ap371361 (Status: affected)
- 22.0 ap372354 (Status: affected)
- 22.0 ap372100 (Status: affected)
- 22.0 ap371262 (Status: affected)
- 22.0 ap371775 (Status: affected)
- 22.0 ap371613 (Status: affected)
- 22.0 ap371656 (Status: affected)
- 22.0 ap371895 (Status: affected)
- 22.0 ap371155 (Status: affected)
- 22.0 ap371516 (Status: affected)
- 22.0 ap371281 (Status: affected)
- 22.0 ap371770 (Status: affected)
- 22.0 ap371033 (Status: affected)
- 22.0 ap371583 (Status: affected)
- 22.0 ap368461 (Status: affected)
- 22.0 ap371195 (Status: affected)
- 22.0 ap371366 (Status: affected)
- 22.0 ap371911 (Status: affected)
- 22.0 ap371467 (Status: affected)
- 22.0 ap372371 (Status: affected)
- 22.0 ap368695 (Status: affected)
- 22.0 ap368140 (Status: affected)
- 22.0 ap368603 (Status: affected)
- 22.0 ap371805 (Status: affected)
- 22.0 ap368913 (Status: affected)
- 22.0 ap368987 (Status: affected)
- 22.0 ap372024 (Status: affected)
- 22.0 ap372152 (Status: affected)
- 22.0 ap371627 (Status: affected)
- 22.0 ap371961 (Status: affected)
- 22.0 ap371295 (Status: affected)
- 22.0 ap369674 (Status: affected)
- 22.0 ap369607 (Status: affected)
- 22.0 ap369173 (Status: affected)
- 22.0 ap369863 (Status: affected)
- 22.0 ap369433 (Status: affected)
- 22.0 ap368604 (Status: affected)
- 22.0 ap368087 (Status: affected)
- 22.0 ap368706 (Status: affected)
- 22.0 ap370103 (Status: affected)
- 22.0 ap368216 (Status: affected)
- 22.0 ap369934 (Status: affected)
- 22.0 ap368326 (Status: affected)
- 22.0 ap369855 (Status: affected)
- 22.0 ap368510 (Status: affected)
- 22.0 ap369501 (Status: affected)
- 22.0 ap369693 (Status: affected)
- 22.0 ap368327 (Status: affected)
- 22.0 ap369219 (Status: affected)
- 22.0 ap368568 (Status: affected)
- 22.0 ap369227 (Status: affected)
- 22.0 ap368422 (Status: affected)
- 22.0 ap369454 (Status: affected)
- 22.0 ap368217 (Status: affected)
- 22.0 ap369529 (Status: affected)
- 22.0 ap368887 (Status: affected)
- 22.0 ap368096 (Status: affected)
- 22.0 ap368754 (Status: affected)
- 22.0 ap369106 (Status: affected)
- 22.0 ap369748 (Status: affected)
- 22.0 ap368978 (Status: affected)
- 22.0 ap370113 (Status: affected)
- 22.0 ap369478 (Status: affected)
- 22.0 ap369132 (Status: affected)
- 22.0 ap368660 (Status: affected)
- 22.0 ap369667 (Status: affected)
- 22.0 ap369295 (Status: affected)
- 22.0 ap369065 (Status: affected)
- 22.0 ap369668 (Status: affected)
- 22.0 ap369571 (Status: affected)
- 22.0 ap370645 (Status: affected)
- 22.0 ap370696 (Status: affected)
- 22.0 ap370654 (Status: affected)
- 22.0 ap370138 (Status: affected)
- 22.0 ap370615 (Status: affected)
- 22.0 ap369929 (Status: affected)
- 22.0 ap372643 (Status: affected)
- 22.0 ap372708 (Status: affected)
- 22.0 ap370590 (Status: affected)
- 22.0 ap372390 (Status: affected)
- 22.0 ap372690 (Status: affected)
- 22.0 ap372757 (Status: affected)
- 22.0 ap372560 (Status: affected)
- 22.0 ap370636 (Status: affected)
- 22.0 ap370579 (Status: affected)
- 22.0 ap372674 (Status: affected)
- 22.0 ap372750 (Status: affected)
- 22.0 ap372706 (Status: affected)
- 22.0 ap370269 (Status: affected)
- 22.0 ap370160 (Status: affected)
- 22.0 ap370180 (Status: affected)
- 22.0 ap370667 (Status: affected)
- 22.0 ap370186 (Status: affected)
- 22.0 ap370563 (Status: affected)
- 22.0 ap370627 (Status: affected)
- 22.0 ap370258 (Status: affected)
- 22.0 ap370675 (Status: affected)
- 22.0 ap370217 (Status: affected)
- 22.0 ap370349 (Status: affected)
- 22.0 ap370737 (Status: affected)
- 22.0 ap372488 (Status: affected)
- 22.0 ap370193 (Status: affected)
- 22.0 ap370544 (Status: affected)
- 22.0 ap374714 (Status: affected)
- 22.0 ap370465 (Status: affected)
- 22.0 ap374838 (Status: affected)
- 22.0 ap374169 (Status: affected)
- 22.0 ap374822 (Status: affected)
- 22.0 ap374339 (Status: affected)
- 22.0 ap374092 (Status: affected)
- 22.0 ap370459 (Status: affected)
- 22.0 ap370545 (Status: affected)
- 22.0 ap370389 (Status: affected)
- 22.0 ap374799 (Status: affected)
- 22.0 ap374265 (Status: affected)
- 22.0 ap374803 (Status: affected)
- 22.0 ap370275 (Status: affected)
- 22.0 ap374430 (Status: affected)
- 22.0 ap370177 (Status: affected)
- 22.0 ap370358 (Status: affected)
- 22.0 ap373918 (Status: affected)
- 22.0 ap370179 (Status: affected)
- 22.0 ap370196 (Status: affected)
- 22.0 ap372854 (Status: affected)
- 22.0 ap373539 (Status: affected)
- 22.0 ap372968 (Status: affected)
- 22.0 ap373813 (Status: affected)
- 22.0 ap373118 (Status: affected)
- 22.0 ap373820 (Status: affected)
- 22.0 ap373647 (Status: affected)
- 22.0 ap373102 (Status: affected)
- 22.0 ap373303 (Status: affected)
- 22.0 ap373302 (Status: affected)
- 22.0 ap373562 (Status: affected)
- 22.0 ap373564 (Status: affected)
- 22.0 ap373018 (Status: affected)
- 22.0 ap373954 (Status: affected)
- 22.0 ap374230 (Status: affected)
- 22.0 ap373950 (Status: affected)
- 22.0 ap373664 (Status: affected)
- 22.0 ap374330 (Status: affected)
- 22.0 ap374460 (Status: affected)
- 22.0 ap374312 (Status: affected)
- 22.0 ap374113 (Status: affected)
- 22.0 ap373034 (Status: affected)
- 22.0 ap372956 (Status: affected)
- 22.0 ap373111 (Status: affected)
- 22.0 ap373189 (Status: affected)
- 22.0 ap372974 (Status: affected)
- 22.0 ap374114 (Status: affected)
- 22.0 ap373122 (Status: affected)
- 22.0 ap373257 (Status: affected)
- 22.0 ap372994 (Status: affected)
- 22.0 ap374356 (Status: affected)
- 22.0 ap372932 (Status: affected)
- 22.0 ap375069 (Status: affected)
- 22.0 ap373899 (Status: affected)
- 22.0 ap374971 (Status: affected)
- 22.0 ap373777 (Status: affected)
- 22.0 ap373644 (Status: affected)
- 22.0 ap375734 (Status: affected)
- 22.0 ap375354 (Status: affected)
- 22.0 ap375655 (Status: affected)
- 22.0 ap375688 (Status: affected)
- 22.0 ap373318 (Status: affected)
- 22.0 ap375291 (Status: affected)
- 22.0 ap373046 (Status: affected)
- 22.0 ap374031 (Status: affected)
- 22.0 ap375200 (Status: affected)
- 22.0 ap373452 (Status: affected)
- 22.0 ap374334 (Status: affected)
- 22.0 ap374428 (Status: affected)
- 22.0 ap374254 (Status: affected)
- 22.0 ap375936 (Status: affected)
- 22.0 ap374596 (Status: affected)
- 22.0 ap372963 (Status: affected)
- 22.0 ap373117 (Status: affected)
- 22.0 ap376041 (Status: affected)
- 22.0 ap376410 (Status: affected)
- 22.0 ap376179 (Status: affected)
- 22.0 ap376298 (Status: affected)
- 22.0 ap376523 (Status: affected)
- 22.0 ap376485 (Status: affected)
- 22.0 ap376181 (Status: affected)
- 22.0 ap375090 (Status: affected)
- 22.0 ap376416 (Status: affected)
- 22.0 ap373098 (Status: affected)
- 22.0 ap374977 (Status: affected)
- 22.0 ap376602 (Status: affected)
- 22.0 ap376531 (Status: affected)
- 22.0 ap375465 (Status: affected)
- 22.0 ap375254 (Status: affected)
- 22.0 ap375865 (Status: affected)
- 22.0 ap375672 (Status: affected)
- 22.0 ap375321 (Status: affected)
- 22.0 ap375634 (Status: affected)
- 22.0 ap375382 (Status: affected)
- 22.0 ap375091 (Status: affected)
- 22.0 ap375018 (Status: affected)
- 22.0 ap375743 (Status: affected)
- 22.0 ap375383 (Status: affected)
- 22.0 ap376508 (Status: affected)
- 22.0 ap375646 (Status: affected)
- 22.0 ap375709 (Status: affected)
- 22.0 ap376426 (Status: affected)
- 22.0 ap375719 (Status: affected)
- 22.0 ap375908 (Status: affected)
- 22.0 ap375266 (Status: affected)
- 22.0 ap376614 (Status: affected)
- 22.0 ap375038 (Status: affected)
- 22.0 ap376541 (Status: affected)
- 22.0 ap376513 (Status: affected)
- 22.0 ap375509 (Status: affected)
- 22.0 ap375343 (Status: affected)
- 22.0 ap379772 (Status: affected)
- 22.0 ap375685 (Status: affected)
- 22.0 ap376356 (Status: affected)
- 22.0 ap376218 (Status: affected)
- 22.0 ap374895 (Status: affected)
- 22.0 ap376429 (Status: affected)
- 22.0 ap376402 (Status: affected)
- 22.0 ap379838 (Status: affected)
- 22.0 ap379874 (Status: affected)
- 22.0 ap380187 (Status: affected)
- 22.0 ap380143 (Status: affected)
- 22.0 ap379972 (Status: affected)
- 22.0 ap380535 (Status: affected)
- 22.0 ap379847 (Status: affected)
- 22.0 ap380117 (Status: affected)
- 22.0 ap380512 (Status: affected)
- 22.0 ap380396 (Status: affected)
- 22.0 ap380167 (Status: affected)
- 22.0 ap376010 (Status: affected)
- 22.0 ap380473 (Status: affected)
- 22.0 ap380371 (Status: affected)
- 22.0 ap376147 (Status: affected)
- 22.0 ap375924 (Status: affected)
- 22.0 ap375720 (Status: affected)
- 22.0 ap379833 (Status: affected)
- 22.0 ap376661 (Status: affected)
- 22.0 ap380161 (Status: affected)
- 22.0 ap380180 (Status: affected)
- 22.0 ap380401 (Status: affected)
- 22.0 ap379853 (Status: affected)
- 22.0 ap380041 (Status: affected)
- 22.0 ap380391 (Status: affected)
- 22.0 ap379795 (Status: affected)
- 22.0 ap380128 (Status: affected)
- 22.0 ap380239 (Status: affected)
- 22.0 ap379848 (Status: affected)
- 22.0 ap380532 (Status: affected)
- 22.0 ap379934 (Status: affected)
- 22.0 ap380099 (Status: affected)
- 22.0 ap376860 (Status: affected)
- 22.0 ap377107 (Status: affected)
- 22.0 ap376701 (Status: affected)
- 22.0 ap376668 (Status: affected)
- 22.0 ap377384 (Status: affected)
- 22.0 ap376670 (Status: affected)
- 22.0 ap377480 (Status: affected)
- 22.0 ap377581 (Status: affected)
- 22.0 ap377727 (Status: affected)
- 22.0 ap377802 (Status: affected)
- 22.0 ap376652 (Status: affected)
- 22.0 ap376656 (Status: affected)
- 22.0 ap376685 (Status: affected)
- 22.0 ap376984 (Status: affected)
- 22.0 ap378140 (Status: affected)
- 22.0 ap376620 (Status: affected)
- 22.0 ap377982 (Status: affected)
- 22.0 ap378405 (Status: affected)
- 22.0 ap377494 (Status: affected)
- 22.0 ap377625 (Status: affected)
- 22.0 ap377147 (Status: affected)
- 22.0 ap377755 (Status: affected)
- 22.0 ap378440 (Status: affected)
- 22.0 ap377523 (Status: affected)
- 22.0 ap378218 (Status: affected)
- 22.0 ap378581 (Status: affected)
- 22.0 ap377307 (Status: affected)
- 22.0 ap377389 (Status: affected)
- 22.0 ap377566 (Status: affected)
- 22.0 ap378585 (Status: affected)
- 22.0 ap378153 (Status: affected)
- 22.0 ap377149 (Status: affected)
- 22.0 ap378471 (Status: affected)
- 22.0 ap377900 (Status: affected)
- 22.0 ap377412 (Status: affected)
- 22.0 ap378425 (Status: affected)
- 22.0 ap378391 (Status: affected)
- 22.0 ap377496 (Status: affected)
- 22.0 ap377908 (Status: affected)
- 22.0 ap377068 (Status: affected)
- 22.0 ap378259 (Status: affected)
- 22.0 ap377757 (Status: affected)
- 22.0 ap377680 (Status: affected)
- 22.0 ap377329 (Status: affected)
- 22.0 ap378332 (Status: affected)
- 22.0 ap379016 (Status: affected)
- 22.0 ap378866 (Status: affected)
- 22.0 ap377963 (Status: affected)
- 22.0 ap378436 (Status: affected)
- 22.0 ap378164 (Status: affected)
- 22.0 ap378966 (Status: affected)
- 22.0 ap378509 (Status: affected)
- 22.0 ap378953 (Status: affected)
- 22.0 ap377779 (Status: affected)
- 22.0 ap378823 (Status: affected)
- 22.0 ap378400 (Status: affected)
- 22.0 ap379008 (Status: affected)
- 22.0 ap377578 (Status: affected)
- 22.0 ap379098 (Status: affected)
- 22.0 ap379524 (Status: affected)
- 22.0 ap379694 (Status: affected)
- 22.0 ap379597 (Status: affected)
- 22.0 ap378880 (Status: affected)
- 22.0 ap379531 (Status: affected)
- 22.0 ap378863 (Status: affected)
- 22.0 ap378882 (Status: affected)
- 22.0 ap379427 (Status: affected)
- 22.0 ap379389 (Status: affected)
- 22.0 ap379556 (Status: affected)
- 22.0 ap379487 (Status: affected)
- 22.0 ap378970 (Status: affected)
- 22.0 ap379374 (Status: affected)
- 22.0 ap379465 (Status: affected)
- 22.0 ap379165 (Status: affected)
- 22.0 ap378599 (Status: affected)
- 22.0 ap378862 (Status: affected)
- 22.0 ap379080 (Status: affected)
- 22.0 ap379085 (Status: affected)
- 22.0 ap378924 (Status: affected)
- 22.0 ap381029 (Status: affected)
- 22.0 ap381125 (Status: affected)
- 22.0 ap378603 (Status: affected)
- 22.0 ap381410 (Status: affected)
- 22.0 ap380771 (Status: affected)
- 22.0 ap381518 (Status: affected)
- 22.0 ap380537 (Status: affected)
- 22.0 ap381594 (Status: affected)
- 22.0 ap381243 (Status: affected)
- 22.0 ap378865 (Status: affected)
- 22.0 ap380697 (Status: affected)
- 22.0 ap380629 (Status: affected)
- 22.0 ap380751 (Status: affected)
- 22.0 ap382300 (Status: affected)
- 22.0 ap382158 (Status: affected)
- 22.0 ap381072 (Status: affected)
- 22.0 ap378999 (Status: affected)
- 22.0 ap380914 (Status: affected)
- 22.0 ap380936 (Status: affected)
- 22.0 ap381136 (Status: affected)
- 22.0 ap380737 (Status: affected)
- 22.0 ap381781 (Status: affected)
- 22.0 ap380817 (Status: affected)
- 22.0 ap382240 (Status: affected)
- 22.0 ap381270 (Status: affected)
- 22.0 ap382032 (Status: affected)
- 22.0 ap382362 (Status: affected)
- 22.0 ap381523 (Status: affected)
- 22.0 ap381609 (Status: affected)
- 22.0 ap381569 (Status: affected)
- 22.0 ap381498 (Status: affected)
- 22.0 ap382192 (Status: affected)
- 22.0 ap381418 (Status: affected)
- 22.0 ap381091 (Status: affected)
- 22.0 ap381810 (Status: affected)
- 22.0 ap381732 (Status: affected)
- 22.0 ap382053 (Status: affected)
- 22.0 ap382198 (Status: affected)
- 22.0 ap382195 (Status: affected)
- 22.0 ap380626 (Status: affected)
- 22.0 ap381584 (Status: affected)
- 22.0 ap380818 (Status: affected)
- 22.0 ap381118 (Status: affected)
- 22.0 ap380739 (Status: affected)
- 22.0 ap382252 (Status: affected)
- 22.0 ap381367 (Status: affected)
- 22.0 ap382993 (Status: affected)
- 22.0 ap382717 (Status: affected)
- 22.0 ap383372 (Status: affected)
- 22.0 ap382945 (Status: affected)
- 22.0 ap383569 (Status: affected)
- 22.0 ap382951 (Status: affected)
- 22.0 ap382487 (Status: affected)
- 22.0 ap383002 (Status: affected)
- 22.0 ap383168 (Status: affected)
- 22.0 ap382434 (Status: affected)
- 22.0 ap383170 (Status: affected)
- 22.0 ap382615 (Status: affected)
- 22.0 ap382524 (Status: affected)
- 22.0 ap383309 (Status: affected)
- 22.0 ap383514 (Status: affected)
- 22.0 ap382824 (Status: affected)
- 22.0 ap382903 (Status: affected)
- 22.0 ap383710 (Status: affected)
- 22.0 ap383519 (Status: affected)
- 22.0 ap383367 (Status: affected)
- 22.0 ap382838 (Status: affected)
- 22.0 ap383562 (Status: affected)
- 22.0 ap382977 (Status: affected)
- 22.0 ap382488 (Status: affected)
- 22.0 ap383134 (Status: affected)
- 22.0 ap383706 (Status: affected)
- 22.0 ap383150 (Status: affected)
- 22.0 ap382954 (Status: affected)
- 22.0 ap382432 (Status: affected)
- 22.0 ap382386 (Status: affected)
- 22.0 ap347536 (Status: affected)
- 22.0 ap348474 (Status: affected)
- 22.0 ap349235 (Status: affected)
- 22.0 ap349664 (Status: affected)
- 22.0 ap350564 (Status: affected)
- 22.0 ap350969 (Status: affected)
- 22.0 ap351223 (Status: affected)
- 22.0 ap351345 (Status: affected)
- 22.0 ap351727 (Status: affected)
- 22.0 ap351942 (Status: affected)
- 22.0 ap352184 (Status: affected)
- 22.0 ap352264 (Status: affected)
- 22.0 ap352323 (Status: affected)
- 22.0 ap352369 (Status: affected)
- 22.0 ap352423 (Status: affected)
- 22.0 ap352511 (Status: affected)
- 22.0 ap352804 (Status: affected)
- 22.0 ap352954 (Status: affected)
- 22.0 ap353122 (Status: affected)
- 22.0 ap353167 (Status: affected)
- 22.0 ap353658 (Status: affected)
- 22.0 ap353856 (Status: affected)
- 22.0 ap354077 (Status: affected)
- 22.0 ap354180 (Status: affected)
- 22.0 ap354195 (Status: affected)
- 22.0 ap354200 (Status: affected)
- 22.0 ap354316 (Status: affected)
- 22.0 ap354365 (Status: affected)
- 22.0 ap354438 (Status: affected)
- 22.0 ap354439 (Status: affected)
- 22.0 ap354681 (Status: affected)
- 22.0 ap355002 (Status: affected)
- 22.0 ap355124 (Status: affected)
- 22.0 ap355197 (Status: affected)
- 22.0 ap355599 (Status: affected)
- 22.0 ap355664 (Status: affected)
- 22.0 ap355670 (Status: affected)
- 22.0 ap355838 (Status: affected)
- 22.0 ap356141 (Status: affected)
- 22.0 ap356231 (Status: affected)
- 22.0 ap356301 (Status: affected)
- 22.0 ap356527 (Status: affected)
- 22.0 ap356707 (Status: affected)
- 22.0 ap356752 (Status: affected)
- 22.0 ap357019 (Status: affected)
- 22.0 ap357081 (Status: affected)
- 22.0 ap357105 (Status: affected)
- 22.0 ap357162 (Status: affected)
- 22.0 ap357181 (Status: affected)
- 22.0 ap357387 (Status: affected)
- 22.0 ap357417 (Status: affected)
- 22.0 ap357610 (Status: affected)
- 22.0 ap357653 (Status: affected)
- 22.0 ap358012 (Status: affected)
- 22.0 ap358046 (Status: affected)
- 22.0 ap358082 (Status: affected)
- 22.0 ap358241 (Status: affected)
- 22.0 ap358271 (Status: affected)
- 22.0 ap358330 (Status: affected)
- 22.0 ap358365 (Status: affected)
- 22.0 ap358440 (Status: affected)
- 22.0 ap358441 (Status: affected)
- 22.0 ap358604 (Status: affected)
- 22.0 ap358643 (Status: affected)
- 22.0 ap358732 (Status: affected)
- 22.0 ap358907 (Status: affected)
- 22.0 ap358942 (Status: affected)
- 22.0 ap359130 (Status: affected)
- 22.0 ap359164 (Status: affected)
- 22.0 ap359186 (Status: affected)
- 22.0 ap359225 (Status: affected)
- 22.0 ap359259 (Status: affected)
- 22.0 ap359292 (Status: affected)
- 22.0 ap359298 (Status: affected)
- 22.0 ap359429 (Status: affected)
- 22.0 ap359562 (Status: affected)
- 22.0 ap359570 (Status: affected)
- 22.0 ap359612 (Status: affected)
- 22.0 ap359710 (Status: affected)
- 22.0 ap360167 (Status: affected)
- 22.0 ap360245 (Status: affected)
- 22.0 ap360563 (Status: affected)
- 22.0 ap360603 (Status: affected)
- 22.0 ap360874 (Status: affected)
- 22.0 ap361459 (Status: affected)
- 22.0 ap361549 (Status: affected)
- 22.0 ap361581 (Status: affected)
- 22.0 ap361631 (Status: affected)
- 22.0 ap361643 (Status: affected)
- 22.0 ap361823 (Status: affected)
- 22.0 ap361831 (Status: affected)
- 22.0 ap361930 (Status: affected)
- 22.0 ap361936 (Status: affected)
- 22.0 ap362015 (Status: affected)
- 22.0 ap362041 (Status: affected)
- 22.0 ap362080 (Status: affected)
- 22.0 ap362365 (Status: affected)
- 22.0 ap362368 (Status: affected)
- 22.0 ap362389 (Status: affected)
- 22.0 ap362677 (Status: affected)
- 22.0 ap362691 (Status: affected)
- 22.0 ap362712 (Status: affected)
- 22.0 ap362741 (Status: affected)
- 22.0 ap362769 (Status: affected)
- 22.0 ap362868 (Status: affected)
- 22.0 ap363136 (Status: affected)
- 22.0 ap363221 (Status: affected)
- 22.0 ap363240 (Status: affected)
- 22.0 ap363247 (Status: affected)
- 22.0 ap363431 (Status: affected)
- 22.0 ap363530 (Status: affected)
- 22.0 ap363556 (Status: affected)
- 22.0 ap363672 (Status: affected)
- 22.0 ap363693 (Status: affected)
- 22.0 ap363694 (Status: affected)
- 22.0 ap363727 (Status: affected)
- 22.0 ap363811 (Status: affected)
- 22.0 ap363845 (Status: affected)
- 22.0 ap364100 (Status: affected)
- 22.0 ap364107 (Status: affected)
- 22.0 ap364113 (Status: affected)
- 22.0 ap364146 (Status: affected)
- 22.0 ap364157 (Status: affected)
- 22.0 ap364248 (Status: affected)
- 22.0 ap364252 (Status: affected)
- 22.0 ap364260 (Status: affected)
- 22.0 ap364483 (Status: affected)
- 22.0 ap364532 (Status: affected)
- 22.0 ap364582 (Status: affected)
- 22.0 ap364617 (Status: affected)
- 22.0 ap364621 (Status: affected)
- 22.0 ap364636 (Status: affected)
- 22.0 ap365044 (Status: affected)
- 22.0 ap365357 (Status: affected)
- 22.0 ap365646 (Status: affected)
- 22.0 ap365661 (Status: affected)
- 22.0 ap365701 (Status: affected)
- 22.0 ap365770 (Status: affected)
- 22.0 ap365832 (Status: affected)
- 22.0 ap365984 (Status: affected)
- 22.0 ap366013 (Status: affected)
- 22.0 ap366321 (Status: affected)
- 22.0 ap366346 (Status: affected)
- 22.0 ap366390 (Status: affected)
- 22.0 ap366661 (Status: affected)
- 22.0 ap366834 (Status: affected)
- 22.0 ap366835 (Status: affected)
- 22.0 ap366836 (Status: affected)
- 22.0 ap366905 (Status: affected)
- 22.0 ap366917 (Status: affected)
- 22.0 ap366940 (Status: affected)
- 22.0 ap367324 (Status: affected)
- 22.0 ap367451 (Status: affected)
- 22.0 ap367501 (Status: affected)
- 22.0 ap367781 (Status: affected)
- 22.0 ap367857 (Status: affected)
- 22.0 ap367991 (Status: affected)
- 22.0 ap367992 (Status: affected)
- 22.0 ap368057 (Status: affected)
- 22.0 ap368163 (Status: affected)
- 22.0 ap368196 (Status: affected)
- 22.0 ap368350 (Status: affected)
- 22.0 ap368485 (Status: affected)
- 22.0 ap368605 (Status: affected)
- 22.0 ap368933 (Status: affected)
- 22.0 ap369052 (Status: affected)
- 22.0 ap369127 (Status: affected)
- 22.0 ap369256 (Status: affected)
- 22.0 ap369300 (Status: affected)
- 22.0 ap369469 (Status: affected)
- 22.0 ap369470 (Status: affected)
- 22.0 ap369535 (Status: affected)
- 22.0 ap369595 (Status: affected)
- 22.0 ap369608 (Status: affected)
- 22.0 ap369619 (Status: affected)
- 22.0 ap369680 (Status: affected)
- 22.0 ap369716 (Status: affected)
- 22.0 ap369878 (Status: affected)
- 22.0 ap369885 (Status: affected)
- 22.0 ap369902 (Status: affected)
- 22.0 ap369903 (Status: affected)
- 22.0 ap370088 (Status: affected)
- 22.0 ap370093 (Status: affected)
- 22.0 ap370199 (Status: affected)
- 22.0 ap370246 (Status: affected)
- 22.0 ap370300 (Status: affected)
- 22.0 ap370326 (Status: affected)
- 22.0 ap370426 (Status: affected)
- 22.0 ap370539 (Status: affected)
- 22.0 ap370578 (Status: affected)
- 22.0 ap370662 (Status: affected)
- 22.0 ap370707 (Status: affected)
- 22.0 ap370720 (Status: affected)
- 22.0 ap370735 (Status: affected)
- 22.0 ap370739 (Status: affected)
- 22.0 ap370786 (Status: affected)
- 22.0 ap370907 (Status: affected)
- 22.0 ap370918 (Status: affected)
- 22.0 ap371056 (Status: affected)
- 22.0 ap371151 (Status: affected)
- 22.0 ap371254 (Status: affected)
- 22.0 ap371261 (Status: affected)
- 22.0 ap371301 (Status: affected)
- 22.0 ap371423 (Status: affected)
- 22.0 ap371459 (Status: affected)
- 22.0 ap371490 (Status: affected)
- 22.0 ap371500 (Status: affected)
- 22.0 ap371529 (Status: affected)
- 22.0 ap371539 (Status: affected)
- 22.0 ap371557 (Status: affected)
- 22.0 ap371604 (Status: affected)
- 22.0 ap371605 (Status: affected)
- 22.0 ap371669 (Status: affected)
- 22.0 ap371733 (Status: affected)
- 22.0 ap371768 (Status: affected)
- 22.0 ap371772 (Status: affected)
- 22.0 ap371779 (Status: affected)
- 22.0 ap371793 (Status: affected)
- 22.0 ap371835 (Status: affected)
- 22.0 ap371886 (Status: affected)
- 22.0 ap371917 (Status: affected)
- 22.0 ap371922 (Status: affected)
- 22.0 ap371935 (Status: affected)
- 22.0 ap371998 (Status: affected)
- 22.0 ap372011 (Status: affected)
- 22.0 ap372085 (Status: affected)
- 22.0 ap372115 (Status: affected)
- 22.0 ap372211 (Status: affected)
- 22.0 ap372286 (Status: affected)
- 22.0 ap372397 (Status: affected)
- 22.0 ap372432 (Status: affected)
- 22.0 ap372464 (Status: affected)
- 22.0 ap372475 (Status: affected)
- 22.0 ap372502 (Status: affected)
- 22.0 ap372505 (Status: affected)
- 22.0 ap372574 (Status: affected)
- 22.0 ap372617 (Status: affected)
- 22.0 ap372655 (Status: affected)
- 22.0 ap372696 (Status: affected)
- 22.0 ap372821 (Status: affected)
- 22.0 ap372890 (Status: affected)
- 22.0 ap372943 (Status: affected)
- 22.0 ap372989 (Status: affected)
- 22.0 ap373009 (Status: affected)
- 22.0 ap373146 (Status: affected)
- 22.0 ap373173 (Status: affected)
- 22.0 ap373174 (Status: affected)
- 22.0 ap373197 (Status: affected)
- 22.0 ap373256 (Status: affected)
- 22.0 ap373340 (Status: affected)
- 22.0 ap373358 (Status: affected)
- 22.0 ap373392 (Status: affected)
- 22.0 ap373412 (Status: affected)
- 22.0 ap373521 (Status: affected)
- 22.0 ap373649 (Status: affected)
- 22.0 ap373711 (Status: affected)
- 22.0 ap373872 (Status: affected)
- 22.0 ap373958 (Status: affected)
- 22.0 ap374135 (Status: affected)
- 22.0 ap374211 (Status: affected)
- 22.0 ap375260 (Status: affected)
- 22.0 ap375804 (Status: affected)
- 22.0 ap378234 (Status: affected)
- 22.0 ap378415 (Status: affected)
- 22.0 ap379091 (Status: affected)
- 22.0 ap379168 (Status: affected)
- 22.0 ap380375 (Status: affected)
- 22.0 ap381358 (Status: affected)
- 22.0 ap381734 (Status: affected)
- 22.0 ap381809 (Status: affected)
- 22.0 ap382994 (Status: affected)
- 22.0 ap365659 (Status: affected)
- 22.0 ap343282 (Status: affected)
- 22.0 ap345686 (Status: affected)
- 22.0 ap345827 (Status: affected)
- 22.0 ap350300 (Status: affected)
- 22.0 ap351606 (Status: affected)
- 22.0 ap352244 (Status: affected)
- 22.0 ap352410 (Status: affected)
- 22.0 ap352832 (Status: affected)
- 22.0 ap353796 (Status: affected)
- 22.0 ap353945 (Status: affected)
- 22.0 ap354068 (Status: affected)
- 22.0 ap354387 (Status: affected)
- 22.0 ap355603 (Status: affected)
- 22.0 ap355772 (Status: affected)
- 22.0 ap356159 (Status: affected)
- 22.0 ap356392 (Status: affected)
- 22.0 ap356435 (Status: affected)
- 22.0 ap356515 (Status: affected)
- 22.0 ap357186 (Status: affected)
- 22.0 ap357188 (Status: affected)
- 22.0 ap357509 (Status: affected)
- 22.0 ap357679 (Status: affected)
- 22.0 ap357698 (Status: affected)
- 22.0 ap357730 (Status: affected)
- 22.0 ap358341 (Status: affected)
- 22.0 ap359104 (Status: affected)
- 22.0 ap359625 (Status: affected)
- 22.0 ap359703 (Status: affected)
- 22.0 ap359753 (Status: affected)
- 22.0 ap359961 (Status: affected)
- 22.0 ap360225 (Status: affected)
- 22.0 ap360277 (Status: affected)
- 22.0 ap360367 (Status: affected)
- 22.0 ap360491 (Status: affected)
- 22.0 ap360544 (Status: affected)
- 22.0 ap361046 (Status: affected)
- 22.0 ap361124 (Status: affected)
- 22.0 ap361411 (Status: affected)
- 22.0 ap361508 (Status: affected)
- 22.0 ap361725 (Status: affected)
- 22.0 ap361830 (Status: affected)
- 22.0 ap362144 (Status: affected)
- 22.0 ap362232 (Status: affected)
- 22.0 ap362608 (Status: affected)
- 22.0 ap362639 (Status: affected)
- 22.0 ap362828 (Status: affected)
- 22.0 ap363064 (Status: affected)
- 22.0 ap363176 (Status: affected)
- 22.0 ap363300 (Status: affected)
- 22.0 ap363333 (Status: affected)
- 22.0 ap363576 (Status: affected)
- 22.0 ap363578 (Status: affected)
- 22.0 ap363639 (Status: affected)
- 22.0 ap363777 (Status: affected)
- 22.0 ap363813 (Status: affected)
- 22.0 ap363814 (Status: affected)
- 22.0 ap364118 (Status: affected)
- 22.0 ap364904 (Status: affected)
- 22.0 ap365127 (Status: affected)
- 22.0 ap365240 (Status: affected)
- 22.0 ap365419 (Status: affected)
- 22.0 ap365574 (Status: affected)
- 22.0 ap365863 (Status: affected)
- 22.0 ap365914 (Status: affected)
- 22.0 ap365960 (Status: affected)
- 22.0 ap366462 (Status: affected)
- 22.0 ap367887 (Status: affected)
- 22.0 ap368002 (Status: affected)
- 22.0 ap368154 (Status: affected)
- 22.0 ap368387 (Status: affected)
- 22.0 ap368919 (Status: affected)
- 22.0 ap369098 (Status: affected)
- 22.0 ap369144 (Status: affected)
- 22.0 ap369581 (Status: affected)
- 22.0 ap369727 (Status: affected)
- 22.0 ap369869 (Status: affected)
- 22.0 ap369925 (Status: affected)
- 22.0 ap369994 (Status: affected)
- 22.0 ap370158 (Status: affected)
- 22.0 ap370251 (Status: affected)
- 22.0 ap370255 (Status: affected)
- 22.0 ap370476 (Status: affected)
- 22.0 ap370810 (Status: affected)
- 22.0 ap370922 (Status: affected)
- 22.0 ap371132 (Status: affected)
- 22.0 ap371140 (Status: affected)
- 22.0 ap371165 (Status: affected)
- 22.0 ap371272 (Status: affected)
- 22.0 ap371558 (Status: affected)
- 22.0 ap371885 (Status: affected)
- 22.0 ap372295 (Status: affected)
- 22.0 ap372296 (Status: affected)
- 22.0 ap372439 (Status: affected)
- 22.0 ap372523 (Status: affected)
- 22.0 ap372581 (Status: affected)
- 22.0 ap373113 (Status: affected)
- 22.0 ap373781 (Status: affected)
- 22.0 ap374199 (Status: affected)
- 22.0 ap374309 (Status: affected)
- 22.0 ap374340 (Status: affected)
- 22.0 ap374346 (Status: affected)
- 22.0 ap374353 (Status: affected)
- 22.0 ap374510 (Status: affected)
- 22.0 ap374669 (Status: affected)
- 22.0 ap374712 (Status: affected)
- 22.0 ap374732 (Status: affected)
- 22.0 ap375219 (Status: affected)
- 22.0 ap375328 (Status: affected)
- 22.0 ap375418 (Status: affected)
- 22.0 ap375686 (Status: affected)
- 22.0 ap376358 (Status: affected)
- 22.0 ap376653 (Status: affected)
- 22.0 ap376849 (Status: affected)
- 22.0 ap376854 (Status: affected)
- 22.0 ap376875 (Status: affected)
- 22.0 ap377110 (Status: affected)
- 22.0 ap377206 (Status: affected)
- 22.0 ap377270 (Status: affected)
- 22.0 ap378077 (Status: affected)
- 22.0 ap378212 (Status: affected)
- 22.0 ap378864 (Status: affected)
- 22.0 ap379201 (Status: affected)
- 22.0 ap379412 (Status: affected)
- 22.0 ap379575 (Status: affected)
- 22.0 ap380061 (Status: affected)
- 22.0 ap380254 (Status: affected)
- 22.0 ap380408 (Status: affected)
- 22.0 ap380793 (Status: affected)
- 22.0 ap382699 (Status: affected)
- 22.0 ap382854 (Status: affected)
- 22.0 ap382920 (Status: affected)
- 22.0 ap382941 (Status: affected)
- 22.0 ap383113 (Status: affected)
- 22.0 ap383300 (Status: affected)
- 22.0 ap383549 (Status: affected)
- 22.0 ap353444 (Status: affected)
- 22.0 ap353632 (Status: affected)
- 22.0 ap350187 (Status: affected)
- 22.0 ap353539 (Status: affected)
- 22.0 ap352800 (Status: affected)
- 22.0 ap356703 (Status: affected)
- 22.0 ap358658 (Status: affected)
- 22.0 ap358739 (Status: affected)
- 22.0 ap356536 (Status: affected)
- 22.0 ap356545 (Status: affected)
- 22.0 ap358408 (Status: affected)
- 22.0 ap354381 (Status: affected)
- 22.0 ap358405 (Status: affected)
- 22.0 ap355105 (Status: affected)
- 22.0 ap354430 (Status: affected)
- 22.0 ap354212 (Status: affected)
- 22.0 ap360594 (Status: affected)
- 22.0 ap359426 (Status: affected)
- 22.0 ap359294 (Status: affected)
- 22.0 ap355360 (Status: affected)
- 22.0 ap357667 (Status: affected)
- 22.0 ap361976 (Status: affected)
- 22.0 ap361489 (Status: affected)
- 22.0 ap362018 (Status: affected)
- 22.0 ap364067 (Status: affected)
- 22.0 ap361663 (Status: affected)
- 22.0 ap366466 (Status: affected)
- 22.0 ap364587 (Status: affected)
- 22.0 ap366628 (Status: affected)
- 22.0 ap364700 (Status: affected)
- 22.0 ap367017 (Status: affected)
- 22.0 ap360864 (Status: affected)
- 22.0 ap365131 (Status: affected)
- 22.0 ap360834 (Status: affected)
- 22.0 ap370195 (Status: affected)
- 22.0 ap368900 (Status: affected)
- 22.0 ap367639 (Status: affected)
- 22.0 ap370076 (Status: affected)
- 22.0 ap373248 (Status: affected)
- 22.0 ap378912 (Status: affected)
- 22.0 ap383380 (Status: affected)
- 22.0 ap380990 (Status: affected)
- 22.0 ap380155 (Status: affected)
- 22.0 ap381882 (Status: affected)
- 21.sp1 (Status: affected)
- 21.sp1 ap369107 (Status: affected)
- 21.sp1 ap377180 (Status: affected)
- 21.sp1 ap379554 (Status: affected)
- 21.sp1 ap379844 (Status: affected)
- 21.sp1 ap359433 (Status: affected)
- 21.sp1 ap350491 (Status: affected)
- 21.sp1 ap351294 (Status: affected)
- 21.sp1 ap351704 (Status: affected)
- 21.sp1 ap352726 (Status: affected)
- 21.sp1 ap349996 (Status: affected)
- 21.sp1 ap350763 (Status: affected)
- 21.sp1 ap356747 (Status: affected)
- 21.sp1 ap349210 (Status: affected)
- 21.sp1 ap346622 (Status: affected)
- 21.sp1 ap350110 (Status: affected)
- 21.sp1 ap350420 (Status: affected)
- 21.sp1 ap351795 (Status: affected)
- 21.sp1 ap359119 (Status: affected)
- 21.sp1 ap348753 (Status: affected)
- 21.sp1 ap350338 (Status: affected)
- 21.sp1 ap350204 (Status: affected)
- 21.sp1 ap346386 (Status: affected)
- 21.sp1 ap351961 (Status: affected)
- 21.sp1 ap357571 (Status: affected)
- 21.sp1 ap376314 (Status: affected)
- 21.sp1 ap352109 (Status: affected)
- 21.sp1 ap350308 (Status: affected)
- 21.sp1 ap351160 (Status: affected)
- 21.sp1 ap371921 (Status: affected)
- 21.sp1 ap363301 (Status: affected)
- 21.sp1 ap348143 (Status: affected)
- 21.sp1 ap351216 (Status: affected)
- 21.sp1 ap361590 (Status: affected)
- 21.sp1 ap361308 (Status: affected)
- 21.sp1 ap370196 (Status: affected)
- 21.sp1 ap366880 (Status: affected)
- 21.sp1 ap369219 (Status: affected)
- 21.sp1 ap353354 (Status: affected)
- 21.sp1 ap350379 (Status: affected)
- 21.sp1 ap339376 (Status: affected)
- 21.sp1 ap345633 (Status: affected)
- 21.sp1 ap372454 (Status: affected)
- 21.sp1 ap343495 (Status: affected)
- 21.sp1 ap344020 (Status: affected)
- 21.sp1 ap370636 (Status: affected)
- 21.sp1 ap358132 (Status: affected)
- 21.sp1 ap343579 (Status: affected)
- 21.sp1 ap343675 (Status: affected)
- 21.sp1 ap355717 (Status: affected)
- 21.sp1 ap355107 (Status: affected)
- 21.sp1 ap344422 (Status: affected)
- 21.sp1 ap355581 (Status: affected)
- 21.sp1 ap354785 (Status: affected)
- 21.sp1 ap349872 (Status: affected)
- 21.sp1 ap375465 (Status: affected)
- 21.sp1 ap353842 (Status: affected)
- 21.sp1 ap347603 (Status: affected)
- 21.sp1 ap345013 (Status: affected)
- 21.sp1 ap367109 (Status: affected)
- 21.sp1 ap344752 (Status: affected)
- 21.sp1 ap346074 (Status: affected)
- 21.sp1 ap346379 (Status: affected)
- 21.sp1 ap366486 (Status: affected)
- 21.sp1 ap345261 (Status: affected)
- 21.sp1 ap339781 (Status: affected)
- 21.sp1 ap366298 (Status: affected)
- 21.sp1 ap373102 (Status: affected)
- 21.sp1 ap371926 (Status: affected)
- 21.sp1 ap367732 (Status: affected)
- 21.sp1 ap366370 (Status: affected)
- 21.sp1 ap215990 (Status: affected)
- 21.sp1 ap233247 (Status: affected)
- 21.sp1 ap233913 (Status: affected)
- 21.sp1 ap235252 (Status: affected)
- 21.sp1 ap235960 (Status: affected)
- 21.sp1 ap242300 (Status: affected)
- 21.sp1 ap244020 (Status: affected)
- 21.sp1 ap244265 (Status: affected)
- 21.sp1 ap244609 (Status: affected)
- 21.sp1 ap245148 (Status: affected)
- 21.sp1 ap245441 (Status: affected)
- 21.sp1 ap245468 (Status: affected)
- 21.sp1 ap246072 (Status: affected)
- 21.sp1 ap246656 (Status: affected)
- 21.sp1 ap247533 (Status: affected)
- 21.sp1 ap338833 (Status: affected)
- 21.sp1 ap338964 (Status: affected)
- 21.sp1 ap338965 (Status: affected)
- 21.sp1 ap338972 (Status: affected)
- 21.sp1 ap338988 (Status: affected)
- 21.sp1 ap339196 (Status: affected)
- 21.sp1 ap339200 (Status: affected)
- 21.sp1 ap339206 (Status: affected)
- 21.sp1 ap339209 (Status: affected)
- 21.sp1 ap339236 (Status: affected)
- 21.sp1 ap339342 (Status: affected)
- 21.sp1 ap339346 (Status: affected)
- 21.sp1 ap339351 (Status: affected)
- 21.sp1 ap339395 (Status: affected)
- 21.sp1 ap339477 (Status: affected)
- 21.sp1 ap339538 (Status: affected)
- 21.sp1 ap339552 (Status: affected)
- 21.sp1 ap339568 (Status: affected)
- 21.sp1 ap339658 (Status: affected)
- 21.sp1 ap339897 (Status: affected)
- 21.sp1 ap340054 (Status: affected)
- 21.sp1 ap340168 (Status: affected)
- 21.sp1 ap341350 (Status: affected)
- 21.sp1 ap341471 (Status: affected)
- 21.sp1 ap341498 (Status: affected)
- 21.sp1 ap341577 (Status: affected)
- 21.sp1 ap341645 (Status: affected)
- 21.sp1 ap341663 (Status: affected)
- 21.sp1 ap341897 (Status: affected)
- 21.sp1 ap341939 (Status: affected)
- 21.sp1 ap342028 (Status: affected)
- 21.sp1 ap342127 (Status: affected)
- 21.sp1 ap342138 (Status: affected)
- 21.sp1 ap342145 (Status: affected)
- 21.sp1 ap342175 (Status: affected)
- 21.sp1 ap342217 (Status: affected)
- 21.sp1 ap342284 (Status: affected)
- 21.sp1 ap342324 (Status: affected)
- 21.sp1 ap342461 (Status: affected)
- 21.sp1 ap342474 (Status: affected)
- 21.sp1 ap342483 (Status: affected)
- 21.sp1 ap342543 (Status: affected)
- 21.sp1 ap342548 (Status: affected)
- 21.sp1 ap342588 (Status: affected)
- 21.sp1 ap342625 (Status: affected)
- 21.sp1 ap342669 (Status: affected)
- 21.sp1 ap342696 (Status: affected)
- 21.sp1 ap342719 (Status: affected)
- 21.sp1 ap342755 (Status: affected)
- 21.sp1 ap342771 (Status: affected)
- 21.sp1 ap342782 (Status: affected)
- 21.sp1 ap342792 (Status: affected)
- 21.sp1 ap342836 (Status: affected)
- 21.sp1 ap342853 (Status: affected)
- 21.sp1 ap342946 (Status: affected)
- 21.sp1 ap342975 (Status: affected)
- 21.sp1 ap343017 (Status: affected)
- 21.sp1 ap343229 (Status: affected)
- 21.sp1 ap343351 (Status: affected)
- 21.sp1 ap343352 (Status: affected)
- 21.sp1 ap343410 (Status: affected)
- 21.sp1 ap343616 (Status: affected)
- 21.sp1 ap343877 (Status: affected)
- 21.sp1 ap343883 (Status: affected)
- 21.sp1 ap343999 (Status: affected)
- 21.sp1 ap344043 (Status: affected)
- 21.sp1 ap344052 (Status: affected)
- 21.sp1 ap344083 (Status: affected)
- 21.sp1 ap344094 (Status: affected)
- 21.sp1 ap344100 (Status: affected)
- 21.sp1 ap344238 (Status: affected)
- 21.sp1 ap344253 (Status: affected)
- 21.sp1 ap344270 (Status: affected)
- 21.sp1 ap344290 (Status: affected)
- 21.sp1 ap344479 (Status: affected)
- 21.sp1 ap344485 (Status: affected)
- 21.sp1 ap344600 (Status: affected)
- 21.sp1 ap344681 (Status: affected)
- 21.sp1 ap344945 (Status: affected)
- 21.sp1 ap344952 (Status: affected)
- 21.sp1 ap344954 (Status: affected)
- 21.sp1 ap344964 (Status: affected)
- 21.sp1 ap345054 (Status: affected)
- 21.sp1 ap345059 (Status: affected)
- 21.sp1 ap345069 (Status: affected)
- 21.sp1 ap345293 (Status: affected)
- 21.sp1 ap345452 (Status: affected)
- 21.sp1 ap345456 (Status: affected)
- 21.sp1 ap345490 (Status: affected)
- 21.sp1 ap345627 (Status: affected)
- 21.sp1 ap345628 (Status: affected)
- 21.sp1 ap345729 (Status: affected)
- 21.sp1 ap345732 (Status: affected)
- 21.sp1 ap345738 (Status: affected)
- 21.sp1 ap345755 (Status: affected)
- 21.sp1 ap345850 (Status: affected)
- 21.sp1 ap345873 (Status: affected)
- 21.sp1 ap346064 (Status: affected)
- 21.sp1 ap346076 (Status: affected)
- 21.sp1 ap346128 (Status: affected)
- 21.sp1 ap346129 (Status: affected)
- 21.sp1 ap346183 (Status: affected)
- 21.sp1 ap346233 (Status: affected)
- 21.sp1 ap346253 (Status: affected)
- 21.sp1 ap346261 (Status: affected)
- 21.sp1 ap346307 (Status: affected)
- 21.sp1 ap346337 (Status: affected)
- 21.sp1 ap346347 (Status: affected)
- 21.sp1 ap346376 (Status: affected)
- 21.sp1 ap346554 (Status: affected)
- 21.sp1 ap346559 (Status: affected)
- 21.sp1 ap346562 (Status: affected)
- 21.sp1 ap346577 (Status: affected)
- 21.sp1 ap346607 (Status: affected)
- 21.sp1 ap346632 (Status: affected)
- 21.sp1 ap346639 (Status: affected)
- 21.sp1 ap346724 (Status: affected)
- 21.sp1 ap346764 (Status: affected)
- 21.sp1 ap346900 (Status: affected)
- 21.sp1 ap346902 (Status: affected)
- 21.sp1 ap347016 (Status: affected)
- 21.sp1 ap347158 (Status: affected)
- 21.sp1 ap347172 (Status: affected)
- 21.sp1 ap347246 (Status: affected)
- 21.sp1 ap347302 (Status: affected)
- 21.sp1 ap347506 (Status: affected)
- 21.sp1 ap347507 (Status: affected)
- 21.sp1 ap347534 (Status: affected)
- 21.sp1 ap347640 (Status: affected)
- 21.sp1 ap347676 (Status: affected)
- 21.sp1 ap347741 (Status: affected)
- 21.sp1 ap347896 (Status: affected)
- 21.sp1 ap347905 (Status: affected)
- 21.sp1 ap347930 (Status: affected)
- 21.sp1 ap347959 (Status: affected)
- 21.sp1 ap348037 (Status: affected)
- 21.sp1 ap348078 (Status: affected)
- 21.sp1 ap348089 (Status: affected)
- 21.sp1 ap348093 (Status: affected)
- 21.sp1 ap348100 (Status: affected)
- 21.sp1 ap348104 (Status: affected)
- 21.sp1 ap348107 (Status: affected)
- 21.sp1 ap348156 (Status: affected)
- 21.sp1 ap348160 (Status: affected)
- 21.sp1 ap348431 (Status: affected)
- 21.sp1 ap348462 (Status: affected)
- 21.sp1 ap348472 (Status: affected)
- 21.sp1 ap348527 (Status: affected)
- 21.sp1 ap348531 (Status: affected)
- 21.sp1 ap348564 (Status: affected)
- 21.sp1 ap348660 (Status: affected)
- 21.sp1 ap348740 (Status: affected)
- 21.sp1 ap348878 (Status: affected)
- 21.sp1 ap348891 (Status: affected)
- 21.sp1 ap348945 (Status: affected)
- 21.sp1 ap348952 (Status: affected)
- 21.sp1 ap349011 (Status: affected)
- 21.sp1 ap349023 (Status: affected)
- 21.sp1 ap349056 (Status: affected)
- 21.sp1 ap349066 (Status: affected)
- 21.sp1 ap349206 (Status: affected)
- 21.sp1 ap349222 (Status: affected)
- 21.sp1 ap349390 (Status: affected)
- 21.sp1 ap349443 (Status: affected)
- 21.sp1 ap349486 (Status: affected)
- 21.sp1 ap349589 (Status: affected)
- 21.sp1 ap349617 (Status: affected)
- 21.sp1 ap349621 (Status: affected)
- 21.sp1 ap349631 (Status: affected)
- 21.sp1 ap349642 (Status: affected)
- 21.sp1 ap349699 (Status: affected)
- 21.sp1 ap349703 (Status: affected)
- 21.sp1 ap349724 (Status: affected)
- 21.sp1 ap349850 (Status: affected)
- 21.sp1 ap349863 (Status: affected)
- 21.sp1 ap349864 (Status: affected)
- 21.sp1 ap349867 (Status: affected)
- 21.sp1 ap350050 (Status: affected)
- 21.sp1 ap350111 (Status: affected)
- 21.sp1 ap350141 (Status: affected)
- 21.sp1 ap350143 (Status: affected)
- 21.sp1 ap350179 (Status: affected)
- 21.sp1 ap350189 (Status: affected)
- 21.sp1 ap350303 (Status: affected)
- 21.sp1 ap350456 (Status: affected)
- 21.sp1 ap350465 (Status: affected)
- 21.sp1 ap350474 (Status: affected)
- 21.sp1 ap350497 (Status: affected)
- 21.sp1 ap350573 (Status: affected)
- 21.sp1 ap350591 (Status: affected)
- 21.sp1 ap350832 (Status: affected)
- 21.sp1 ap350838 (Status: affected)
- 21.sp1 ap350859 (Status: affected)
- 21.sp1 ap351014 (Status: affected)
- 21.sp1 ap351248 (Status: affected)
- 21.sp1 ap351263 (Status: affected)
- 21.sp1 ap351295 (Status: affected)
- 21.sp1 ap351487 (Status: affected)
- 21.sp1 ap351495 (Status: affected)
- 21.sp1 ap351530 (Status: affected)
- 21.sp1 ap351644 (Status: affected)
- 21.sp1 ap351700 (Status: affected)
- 21.sp1 ap351721 (Status: affected)
- 21.sp1 ap351754 (Status: affected)
- 21.sp1 ap351835 (Status: affected)
- 21.sp1 ap351894 (Status: affected)
- 21.sp1 ap351898 (Status: affected)
- 21.sp1 ap351951 (Status: affected)
- 21.sp1 ap351988 (Status: affected)
- 21.sp1 ap352082 (Status: affected)
- 21.sp1 ap352087 (Status: affected)
- 21.sp1 ap352205 (Status: affected)
- 21.sp1 ap352246 (Status: affected)
- 21.sp1 ap352340 (Status: affected)
- 21.sp1 ap352372 (Status: affected)
- 21.sp1 ap352402 (Status: affected)
- 21.sp1 ap352421 (Status: affected)
- 21.sp1 ap352515 (Status: affected)
- 21.sp1 ap352766 (Status: affected)
- 21.sp1 ap352795 (Status: affected)
- 21.sp1 ap352896 (Status: affected)
- 21.sp1 ap352969 (Status: affected)
- 21.sp1 ap352972 (Status: affected)
- 21.sp1 ap353403 (Status: affected)
- 21.sp1 ap353406 (Status: affected)
- 21.sp1 ap353418 (Status: affected)
- 21.sp1 ap353464 (Status: affected)
- 21.sp1 ap353520 (Status: affected)
- 21.sp1 ap353549 (Status: affected)
- 21.sp1 ap353582 (Status: affected)
- 21.sp1 ap353689 (Status: affected)
- 21.sp1 ap353701 (Status: affected)
- 21.sp1 ap353841 (Status: affected)
- 21.sp1 ap353843 (Status: affected)
- 21.sp1 ap354050 (Status: affected)
- 21.sp1 ap354069 (Status: affected)
- 21.sp1 ap354090 (Status: affected)
- 21.sp1 ap354098 (Status: affected)
- 21.sp1 ap354180 (Status: affected)
- 21.sp1 ap354331 (Status: affected)
- 21.sp1 ap354355 (Status: affected)
- 21.sp1 ap354413 (Status: affected)
- 21.sp1 ap354454 (Status: affected)
- 21.sp1 ap354469 (Status: affected)
- 21.sp1 ap354474 (Status: affected)
- 21.sp1 ap354494 (Status: affected)
- 21.sp1 ap354531 (Status: affected)
- 21.sp1 ap354559 (Status: affected)
- 21.sp1 ap354646 (Status: affected)
- 21.sp1 ap354688 (Status: affected)
- 21.sp1 ap354707 (Status: affected)
- 21.sp1 ap354789 (Status: affected)
- 21.sp1 ap354793 (Status: affected)
- 21.sp1 ap354918 (Status: affected)
- 21.sp1 ap354927 (Status: affected)
- 21.sp1 ap354936 (Status: affected)
- 21.sp1 ap354964 (Status: affected)
- 21.sp1 ap355000 (Status: affected)
- 21.sp1 ap355027 (Status: affected)
- 21.sp1 ap355091 (Status: affected)
- 21.sp1 ap355095 (Status: affected)
- 21.sp1 ap355385 (Status: affected)
- 21.sp1 ap355616 (Status: affected)
- 21.sp1 ap355663 (Status: affected)
- 21.sp1 ap355774 (Status: affected)
- 21.sp1 ap355855 (Status: affected)
- 21.sp1 ap355875 (Status: affected)
- 21.sp1 ap355883 (Status: affected)
- 21.sp1 ap355894 (Status: affected)
- 21.sp1 ap355904 (Status: affected)
- 21.sp1 ap355912 (Status: affected)
- 21.sp1 ap355914 (Status: affected)
- 21.sp1 ap356145 (Status: affected)
- 21.sp1 ap356164 (Status: affected)
- 21.sp1 ap356231 (Status: affected)
- 21.sp1 ap356271 (Status: affected)
- 21.sp1 ap356317 (Status: affected)
- 21.sp1 ap356328 (Status: affected)
- 21.sp1 ap356375 (Status: affected)
- 21.sp1 ap356458 (Status: affected)
- 21.sp1 ap356474 (Status: affected)
- 21.sp1 ap356589 (Status: affected)
- 21.sp1 ap356704 (Status: affected)
- 21.sp1 ap356787 (Status: affected)
- 21.sp1 ap356817 (Status: affected)
- 21.sp1 ap356847 (Status: affected)
- 21.sp1 ap356978 (Status: affected)
- 21.sp1 ap357047 (Status: affected)
- 21.sp1 ap357049 (Status: affected)
- 21.sp1 ap357083 (Status: affected)
- 21.sp1 ap357395 (Status: affected)
- 21.sp1 ap357499 (Status: affected)
- 21.sp1 ap357574 (Status: affected)
- 21.sp1 ap357607 (Status: affected)
- 21.sp1 ap357653 (Status: affected)
- 21.sp1 ap357718 (Status: affected)
- 21.sp1 ap357768 (Status: affected)
- 21.sp1 ap357769 (Status: affected)
- 21.sp1 ap357775 (Status: affected)
- 21.sp1 ap358034 (Status: affected)
- 21.sp1 ap358131 (Status: affected)
- 21.sp1 ap358234 (Status: affected)
- 21.sp1 ap358345 (Status: affected)
- 21.sp1 ap358364 (Status: affected)
- 21.sp1 ap358399 (Status: affected)
- 21.sp1 ap358411 (Status: affected)
- 21.sp1 ap358469 (Status: affected)
- 21.sp1 ap358508 (Status: affected)
- 21.sp1 ap358563 (Status: affected)
- 21.sp1 ap358578 (Status: affected)
- 21.sp1 ap358582 (Status: affected)
- 21.sp1 ap358726 (Status: affected)
- 21.sp1 ap358730 (Status: affected)
- 21.sp1 ap358731 (Status: affected)
- 21.sp1 ap358887 (Status: affected)
- 21.sp1 ap358889 (Status: affected)
- 21.sp1 ap358893 (Status: affected)
- 21.sp1 ap358942 (Status: affected)
- 21.sp1 ap358971 (Status: affected)
- 21.sp1 ap359023 (Status: affected)
- 21.sp1 ap359030 (Status: affected)
- 21.sp1 ap359076 (Status: affected)
- 21.sp1 ap359085 (Status: affected)
- 21.sp1 ap359112 (Status: affected)
- 21.sp1 ap359145 (Status: affected)
- 21.sp1 ap359172 (Status: affected)
- 21.sp1 ap359227 (Status: affected)
- 21.sp1 ap359423 (Status: affected)
- 21.sp1 ap359465 (Status: affected)
- 21.sp1 ap359470 (Status: affected)
- 21.sp1 ap359536 (Status: affected)
- 21.sp1 ap359589 (Status: affected)
- 21.sp1 ap359644 (Status: affected)
- 21.sp1 ap359685 (Status: affected)
- 21.sp1 ap359729 (Status: affected)
- 21.sp1 ap359752 (Status: affected)
- 21.sp1 ap359753 (Status: affected)
- 21.sp1 ap359764 (Status: affected)
- 21.sp1 ap359808 (Status: affected)
- 21.sp1 ap359829 (Status: affected)
- 21.sp1 ap359911 (Status: affected)
- 21.sp1 ap359956 (Status: affected)
- 21.sp1 ap359974 (Status: affected)
- 21.sp1 ap360209 (Status: affected)
- 21.sp1 ap360211 (Status: affected)
- 21.sp1 ap360259 (Status: affected)
- 21.sp1 ap360265 (Status: affected)
- 21.sp1 ap360295 (Status: affected)
- 21.sp1 ap360306 (Status: affected)
- 21.sp1 ap360325 (Status: affected)
- 21.sp1 ap360373 (Status: affected)
- 21.sp1 ap360459 (Status: affected)
- 21.sp1 ap360586 (Status: affected)
- 21.sp1 ap360600 (Status: affected)
- 21.sp1 ap360771 (Status: affected)
- 21.sp1 ap360893 (Status: affected)
- 21.sp1 ap360907 (Status: affected)
- 21.sp1 ap360912 (Status: affected)
- 21.sp1 ap360931 (Status: affected)
- 21.sp1 ap360966 (Status: affected)
- 21.sp1 ap360993 (Status: affected)
- 21.sp1 ap361055 (Status: affected)
- 21.sp1 ap361122 (Status: affected)
- 21.sp1 ap361153 (Status: affected)
- 21.sp1 ap361338 (Status: affected)
- 21.sp1 ap361412 (Status: affected)
- 21.sp1 ap361420 (Status: affected)
- 21.sp1 ap361520 (Status: affected)
- 21.sp1 ap361533 (Status: affected)
- 21.sp1 ap361559 (Status: affected)
- 21.sp1 ap361560 (Status: affected)
- 21.sp1 ap361641 (Status: affected)
- 21.sp1 ap361820 (Status: affected)
- 21.sp1 ap361821 (Status: affected)
- 21.sp1 ap361854 (Status: affected)
- 21.sp1 ap361883 (Status: affected)
- 21.sp1 ap361945 (Status: affected)
- 21.sp1 ap362163 (Status: affected)
- 21.sp1 ap362298 (Status: affected)
- 21.sp1 ap362317 (Status: affected)
- 21.sp1 ap362379 (Status: affected)
- 21.sp1 ap362532 (Status: affected)
- 21.sp1 ap362553 (Status: affected)
- 21.sp1 ap362593 (Status: affected)
- 21.sp1 ap362637 (Status: affected)
- 21.sp1 ap362825 (Status: affected)
- 21.sp1 ap362827 (Status: affected)
- 21.sp1 ap362848 (Status: affected)
- 21.sp1 ap362961 (Status: affected)
- 21.sp1 ap363001 (Status: affected)
- 21.sp1 ap363128 (Status: affected)
- 21.sp1 ap363146 (Status: affected)
- 21.sp1 ap363218 (Status: affected)
- 21.sp1 ap363228 (Status: affected)
- 21.sp1 ap363265 (Status: affected)
- 21.sp1 ap363363 (Status: affected)
- 21.sp1 ap363560 (Status: affected)
- 21.sp1 ap363584 (Status: affected)
- 21.sp1 ap363639 (Status: affected)
- 21.sp1 ap363695 (Status: affected)
- 21.sp1 ap363705 (Status: affected)
- 21.sp1 ap363729 (Status: affected)
- 21.sp1 ap363846 (Status: affected)
- 21.sp1 ap364004 (Status: affected)
- 21.sp1 ap364062 (Status: affected)
- 21.sp1 ap364118 (Status: affected)
- 21.sp1 ap364239 (Status: affected)
- 21.sp1 ap364243 (Status: affected)
- 21.sp1 ap364256 (Status: affected)
- 21.sp1 ap364358 (Status: affected)
- 21.sp1 ap364369 (Status: affected)
- 21.sp1 ap364384 (Status: affected)
- 21.sp1 ap364471 (Status: affected)
- 21.sp1 ap364473 (Status: affected)
- 21.sp1 ap364559 (Status: affected)
- 21.sp1 ap364568 (Status: affected)
- 21.sp1 ap364670 (Status: affected)
- 21.sp1 ap364772 (Status: affected)
- 21.sp1 ap364879 (Status: affected)
- 21.sp1 ap364898 (Status: affected)
- 21.sp1 ap365167 (Status: affected)
- 21.sp1 ap365170 (Status: affected)
- 21.sp1 ap365379 (Status: affected)
- 21.sp1 ap365390 (Status: affected)
- 21.sp1 ap365449 (Status: affected)
- 21.sp1 ap365556 (Status: affected)
- 21.sp1 ap365572 (Status: affected)
- 21.sp1 ap365584 (Status: affected)
- 21.sp1 ap365597 (Status: affected)
- 21.sp1 ap365632 (Status: affected)
- 21.sp1 ap365662 (Status: affected)
- 21.sp1 ap365730 (Status: affected)
- 21.sp1 ap365889 (Status: affected)
- 21.sp1 ap365970 (Status: affected)
- 21.sp1 ap366118 (Status: affected)
- 21.sp1 ap366211 (Status: affected)
- 21.sp1 ap366268 (Status: affected)
- 21.sp1 ap366290 (Status: affected)
- 21.sp1 ap366295 (Status: affected)
- 21.sp1 ap366348 (Status: affected)
- 21.sp1 ap366373 (Status: affected)
- 21.sp1 ap366744 (Status: affected)
- 21.sp1 ap366747 (Status: affected)
- 21.sp1 ap366803 (Status: affected)
- 21.sp1 ap366960 (Status: affected)
- 21.sp1 ap367322 (Status: affected)
- 21.sp1 ap367340 (Status: affected)
- 21.sp1 ap367461 (Status: affected)
- 21.sp1 ap367524 (Status: affected)
- 21.sp1 ap367782 (Status: affected)
- 21.sp1 ap367794 (Status: affected)
- 21.sp1 ap367998 (Status: affected)
- 21.sp1 ap368399 (Status: affected)
- 21.sp1 ap368497 (Status: affected)
- 21.sp1 ap368604 (Status: affected)
- 21.sp1 ap369132 (Status: affected)
- 21.sp1 ap369173 (Status: affected)
- 21.sp1 ap369206 (Status: affected)
- 21.sp1 ap369261 (Status: affected)
- 21.sp1 ap369434 (Status: affected)
- 21.sp1 ap370388 (Status: affected)
- 21.sp1 ap370654 (Status: affected)
- 21.sp1 ap370888 (Status: affected)
- 21.sp1 ap372043 (Status: affected)
- 21.sp1 ap372106 (Status: affected)
- 21.sp1 ap372229 (Status: affected)
- 21.sp1 ap372337 (Status: affected)
- 21.sp1 ap372351 (Status: affected)
- 21.sp1 ap372582 (Status: affected)
- 21.sp1 ap372842 (Status: affected)
- 21.sp1 ap373015 (Status: affected)
- 21.sp1 ap373276 (Status: affected)
- 21.sp1 ap373349 (Status: affected)
- 21.sp1 ap373777 (Status: affected)
- 21.sp1 ap373813 (Status: affected)
- 21.sp1 ap373814 (Status: affected)
- 21.sp1 ap373899 (Status: affected)
- 21.sp1 ap373950 (Status: affected)
- 21.sp1 ap374144 (Status: affected)
- 21.sp1 ap374145 (Status: affected)
- 21.sp1 ap374265 (Status: affected)
- 21.sp1 ap374353 (Status: affected)
- 21.sp1 ap374366 (Status: affected)
- 21.sp1 ap374557 (Status: affected)
- 21.sp1 ap374822 (Status: affected)
- 21.sp1 ap375026 (Status: affected)
- 21.sp1 ap375053 (Status: affected)
- 21.sp1 ap375061 (Status: affected)
- 21.sp1 ap375517 (Status: affected)
- 21.sp1 ap375674 (Status: affected)
- 21.sp1 ap375931 (Status: affected)
- 21.sp1 ap378258 (Status: affected)
- 21.sp1 ap378970 (Status: affected)
- 21.sp1 ap379387 (Status: affected)
- 21.sp1 ap379440 (Status: affected)
- 21.sp1 ap379473 (Status: affected)
- 21.sp1 ap379847 (Status: affected)
- 21.sp1 ap380248 (Status: affected)
- 21.sp1 ap380473 (Status: affected)
- 21.0 ap354707 (Status: affected)
- 21.0 ap346307 (Status: affected)
- 21.0 ap345633 (Status: affected)
- 21.0 ap354474 (Status: affected)
- 21.0 ap349066 (Status: affected)
- 21.0 ap349056 (Status: affected)
- 21.0 ap355774 (Status: affected)
- 21.0 ap345732 (Status: affected)
- 21.0 ap342324 (Status: affected)
- 21.0 ap355385 (Status: affected)
- 21.0 ap347741 (Status: affected)
- 21.0 ap341471 (Status: affected)
- 21.0 ap343410 (Status: affected)
- 21.0 ap348431 (Status: affected)
- 21.0 ap354793 (Status: affected)
- 21.0 ap339342 (Status: affected)
- 21.0 ap351160 (Status: affected)
- 21.0 ap352972 (Status: affected)
- 21.0 ap359145 (Status: affected)
- 21.0 ap339376 (Status: affected)
- 21.0 ap364358 (Status: affected)
- 21.0 ap356787 (Status: affected)
- 21.0 ap351898 (Status: affected)
- 21.0 ap362637 (Status: affected)
- 21.0 ap350338 (Status: affected)
- 21.0 ap342625 (Status: affected)
- 21.0 ap235252 (Status: affected)
- 21.0 ap354494 (Status: affected)
- 21.0 ap345261 (Status: affected)
- 21.0 ap359536 (Status: affected)
- 21.0 ap346261 (Status: affected)
- 21.0 ap355027 (Status: affected)
- 21.0 ap359465 (Status: affected)
- 21.0 ap363560 (Status: affected)
- 21.0 ap345738 (Status: affected)
- 21.0 ap356458 (Status: affected)
- 21.0 ap364670 (Status: affected)
- 21.0 ap342145 (Status: affected)
- 21.0 ap339200 (Status: affected)
- 21.0 ap357571 (Status: affected)
- 21.0 ap365889 (Status: affected)
- 21.0 ap215990 (Status: affected)
- 21.0 ap339346 (Status: affected)
- 21.0 ap244265 (Status: affected)
- 21.0 ap339781 (Status: affected)
- 21.0 ap364879 (Status: affected)
- 21.0 ap355091 (Status: affected)
- 21.0 ap245148 (Status: affected)
- 21.0 ap339658 (Status: affected)
- 21.0 ap358563 (Status: affected)
- 21.0 ap340054 (Status: affected)
- 21.0 ap341645 (Status: affected)
- 21.0 ap362825 (Status: affected)
- 21.0 ap355894 (Status: affected)
- 21.0 ap352372 (Status: affected)
- 21.0 ap361559 (Status: affected)
- 21.0 ap360306 (Status: affected)
- 21.0 ap362532 (Status: affected)
- 21.0 ap339206 (Status: affected)
- 21.0 ap356164 (Status: affected)
- 21.0 ap366118 (Status: affected)
- 21.0 ap348527 (Status: affected)
- 21.0 ap359470 (Status: affected)
- 21.0 ap352421 (Status: affected)
- 21.0 ap354469 (Status: affected)
- 21.0 ap349206 (Status: affected)
- 21.0 ap344100 (Status: affected)
- 21.0 ap351961 (Status: affected)
- 21.0 ap342461 (Status: affected)
- 21.0 ap346376 (Status: affected)
- 21.0 ap358411 (Status: affected)
- 21.0 ap346577 (Status: affected)
- 21.0 ap346147 (Status: affected)
- 21.0 ap349867 (Status: affected)
- 21.0 ap365170 (Status: affected)
- 21.0 ap345059 (Status: affected)
- 21.0 ap354964 (Status: affected)
- 21.0 ap356271 (Status: affected)
- 21.0 ap363146 (Status: affected)
- 21.0 ap346554 (Status: affected)
- 21.0 ap347246 (Status: affected)
- 21.0 ap342853 (Status: affected)
- 21.0 ap354180 (Status: affected)
- 21.0 ap351988 (Status: affected)
- 21.0 ap356474 (Status: affected)
- 21.0 ap354785 (Status: affected)
- 21.0 ap346253 (Status: affected)
- 21.0 ap354413 (Status: affected)
- 21.0 ap342719 (Status: affected)
- 21.0 ap350465 (Status: affected)
- 21.0 ap343675 (Status: affected)
- 21.0 ap361533 (Status: affected)
- 21.0 ap346900 (Status: affected)
- 21.0 ap339897 (Status: affected)
- 21.0 ap358726 (Status: affected)
- 21.0 ap359433 (Status: affected)
- 21.0 ap351835 (Status: affected)
- 21.0 ap344952 (Status: affected)
- 21.0 ap353843 (Status: affected)
- 21.0 ap356817 (Status: affected)
- 21.0 ap343017 (Status: affected)
- 21.0 ap360586 (Status: affected)
- 21.0 ap346074 (Status: affected)
- 21.0 ap338988 (Status: affected)
- 21.0 ap345069 (Status: affected)
- 21.0 ap355904 (Status: affected)
- 21.0 ap351263 (Status: affected)
- 21.0 ap361590 (Status: affected)
- 21.0 ap346622 (Status: affected)
- 21.0 ap341350 (Status: affected)
- 21.0 ap342975 (Status: affected)
- 21.0 ap344052 (Status: affected)
- 21.0 ap359119 (Status: affected)
- 21.0 ap343351 (Status: affected)
- 21.0 ap350497 (Status: affected)
- 21.0 ap342284 (Status: affected)
- 21.0 ap347603 (Status: affected)
- 21.0 ap340168 (Status: affected)
- 21.0 ap354098 (Status: affected)
- 21.0 ap339395 (Status: affected)
- 21.0 ap349390 (Status: affected)
- 21.0 ap358234 (Status: affected)
- 21.0 ap360912 (Status: affected)
- 21.0 ap345013 (Status: affected)
- 21.0 ap361854 (Status: affected)
- 21.0 ap342669 (Status: affected)
- 21.0 ap343579 (Status: affected)
- 21.0 ap355000 (Status: affected)
- 21.0 ap349210 (Status: affected)
- 21.0 ap361412 (Status: affected)
- 21.0 ap342588 (Status: affected)
- 21.0 ap355107 (Status: affected)
- 21.0 ap348945 (Status: affected)
- 21.0 ap345452 (Status: affected)
- 21.0 ap244609 (Status: affected)
- 21.0 ap346902 (Status: affected)
- 21.0 ap359829 (Status: affected)
- 21.0 ap358469 (Status: affected)
- 21.0 ap357083 (Status: affected)
- 21.0 ap347506 (Status: affected)
- 21.0 ap342696 (Status: affected)
- 21.0 ap345293 (Status: affected)
- 21.0 ap349996 (Status: affected)
- 21.0 ap244020 (Status: affected)
- 21.0 ap348156 (Status: affected)
- 21.0 ap350189 (Status: affected)
- 21.0 ap343495 (Status: affected)
- 21.0 ap367732 (Status: affected)
- 21.0 ap339552 (Status: affected)
- 21.0 ap342175 (Status: affected)
- 21.0 ap359227 (Status: affected)
- 21.0 ap338972 (Status: affected)
- 21.0 ap343352 (Status: affected)
- 21.0 ap352766 (Status: affected)
- 21.0 ap346724 (Status: affected)
- 21.0 ap363228 (Status: affected)
- 21.0 ap344094 (Status: affected)
- 21.0 ap345755 (Status: affected)
- 21.0 ap342483 (Status: affected)
- 21.0 ap346386 (Status: affected)
- 21.0 ap343616 (Status: affected)
- 21.0 ap351478 (Status: affected)
- 21.0 ap343999 (Status: affected)
- 21.0 ap344270 (Status: affected)
- 21.0 ap348472 (Status: affected)
- 21.0 ap358582 (Status: affected)
- 21.0 ap245441 (Status: affected)
- 21.0 ap358893 (Status: affected)
- 21.0 ap354646 (Status: affected)
- 21.0 ap341939 (Status: affected)
- 21.0 ap350308 (Status: affected)
- 21.0 ap357607 (Status: affected)
- 21.0 ap364384 (Status: affected)
- 21.0 ap242300 (Status: affected)
- 21.0 ap349699 (Status: affected)
- 21.0 ap338833 (Status: affected)
- 21.0 ap360600 (Status: affected)
- 21.0 ap342946 (Status: affected)
- 21.0 ap363301 (Status: affected)
- 21.0 ap339477 (Status: affected)
- 21.0 ap235960 (Status: affected)
- 21.0 ap247533 (Status: affected)
- 21.0 ap348473 (Status: affected)
- 21.0 ap339538 (Status: affected)
- 21.0 ap343877 (Status: affected)
- 21.0 ap366373 (Status: affected)
- 21.0 ap364369 (Status: affected)
- 21.0 ap366295 (Status: affected)
- 21.0 ap349617 (Status: affected)
- 21.0 ap339351 (Status: affected)
- 21.0 ap356317 (Status: affected)
- 21.0 ap349850 (Status: affected)
- 21.0 ap347905 (Status: affected)
- 21.0 ap344752 (Status: affected)
- 21.0 ap348143 (Status: affected)
- 21.0 ap365730 (Status: affected)
- 21.0 ap350303 (Status: affected)
- 21.0 ap347158 (Status: affected)
- 21.0 ap351294 (Status: affected)
- 21.0 ap344681 (Status: affected)
- 21.0 ap354069 (Status: affected)
- 21.0 ap347640 (Status: affected)
- 21.0 ap349864 (Status: affected)
- 21.0 ap360459 (Status: affected)
- 21.0 ap361520 (Status: affected)
- 21.0 ap346639 (Status: affected)
- 21.0 ap350110 (Status: affected)
- 21.0 ap350111 (Status: affected)
- 21.0 ap349724 (Status: affected)
- 21.0 ap245468 (Status: affected)
- 21.0 ap344043 (Status: affected)
- 21.0 ap355095 (Status: affected)
- 21.0 ap347016 (Status: affected)
- 21.0 ap350143 (Status: affected)
- 21.0 ap347172 (Status: affected)
- 21.0 ap342836 (Status: affected)
- 21.0 ap352969 (Status: affected)
- 21.0 ap365167 (Status: affected)
- 21.0 ap346379 (Status: affected)
- 21.0 ap364473 (Status: affected)
- 21.0 ap347302 (Status: affected)
- 21.0 ap339209 (Status: affected)
- 21.0 ap350141 (Status: affected)
- 21.0 ap355616 (Status: affected)
- 21.0 ap365632 (Status: affected)
- 21.0 ap357653 (Status: affected)
- 21.0 ap346347 (Status: affected)
- 21.0 ap349872 (Status: affected)
- 21.0 ap354936 (Status: affected)
- 21.0 ap353701 (Status: affected)
- 21.0 ap345627 (Status: affected)
- 21.0 ap345054 (Status: affected)
- 21.0 ap360966 (Status: affected)
- 21.0 ap359752 (Status: affected)
- 21.0 ap346183 (Status: affected)
- 21.0 ap352109 (Status: affected)
- 21.0 ap345490 (Status: affected)
- 21.0 ap348753 (Status: affected)
- 21.0 ap353841 (Status: affected)
- 21.0 ap346128 (Status: affected)
- 21.0 ap350204 (Status: affected)
- 21.0 ap356145 (Status: affected)
- 21.0 ap358889 (Status: affected)
- 21.0 ap359030 (Status: affected)
- 21.0 ap347930 (Status: affected)
- 21.0 ap361883 (Status: affected)
- 21.0 ap352515 (Status: affected)
- 21.0 ap356231 (Status: affected)
- 21.0 ap363584 (Status: affected)
- 21.0 ap351216 (Status: affected)
- 21.0 ap356328 (Status: affected)
- 21.0 ap348093 (Status: affected)
- 21.0 ap351721 (Status: affected)
- 21.0 ap344253 (Status: affected)
- 21.0 ap345850 (Status: affected)
- 21.0 ap246656 (Status: affected)
- 21.0 ap341897 (Status: affected)
- 21.0 ap350491 (Status: affected)
- 21.0 ap359589 (Status: affected)
- 21.0 ap352795 (Status: affected)
- 21.0 ap350591 (Status: affected)
- 21.0 ap366290 (Status: affected)
- 21.0 ap346076 (Status: affected)
- 21.0 ap339196 (Status: affected)
- 21.0 ap358345 (Status: affected)
- 21.0 ap364471 (Status: affected)
- 21.0 ap348078 (Status: affected)
- 21.0 ap346562 (Status: affected)
- 21.0 ap354331 (Status: affected)
- 21.0 ap350474 (Status: affected)
- 21.0 ap349642 (Status: affected)
- 21.0 ap348100 (Status: affected)
- 21.0 ap346559 (Status: affected)
- 21.0 ap352896 (Status: affected)
- 21.0 ap344020 (Status: affected)
- 21.0 ap342217 (Status: affected)
- 21.0 ap353418 (Status: affected)
- 21.0 ap359729 (Status: affected)
- 21.0 ap351644 (Status: affected)
- 21.0 ap359076 (Status: affected)
- 21.0 ap339568 (Status: affected)
- 21.0 (Status: affected)
- 21.0 ap347896 (Status: affected)
- 21.0 ap344945 (Status: affected)
- 21.0 ap351700 (Status: affected)
- 21.0 ap353842 (Status: affected)
- 21.0 ap229862 (Status: affected)
- 21.0 ap237570 (Status: affected)
- 21.0 ap231084 (Status: affected)
- 21.0 ap238089 (Status: affected)
- 21.0 ap241711 (Status: affected)
- 21.0 ap240661 (Status: affected)
- 21.0 ap248165 (Status: affected)
- 21.0 ap338965 (Status: affected)
- 21.0 ap338876 (Status: affected)
- 21.0 ap338964 (Status: affected)
- 21.0 ap339041 (Status: affected)
- 21.0 ap339169 (Status: affected)
- 21.0 ap339179 (Status: affected)
- 21.0 ap339387 (Status: affected)
- 21.0 ap339530 (Status: affected)
- 21.0 ap339645 (Status: affected)
- 21.0 ap339464 (Status: affected)
- 21.0 ap245755 (Status: affected)
- 21.0 ap341846 (Status: affected)
- 21.0 ap341484 (Status: affected)
- 21.0 ap341434 (Status: affected)
- 21.0 ap244183 (Status: affected)
- 21.0 ap244254 (Status: affected)
- 21.0 ap343439 (Status: affected)
- 21.0 ap343457 (Status: affected)
- 21.0 ap343542 (Status: affected)
- 21.0 ap342868 (Status: affected)
- 21.0 ap343861 (Status: affected)
- 21.0 ap343772 (Status: affected)
- 21.0 ap342657 (Status: affected)
- 21.0 ap344700 (Status: affected)
- 21.0 ap344403 (Status: affected)
- 21.0 ap344464 (Status: affected)
- 21.0 ap344430 (Status: affected)
- 21.0 ap344659 (Status: affected)
- 21.0 ap344431 (Status: affected)
- 21.0 ap342227 (Status: affected)
- 21.0 ap344083 (Status: affected)
- 21.0 ap343904 (Status: affected)
- 21.0 ap344068 (Status: affected)
- 21.0 ap343959 (Status: affected)
- 21.0 ap343907 (Status: affected)
- 21.0 ap344095 (Status: affected)
- 21.0 ap345071 (Status: affected)
- 21.0 ap345686 (Status: affected)
- 21.0 ap346135 (Status: affected)
- 21.0 ap345816 (Status: affected)
- 21.0 ap346171 (Status: affected)
- 21.0 ap346380 (Status: affected)
- 21.0 ap347131 (Status: affected)
- 21.0 ap346739 (Status: affected)
- 21.0 ap348880 (Status: affected)
- 21.0 ap348990 (Status: affected)
- 21.0 ap348725 (Status: affected)
- 21.0 ap349228 (Status: affected)
- 21.0 ap348697 (Status: affected)
- 21.0 ap348734 (Status: affected)
- 21.0 ap349510 (Status: affected)
- 21.0 ap348728 (Status: affected)
- 21.0 ap348942 (Status: affected)
- 21.0 ap348761 (Status: affected)
- 21.0 ap349043 (Status: affected)
- 21.0 ap349900 (Status: affected)
- 21.0 ap349907 (Status: affected)
- 21.0 ap350187 (Status: affected)
- 21.0 ap350122 (Status: affected)
- 21.0 ap349393 (Status: affected)
- 21.0 ap348514 (Status: affected)
- 21.0 ap347974 (Status: affected)
- 21.0 ap347733 (Status: affected)
- 21.0 ap347898 (Status: affected)
- 21.0 ap351925 (Status: affected)
- 21.0 ap351834 (Status: affected)
- 21.0 ap351960 (Status: affected)
- 21.0 ap353179 (Status: affected)
- 21.0 ap351059 (Status: affected)
- 21.0 ap353191 (Status: affected)
- 21.0 ap350573 (Status: affected)
- 21.0 ap350740 (Status: affected)
- 21.0 ap350748 (Status: affected)
- 21.0 ap351803 (Status: affected)
- 21.0 ap352340 (Status: affected)
- 21.0 ap351733 (Status: affected)
- 21.0 ap352390 (Status: affected)
- 21.0 ap352801 (Status: affected)
- 21.0 ap353549 (Status: affected)
- 21.0 ap353649 (Status: affected)
- 21.0 ap350436 (Status: affected)
- 21.0 ap352646 (Status: affected)
- 21.0 ap353856 (Status: affected)
- 21.0 ap353844 (Status: affected)
- 21.0 ap353594 (Status: affected)
- 21.0 ap355647 (Status: affected)
- 21.0 ap357560 (Status: affected)
- 21.0 ap355105 (Status: affected)
- 21.0 ap356392 (Status: affected)
- 21.0 ap354564 (Status: affected)
- 21.0 ap357690 (Status: affected)
- 21.0 ap354784 (Status: affected)
- 21.0 ap354447 (Status: affected)
- 21.0 ap355353 (Status: affected)
- 21.0 ap356254 (Status: affected)
- 21.0 ap355360 (Status: affected)
- 21.0 ap359927 (Status: affected)
- 21.0 ap359926 (Status: affected)
- 21.0 ap363189 (Status: affected)
- 21.0 ap362289 (Status: affected)
- 21.0 ap358658 (Status: affected)
- 21.0 ap359085 (Status: affected)
- 21.0 ap360594 (Status: affected)
- 21.0 ap360737 (Status: affected)
- 21.sp1 ap237570 (Status: affected)
- 21.sp1 ap240661 (Status: affected)
- 21.sp1 ap241711 (Status: affected)
- 21.sp1 ap238089 (Status: affected)
- 21.0 ap364067 (Status: affected)
- 21.0 ap363884 (Status: affected)
- 21.sp1 ap229862 (Status: affected)
- 21.sp1 ap231084 (Status: affected)
- 21.sp1 ap245197 (Status: affected)
- 21.sp1 ap245755 (Status: affected)
- 21.0 ap365131 (Status: affected)
- 21.sp1 ap244183 (Status: affected)
- 21.0 ap364904 (Status: affected)
- 21.sp1 ap244254 (Status: affected)
- 21.sp1 ap338876 (Status: affected)
- 21.sp1 ap341484 (Status: affected)
- 21.sp1 ap341452 (Status: affected)
- 21.sp1 ap339041 (Status: affected)
- 21.sp1 ap339169 (Status: affected)
- 21.sp1 ap249331 (Status: affected)
- 21.sp1 ap341434 (Status: affected)
- 21.sp1 ap339179 (Status: affected)
- 21.sp1 ap339464 (Status: affected)
- 21.sp1 ap339530 (Status: affected)
- 21.sp1 ap339387 (Status: affected)
- 21.sp1 ap248165 (Status: affected)
- 21.sp1 ap341846 (Status: affected)
- 21.sp1 ap339645 (Status: affected)
- 21.sp1 ap342868 (Status: affected)
- 21.sp1 ap343542 (Status: affected)
- 21.sp1 ap343145 (Status: affected)
- 21.sp1 ap343604 (Status: affected)
- 21.sp1 ap343772 (Status: affected)
- 21.sp1 ap342199 (Status: affected)
- 21.sp1 ap342079 (Status: affected)
- 21.sp1 ap342178 (Status: affected)
- 21.sp1 ap342234 (Status: affected)
- 21.sp1 ap342227 (Status: affected)
- 21.sp1 ap342657 (Status: affected)
- 21.sp1 ap343439 (Status: affected)
- 21.sp1 ap343457 (Status: affected)
- 21.sp1 ap345071 (Status: affected)
- 21.sp1 ap344464 (Status: affected)
- 21.sp1 ap345240 (Status: affected)
- 21.sp1 ap345231 (Status: affected)
- 21.sp1 ap345106 (Status: affected)
- 21.sp1 ap344458 (Status: affected)
- 21.sp1 ap345394 (Status: affected)
- 21.sp1 ap343861 (Status: affected)
- 21.sp1 ap344603 (Status: affected)
- 21.sp1 ap344042 (Status: affected)
- 21.sp1 ap344068 (Status: affected)
- 21.sp1 ap344659 (Status: affected)
- 21.sp1 ap343904 (Status: affected)
- 21.sp1 ap344862 (Status: affected)
- 21.sp1 ap344113 (Status: affected)
- 21.sp1 ap343907 (Status: affected)
- 21.sp1 ap344095 (Status: affected)
- 21.sp1 ap344700 (Status: affected)
- 21.sp1 ap343959 (Status: affected)
- 21.sp1 ap344430 (Status: affected)
- 21.sp1 ap344403 (Status: affected)
- 21.sp1 ap344431 (Status: affected)
- 21.sp1 ap346135 (Status: affected)
- 21.sp1 ap345686 (Status: affected)
- 21.sp1 ap345525 (Status: affected)
- 21.sp1 ap346617 (Status: affected)
- 21.sp1 ap346380 (Status: affected)
- 21.sp1 ap346171 (Status: affected)
- 21.sp1 ap346046 (Status: affected)
- 21.sp1 ap346230 (Status: affected)
- 21.sp1 ap345816 (Status: affected)
- 21.sp1 ap347974 (Status: affected)
- 21.sp1 ap346715 (Status: affected)
- 21.sp1 ap347131 (Status: affected)
- 21.sp1 ap347898 (Status: affected)
- 21.sp1 ap347250 (Status: affected)
- 21.sp1 ap348514 (Status: affected)
- 21.sp1 ap348433 (Status: affected)
- 21.sp1 ap346739 (Status: affected)
- 21.sp1 ap348161 (Status: affected)
- 21.sp1 ap347733 (Status: affected)
- 21.sp1 ap349228 (Status: affected)
- 21.sp1 ap349907 (Status: affected)
- 21.sp1 ap348880 (Status: affected)
- 21.sp1 ap348741 (Status: affected)
- 21.sp1 ap349900 (Status: affected)
- 21.sp1 ap349393 (Status: affected)
- 21.sp1 ap349043 (Status: affected)
- 21.sp1 ap348697 (Status: affected)
- 21.sp1 ap348942 (Status: affected)
- 21.sp1 ap349510 (Status: affected)
- 21.sp1 ap348990 (Status: affected)
- 21.sp1 ap349744 (Status: affected)
- 21.sp1 ap348728 (Status: affected)
- 21.sp1 ap348734 (Status: affected)
- 21.sp1 ap348725 (Status: affected)
- 21.sp1 ap349836 (Status: affected)
- 21.sp1 ap350399 (Status: affected)
- 21.sp1 ap350431 (Status: affected)
- 21.sp1 ap350370 (Status: affected)
- 21.sp1 ap350187 (Status: affected)
- 21.sp1 ap350122 (Status: affected)
- 21.sp1 ap350748 (Status: affected)
- 21.sp1 ap350705 (Status: affected)
- 21.sp1 ap350740 (Status: affected)
- 21.sp1 ap351367 (Status: affected)
- 21.sp1 ap350436 (Status: affected)
- 21.sp1 ap350788 (Status: affected)
- 21.sp1 ap351293 (Status: affected)
- 21.sp1 ap350486 (Status: affected)
- 21.sp1 ap350843 (Status: affected)
- 21.sp1 ap351059 (Status: affected)
- 21.sp1 ap352390 (Status: affected)
- 21.sp1 ap352411 (Status: affected)
- 21.sp1 ap351189 (Status: affected)
- 21.sp1 ap353179 (Status: affected)
- 21.sp1 ap353191 (Status: affected)
- 21.sp1 ap352646 (Status: affected)
- 21.sp1 ap352409 (Status: affected)
- 21.sp1 ap352801 (Status: affected)
- 21.sp1 ap351960 (Status: affected)
- 21.sp1 ap351925 (Status: affected)
- 21.sp1 ap353632 (Status: affected)
- 21.sp1 ap353649 (Status: affected)
- 21.sp1 ap353594 (Status: affected)
- 21.sp1 ap351733 (Status: affected)
- 21.sp1 ap353444 (Status: affected)
- 21.sp1 ap353539 (Status: affected)
- 21.sp1 ap351723 (Status: affected)
- 21.sp1 ap351803 (Status: affected)
- 21.sp1 ap351834 (Status: affected)
- 21.sp1 ap355353 (Status: affected)
- 21.sp1 ap354012 (Status: affected)
- 21.sp1 ap354447 (Status: affected)
- 21.sp1 ap353856 (Status: affected)
- 21.sp1 ap354094 (Status: affected)
- 21.sp1 ap354316 (Status: affected)
- 21.sp1 ap354784 (Status: affected)
- 21.sp1 ap354564 (Status: affected)
- 21.sp1 ap353844 (Status: affected)
- 21.sp1 ap355360 (Status: affected)
- 21.sp1 ap355105 (Status: affected)
- 21.sp1 ap355647 (Status: affected)
- 21.sp1 ap357331 (Status: affected)
- 21.sp1 ap357560 (Status: affected)
- 21.sp1 ap355794 (Status: affected)
- 21.sp1 ap356254 (Status: affected)
- 21.sp1 ap356555 (Status: affected)
- 21.sp1 ap356703 (Status: affected)
- 21.sp1 ap357583 (Status: affected)
- 21.sp1 ap356392 (Status: affected)
- 21.sp1 ap356737 (Status: affected)
- 21.sp1 ap358405 (Status: affected)
- 21.sp1 ap357690 (Status: affected)
- 21.sp1 ap358658 (Status: affected)
- 21.sp1 ap359477 (Status: affected)
- 21.sp1 ap359709 (Status: affected)
- 21.sp1 ap360594 (Status: affected)
- 21.sp1 ap360834 (Status: affected)
- 21.sp1 ap360864 (Status: affected)
- 21.sp1 ap360737 (Status: affected)
- 21.sp1 ap361450 (Status: affected)
- 21.sp1 ap359926 (Status: affected)
- 21.sp1 ap359927 (Status: affected)
- 21.sp1 ap359980 (Status: affected)
- 21.sp1 ap361663 (Status: affected)
- 21.sp1 ap363189 (Status: affected)
- 21.sp1 ap361976 (Status: affected)
- 21.sp1 ap362289 (Status: affected)
- 21.sp1 ap362738 (Status: affected)
- 21.sp1 ap364904 (Status: affected)
- 21.sp1 ap363814 (Status: affected)
- 21.sp1 ap363884 (Status: affected)
- 21.sp1 ap364985 (Status: affected)
- 21.sp1 ap365131 (Status: affected)
- 21.sp1 ap365036 (Status: affected)
- 21.sp1 ap364067 (Status: affected)
- 21.sp1 ap364110 (Status: affected)
- 21.sp1 ap364587 (Status: affected)
- 21.sp1 ap364700 (Status: affected)
- 21.sp1 ap366628 (Status: affected)
- 21.sp1 ap366614 (Status: affected)
- 21.sp1 ap366358 (Status: affected)
- 21.sp1 ap367347 (Status: affected)
- 21.sp1 ap367477 (Status: affected)
- 21.sp1 ap369581 (Status: affected)
- 21.sp1 ap367639 (Status: affected)
- 21.sp1 ap367332 (Status: affected)
- 21.sp1 ap374355 (Status: affected)
- 21.sp1 ap371992 (Status: affected)
- 21.sp1 ap370195 (Status: affected)
- 21.sp1 ap373872 (Status: affected)
- 21.sp1 ap371281 (Status: affected)
- 21.sp1 ap370607 (Status: affected)
- 21.sp1 ap371058 (Status: affected)
- 21.sp1 ap376817 (Status: affected)
- 21.sp1 ap380155 (Status: affected)
- 21.sp1 ap383380 (Status: affected)
- 21.sp1 ap379201 (Status: affected)
- 21.sp1 ap377656 (Status: affected)
- 21.sp1 ap348761 (Status: affected)
- RI.2021.02 (Status: affected)
- RI.2021.08 (Status: affected)
- RI.2021.09 (Status: affected)
- RI.2021.10 (Status: affected)
- RI.2021.11 (Status: affected)
- RI.2021.12 (Status: affected)
- RI.2022.02 (Status: affected)
- RI.2022.03 (Status: affected)
- RI.2022.04 (Status: affected)
- RI.2022.07 (Status: affected)
- RI.2022.06 (Status: affected)
- RI.2022.05 (Status: affected)
- RI.2022.08 (Status: affected)
- RI.2022.09 (Status: affected)
- RI.2022.12 (Status: affected)
- RI.2023.01 (Status: affected)
- RI.2023.02 (Status: affected)
- RI.2023.04 (Status: affected)
### References
1. [cisco-sa-bw-priv-esc-qTgUZOsQ](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-priv-esc-qTgUZOsQ)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-4350, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-4350 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4350
- **State**: PUBLISHED
- **Published Date**: November 26, 2019 at 04:49 UTC
- **Last Updated**: August 07, 2024 at 00:01 UTC
- **Reserved Date**: November 04, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Yaws 1.91 has a directory traversal vulnerability in the way certain URLs are processed. A remote authenticated user could use this flaw to obtain content of arbitrary local files via specially-crafted URL request.
### Affected Products
**yaws - yaws**
Affected versions:
- 1.91 (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2011-4350)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4350)
3. [](https://access.redhat.com/security/cve/cve-2011-4350)
4. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650009)
5. [](https://www.openwall.com/lists/oss-security/2011/11/25/7)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-1230, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-1230 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1230
- **State**: PUBLISHED
- **Published Date**: April 01, 2010 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 01:14 UTC
- **Reserved Date**: April 01, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Google Chrome before 4.1.249.1036 does not have the expected behavior for attempts to delete Web SQL Databases and clear the Strict Transport Security (STS) state, which has unspecified impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://code.google.com/p/chromium/issues/detail?id=30801)
2. [](http://googlechromereleases.blogspot.com/2010/03/stable-channel-update.html)
3. [oval:org.mitre.oval:def:14292](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14292)
4. [](http://code.google.com/p/chromium/issues/detail?id=33445)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-48999, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-48999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48999
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 20:06 UTC
- **Last Updated**: May 04, 2025 at 08:27 UTC
- **Reserved Date**: August 22, 2024 at 01:27 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference
Gwangun Jung reported a slab-out-of-bounds access in fib_nh_match:
fib_nh_match+0xf98/0x1130 linux-6.0-rc7/net/ipv4/fib_semantics.c:961
fib_table_delete+0x5f3/0xa40 linux-6.0-rc7/net/ipv4/fib_trie.c:1753
inet_rtm_delroute+0x2b3/0x380 linux-6.0-rc7/net/ipv4/fib_frontend.c:874
Separate nexthop objects are mutually exclusive with the legacy
multipath spec. Fix fib_nh_match to return if the config for the
to be deleted route contains a multipath spec while the fib_info
is using a nexthop object.
### Affected Products
**Linux - Linux**
Affected versions:
- 493ced1ac47c48bb86d9d4e8e87df8592be85a0e (Status: affected)
- 493ced1ac47c48bb86d9d4e8e87df8592be85a0e (Status: affected)
- 493ced1ac47c48bb86d9d4e8e87df8592be85a0e (Status: affected)
- 493ced1ac47c48bb86d9d4e8e87df8592be85a0e (Status: affected)
- 493ced1ac47c48bb86d9d4e8e87df8592be85a0e (Status: affected)
**Linux - Linux**
Affected versions:
- 5.3 (Status: affected)
- 0 (Status: unaffected)
- 5.4.226 (Status: unaffected)
- 5.10.158 (Status: unaffected)
- 5.15.82 (Status: unaffected)
- 6.0.12 (Status: unaffected)
- 6.1 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/cc3cd130ecfb8b0ae52e235e487bae3f16a24a32)
2. [](https://git.kernel.org/stable/c/0b5394229ebae09afc07aabccb5ffd705ffd250e)
3. [](https://git.kernel.org/stable/c/25174d91e4a32a24204060d283bd5fa6d0ddf133)
4. [](https://git.kernel.org/stable/c/bb20a2ae241be846bc3c11ea4b3a3c69e41d51f2)
5. [](https://git.kernel.org/stable/c/61b91eb33a69c3be11b259c5ea484505cd79f883)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-1000023, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-1000023 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000023
- **State**: PUBLISHED
- **Published Date**: February 09, 2018 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 12:33 UTC
- **Reserved Date**: January 29, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Bitpay/insight-api Insight-api version 5.0.0 and earlier contains a CWE-20: input validation vulnerability in transaction broadcast endpoint that can result in Full Path Disclosure. This attack appear to be exploitable via Web request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/bitpay/insight-api/issues/542)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-35361, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-35361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35361
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 12:17 UTC
- **Last Updated**: February 13, 2025 at 15:58 UTC
- **Reserved Date**: May 17, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MTab Bookmark v1.9.5 has an SQL injection vulnerability in /LinkStore/getIcon. An attacker can execute arbitrary SQL statements through this vulnerability without requiring any user rights.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Hebing123/cve/issues/37)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-10985, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-10985 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10985
- **State**: PUBLISHED
- **Published Date**: June 28, 2019 at 20:05 UTC
- **Last Updated**: August 04, 2024 at 22:40 UTC
- **Reserved Date**: April 08, 2019 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
In WebAccess/SCADA, Versions 8.3.5 and prior, a path traversal vulnerability is caused by a lack of proper validation of a user-supplied path prior to use in file operations. An attacker can leverage this vulnerability to delete files while posing as an administrator.
### Affected Products
**WebAccess - WebAccess/SCADA**
Affected versions:
- Versions 8.3.5 and prior (Status: affected)
### References
1. [](https://www.us-cert.gov/ics/advisories/icsa-19-178-05)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-19-622/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-48651, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-48651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48651
- **State**: PUBLISHED
- **Published Date**: November 29, 2024 at 00:00 UTC
- **Last Updated**: March 17, 2025 at 16:52 UTC
- **Reserved Date**: October 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ProFTPD through 1.3.8b before cec01cc, supplemental group inheritance grants unintended access to GID 0 because of the lack of supplemental groups from mod_sql.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/proftpd/proftpd/issues/1830)
2. [](https://github.com/proftpd/proftpd/commit/cec01cc0a2523453e5da5a486bc6d977c3768db1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2002-1143, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2002-1143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1143
- **State**: PUBLISHED
- **Published Date**: April 03, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:12 UTC
- **Reserved Date**: September 23, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Word and Excel allow remote attackers to steal sensitive information via certain field codes that insert the information when the document is returned to the attacker, as demonstrated in Word using (1) INCLUDETEXT or (2) INCLUDEPICTURE, aka "Flaw in Word Fields and Excel External Updates Could Lead to Information Disclosure."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020919 More vulnerabilities (Re: Security side-effects of Word fields)](http://marc.info/?l=bugtraq&m=103252858816401&w=2)
2. [MS02-059](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-059)
3. [5764](http://www.securityfocus.com/bid/5764)
4. [word-includetext-read-files(10008)](http://www.iss.net/security_center/static/10008.php)
5. [word-includepicture-read-files(10155)](http://www.iss.net/security_center/static/10155.php)
6. [oval:org.mitre.oval:def:202](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A202)
7. [5586](http://www.securityfocus.com/bid/5586)
8. [VU#899713](http://www.kb.cert.org/vuls/id/899713)
9. [20020826 Security side-effects of Word fields](http://marc.info/?l=bugtraq&m=103040003014999&w=2)
10. [](http://www.microsoft.com/technet/treeview/default.asp?url=/Technet/security/topics/secword.asp)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-0470, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-0470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0470
- **State**: PUBLISHED
- **Published Date**: January 29, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: January 29, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A certain ActiveX control in Comodo AntiVirus 2.0 allows remote attackers to execute arbitrary commands via the ExecuteStr method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [comodo-antivirus-command-execution(39904)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39904)
2. [27424](http://www.securityfocus.com/bid/27424)
3. [4974](https://www.exploit-db.com/exploits/4974)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-10816, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-10816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10816
- **State**: PUBLISHED
- **Published Date**: October 08, 2020 at 16:50 UTC
- **Last Updated**: August 04, 2024 at 11:14 UTC
- **Reserved Date**: March 22, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zoho ManageEngine Applications Manager 14780 and before allows a remote unauthenticated attacker to register managed servers via AAMRequestProcessor servlet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.manageengine.com/au/products/applications_manager/security-updates/security-updates-cve-2020-10816.html)
2. [](https://gitlab.com/eLeN3Re/CVE-2020-10816)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-13601, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-13601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13601
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:07 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for GalacticX, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/GalacticX)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-5388, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-5388 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5388
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 08, 2008 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-0394, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-0394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0394
- **State**: PUBLISHED
- **Published Date**: September 17, 2020 at 15:47 UTC
- **Last Updated**: August 04, 2024 at 06:02 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In onCreate of BluetoothPairingDialog.java, there is a possible tapjacking vector due to an insecure default value. This could lead to local escalation of privilege and untrusted devices accessing contact lists with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-155648639
### Affected Products
**n/a - Android**
Affected versions:
- Android-8.0 Android-8.1 Android-9 Android-10 Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-09-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-30499, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-30499 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30499
- **State**: PUBLISHED
- **Published Date**: March 29, 2024 at 14:01 UTC
- **Last Updated**: August 02, 2024 at 01:38 UTC
- **Reserved Date**: March 27, 2024 at 11:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CRM Perks CRM Perks Forms.This issue affects CRM Perks Forms: from n/a through 1.1.4.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**CRM Perks - CRM Perks Forms**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/crm-perks-forms/wordpress-crm-perks-forms-plugin-1-1-4-sql-injection-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-49620, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-49620 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49620
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 08:17 UTC
- **Last Updated**: February 13, 2025 at 17:18 UTC
- **Reserved Date**: November 28, 2023 at 07:30 UTC
- **Assigned By**: apache
### Vulnerability Description
Before DolphinScheduler version 3.1.0, the login user could delete UDF function in the resource center unauthorized (which almost used in sql task), with unauthorized access vulnerability (IDOR), but after version 3.1.0 we fixed this issue. We mark this cve as moderate level because it still requires user login to operate, please upgrade to version 3.1.0 to avoid this vulnerability
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Apache Software Foundation - Apache DolphinScheduler**
Affected versions:
- 2.0.0 (Status: affected)
### References
1. [](https://github.com/apache/dolphinscheduler/pull/10307)
2. [](https://lists.apache.org/thread/zm4t1ykj4cro1c8183q7y32z0yzfz8yj)
3. [](http://www.openwall.com/lists/oss-security/2023/11/30/4)
### Credits
- Yuanheng Lab of zhongfu
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-34310, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-34310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34310
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:57 UTC
- **Last Updated**: September 18, 2024 at 18:28 UTC
- **Reserved Date**: May 31, 2023 at 19:51 UTC
- **Assigned By**: zdi
### Vulnerability Description
Ashlar-Vellum Cobalt Uninitialized Memory Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of CO files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-19878.
### Weakness Classification (CWE)
- CWE-457: Security Weakness
### Affected Products
**Ashlar-Vellum - Cobalt**
Affected versions:
- Ashlar-Vellum Cobalt 12 beta build 1204.57 (Status: affected)
### References
1. [ZDI-23-870](https://www.zerodayinitiative.com/advisories/ZDI-23-870/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-42637, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-42637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42637
- **State**: PUBLISHED
- **Published Date**: February 02, 2022 at 17:14 UTC
- **Last Updated**: August 04, 2024 at 03:38 UTC
- **Reserved Date**: October 18, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use user-controlled input to craft a URL, resulting in a Server Side Request Forgery (SSRF) vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://printerlogic.com)
2. [](https://www.printerlogic.com/security-bulletin/)
3. [](https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/)
4. [](https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite)
5. [](https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html)
6. [](https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints)
7. [](https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-1820, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-1820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1820
- **State**: PUBLISHED
- **Published Date**: March 02, 2025 at 17:00 UTC
- **Last Updated**: March 03, 2025 at 19:02 UTC
- **Reserved Date**: March 01, 2025 at 14:36 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in zj1983 zz up to 2024-8 and classified as critical. Affected by this vulnerability is the function getOaWid of the file src/main/java/com/futvan/z/system/zworkflow/ZworkflowAction.java. The manipulation of the argument tableId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**zj1983 - zz**
Affected versions:
- 2024-8 (Status: affected)
### References
1. [VDB-298093 | zj1983 zz ZworkflowAction.java getOaWid sql injection](https://vuldb.com/?id.298093)
2. [VDB-298093 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.298093)
3. [Submit #504478 | https://gitee.com/zj1983/zz zz 2024-8 SQL Injection](https://vuldb.com/?submit.504478)
4. [](https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_SQL%E6%B3%A8%E5%85%A51.md)
### Credits
- Caigo (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-5902, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-5902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5902
- **State**: PUBLISHED
- **Published Date**: November 17, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 21:21 UTC
- **Reserved Date**: November 17, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in ptk/lib/modal_bookmark.php in DFLabs PTK 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the arg4 parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/files/111360/PTK-1.0.5-Cross-Site-Scripting-Unrestricted-Access.html)
2. [52817](http://www.securityfocus.com/bid/52817)
3. [ptk-modalbookmark-xss(74492)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74492)
4. [80774](http://osvdb.org/80774)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-4940, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-4940 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4940
- **State**: PUBLISHED
- **Published Date**: June 22, 2024 at 05:23 UTC
- **Last Updated**: August 01, 2024 at 20:55 UTC
- **Reserved Date**: May 15, 2024 at 13:52 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
An open redirect vulnerability exists in the gradio-app/gradio, affecting the latest version. The vulnerability allows an attacker to redirect users to arbitrary websites, which can be exploited for phishing attacks, Cross-site Scripting (XSS), Server-Side Request Forgery (SSRF), amongst others. This issue is due to improper validation of user-supplied input in the handling of URLs. Attackers can exploit this vulnerability by crafting a malicious URL that, when processed by the application, redirects the user to an attacker-controlled web page.
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**gradio-app - gradio-app/gradio**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/35aaea93-6895-4f03-9c1b-cd992665aa60)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-0862, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-0862 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0862
- **State**: PUBLISHED
- **Published Date**: November 23, 2013 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 14:41 UTC
- **Reserved Date**: January 07, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Multiple integer overflows in the process_frame_obj function in libavcodec/sanm.c in FFmpeg before 1.1.2 allow remote attackers to have an unspecified impact via crafted image dimensions in LucasArts Smush video data, which triggers an out-of-bounds array access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=f4fb841ad13bab66d4fb0c7ff2a94770df7815d8)
2. [](http://www.ffmpeg.org/security.html)
3. [GLSA-201603-06](https://security.gentoo.org/glsa/201603-06)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-3573, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-3573 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3573
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 19:00 UTC
- **Last Updated**: October 07, 2024 at 16:10 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: OPERA Printing). Supported versions that are affected are 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x and 5.5.1.x. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality OPERA 5 Property Services, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality OPERA 5 Property Services accessible data as well as unauthorized read access to a subset of Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - Hospitality OPERA 5 Property Services**
Affected versions:
- 5.4.0.x (Status: affected)
- 5.4.1.x (Status: affected)
- 5.4.2.x (Status: affected)
- 5.4.3.x (Status: affected)
- 5.5.0.x (Status: affected)
- 5.5.1.x (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html)
2. [97868](http://www.securityfocus.com/bid/97868)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-7451, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-7451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7451
- **State**: PUBLISHED
- **Published Date**: April 28, 2020 at 19:11 UTC
- **Last Updated**: August 04, 2024 at 09:25 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: freebsd
### Vulnerability Description
In FreeBSD 12.1-STABLE before r358739, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r358740, and 11.3-RELEASE before 11.3-RELEASE-p7, a TCP SYN-ACK or challenge TCP-ACK segment over IPv6 that is transmitted or retransmitted does not properly initialize the Traffic Class field disclosing one byte of kernel memory over the network.
### Affected Products
**n/a - FreeBSD**
Affected versions:
- 12.1-STABLE before r358739, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r358740, 11.3-RELEASE before 11.3-RELEASE-p7 (Status: affected)
### References
1. [](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:04.tcp.asc)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-6413, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-6413 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6413
- **State**: PUBLISHED
- **Published Date**: September 24, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 01:29 UTC
- **Reserved Date**: July 26, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The installation procedure on Cisco Application Policy Infrastructure Controller (APIC) devices 1.3(2f) mishandles binary files, which allows local users to obtain root access via unspecified vectors, aka Bug ID CSCva50496.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20160921 Cisco Application Policy Infrastructure Controller Binary Privilege Escalation Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-apic)
2. [1036872](http://www.securitytracker.com/id/1036872)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-16152, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-16152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16152
- **State**: PUBLISHED
- **Published Date**: February 06, 2020 at 15:27 UTC
- **Last Updated**: October 25, 2024 at 14:03 UTC
- **Reserved Date**: September 09, 2019 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A Denial of service (DoS) vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to cause FortiClient processes running under root privilege crashes via sending specially crafted IPC client requests to the fctsched process due the nanomsg not been correctly validated.
### Affected Products
**Fortinet - Fortinet FortiClientLinux**
Affected versions:
- FortiClientLinux 6.2.1 and below (Status: affected)
### References
1. [](https://fortiguard.com/psirt/FG-IR-19-238)
2. [](https://danishcyberdefence.dk/blog/forticlient_linux)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-21319, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-21319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21319
- **State**: PUBLISHED
- **Published Date**: October 25, 2021 at 16:00 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Galette is a membership management web application geared towards non profit organizations. In versions prior to 0.9.5, malicious javascript code can be stored to be displayed later on self subscription page. The self subscription feature can be disabled as a workaround (this is the default state). Malicious javascript code can be executed (not stored) on login and retrieve password pages. This issue is patched in version 0.9.5.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**galette - galette**
Affected versions:
- < 0.9.5 (Status: affected)
### References
1. [](https://github.com/galette/galette/security/advisories/GHSA-vjc9-mj44-x59q)
2. [](https://github.com/galette/galette/commit/514418da973ae5b84bf97f94bd288a41e8e3f0a6)
3. [](https://github.com/galette/galette/commit/8f3bdd9f7d0708466e011253064a867ca2b271a5)
4. [](https://github.com/galette/galette/commit/f54b2570615d38d0302e937079233e52c2d80995)
5. [](https://bugs.galette.eu/issues/1535)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-4088, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-4088 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4088
- **State**: PUBLISHED
- **Published Date**: February 21, 2020 at 15:48 UTC
- **Last Updated**: August 06, 2024 at 16:30 UTC
- **Reserved Date**: June 10, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Kernel/Modules/AgentTicketWatcher.pm in Open Ticket Request System (OTRS) 3.0.x before 3.0.21, 3.1.x before 3.1.17, and 3.2.x before 3.2.8 does not properly restrict tickets, which allows remote attackers with a valid agent login to read restricted tickets via a crafted URL involving the ticket split mechanism.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://archives.neohapsis.com/archives/bugtraq/2013-07/0015.html)
2. [](http://advisories.mageia.org/MGASA-2013-0196.html)
3. [](https://www.securityfocus.com/bid/60688/discuss)
4. [](https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-4088)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-4485, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-4485 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4485
- **State**: PUBLISHED
- **Published Date**: August 31, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 19:14 UTC
- **Reserved Date**: August 31, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The stripos function in PHP before 5.1.5 has unknown impact and attack vectors related to an out-of-bounds read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1016984](http://securitytracker.com/id?1016984)
2. [](http://www.php.net/release_5_1_5.php)
3. [RHSA-2006:0688](http://rhn.redhat.com/errata/RHSA-2006-0688.html)
4. [USN-362-1](http://www.ubuntu.com/usn/usn-362-1)
5. [MDKSA-2006:162](http://www.mandriva.com/security/advisories?name=MDKSA-2006:162)
6. [19582](http://www.securityfocus.com/bid/19582)
7. [22538](http://secunia.com/advisories/22538)
8. [21546](http://secunia.com/advisories/21546)
9. [ADV-2006-3318](http://www.vupen.com/english/advisories/2006/3318)
10. [](http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm)
11. [22331](http://secunia.com/advisories/22331)
12. [21842](http://secunia.com/advisories/21842)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-13739, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-13739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13739
- **State**: REJECTED
- **Published Date**: January 14, 2022 at 17:27 UTC
- **Last Updated**: January 14, 2022 at 17:27 UTC
- **Reserved Date**: June 01, 2020 at 00:00 UTC
- **Assigned By**: SWI
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-30432, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-30432 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30432
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 22:22 UTC
- **Last Updated**: April 03, 2025 at 20:13 UTC
- **Reserved Date**: March 22, 2025 at 00:04 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved state management. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sonoma 14.7.5. A malicious app may be able to attempt passcode entries on a locked device and thereby cause escalating time delays after 4 failures.
### Affected Products
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - visionOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122377)
2. [](https://support.apple.com/en-us/122371)
3. [](https://support.apple.com/en-us/122372)
4. [](https://support.apple.com/en-us/122378)
5. [](https://support.apple.com/en-us/122374)
6. [](https://support.apple.com/en-us/122375)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-36386, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-36386 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36386
- **State**: PUBLISHED
- **Published Date**: September 21, 2022 at 19:02 UTC
- **Last Updated**: February 20, 2025 at 20:05 UTC
- **Reserved Date**: July 22, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authenticated Arbitrary Code Execution vulnerability in Soflyy Import any XML or CSV File to WordPress plugin <= 3.6.7 at WordPress.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Affected Products
**Soflyy - Import any XML or CSV File to WordPress (WordPress plugin)**
Affected versions:
- <= 3.6.7 (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-all-import/wordpress-import-any-xml-or-csv-file-to-wordpress-plugin-3-6-7-authenticated-arbitrary-code-execution-vulnerability)
2. [](https://wordpress.org/plugins/wp-all-import/#developers)
### Credits
- Vulnerability discovered by Universe (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-1770, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-1770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1770
- **State**: PUBLISHED
- **Published Date**: April 02, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 15:13 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in views_view.php in Ganglia Web 3.5.7 allows remote attackers to inject arbitrary web script or HTML via the view_name parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20130226 Re: CVE request: XSS flaws fixed in ganglia](http://www.openwall.com/lists/oss-security/2013/02/26/11)
2. [](https://github.com/ganglia/ganglia-web/commit/552965f33bf79d41ccbec3f1f26840c8bab54ad6)
3. [ganglia-viewsview-xss(82468)](https://exchange.xforce.ibmcloud.com/vulnerabilities/82468)
4. [[oss-security] 20130221 Re: CVE request: XSS flaws fixed in ganglia](http://www.openwall.com/lists/oss-security/2013/02/21/12)
5. [52673](http://secunia.com/advisories/52673)
6. [](https://github.com/ganglia/ganglia-web/issues/160)
7. [](https://bugzilla.redhat.com/show_bug.cgi?id=892823)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-0243, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-0243 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0243
- **State**: PUBLISHED
- **Published Date**: January 08, 2019 at 20:00 UTC
- **Last Updated**: August 04, 2024 at 17:44 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Under some circumstances, masterdata maintenance in SAP BW/4HANA (fixed in DW4CORE version 1.0 (SP08)) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
### Affected Products
**SAP SE - SAP BW/4HANA (DW4CORE)**
Affected versions:
- < 1.0 (SP08) (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/2727623)
2. [106467](http://www.securityfocus.com/bid/106467)
3. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-5652, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-5652 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5652
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 17:07 UTC
- **Last Updated**: March 19, 2025 at 15:47 UTC
- **Reserved Date**: June 05, 2024 at 10:54 UTC
- **Assigned By**: Docker
### Vulnerability Description
In Docker Desktop on Windows before v4.31.0 allows a user in the docker-users group to cause a Windows Denial-of-Service through the exec-path Docker daemon config option in Windows containers mode.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H`
### Affected Products
**Docker Inc. - Docker Desktop**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://docs.docker.com/desktop/release-notes/#4310)
### Credits
- Hashim Jawad ( @ihack4falafel)
- Trend Micro Zero Day Initiative
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-4610, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-4610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4610
- **State**: PUBLISHED
- **Published Date**: October 31, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 20:42 UTC
- **Reserved Date**: August 24, 2012 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
EMC Avamar Client for VMware 6.1 stores the cleartext server root password on the proxy client, which might allow remote attackers to obtain sensitive information by leveraging "network access" to the proxy client.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [avamar-proxy-client-info-disc(79661)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79661)
2. [56317](http://www.securityfocus.com/bid/56317)
3. [20121026 EMC Avamar Client for VMware Sensitive Information Disclosure Vulnerability](http://www.securityfocus.com/archive/1/524532)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-0732, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-0732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0732
- **State**: PUBLISHED
- **Published Date**: January 27, 2025 at 18:00 UTC
- **Last Updated**: January 27, 2025 at 20:03 UTC
- **Reserved Date**: January 27, 2025 at 10:45 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in Discord up to 1.0.9177 on Windows. Affected by this issue is some unknown functionality in the library profapi.dll. The manipulation leads to untrusted search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 4.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-426: Security Weakness
### Affected Products
**n/a - Discord**
Affected versions:
- 1.0.9177 (Status: affected)
### References
1. [VDB-293510 | Discord profapi.dll untrusted search path](https://vuldb.com/?id.293510)
2. [VDB-293510 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.293510)
3. [Submit #481209 | Discord stable 358789 (c70705e) OS Command Injection](https://vuldb.com/?submit.481209)
### Credits
- Havook (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-43925, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-43925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43925
- **State**: PUBLISHED
- **Published Date**: February 07, 2022 at 02:15 UTC
- **Last Updated**: September 17, 2024 at 03:22 UTC
- **Reserved Date**: November 16, 2021 at 00:00 UTC
- **Assigned By**: synology
### Vulnerability Description
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in Log Management functionality in Synology DiskStation Manager (DSM) before 7.0.1-42218-2 allows remote attackers to inject SQL commands via unspecified vectors.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Synology - DiskStation Manager (DSM)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.synology.com/security/advisory/Synology_SA_22_01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-28333, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-28333 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28333
- **State**: PUBLISHED
- **Published Date**: March 23, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 12:38 UTC
- **Reserved Date**: March 14, 2023 at 00:00 UTC
- **Assigned By**: fedora
### Vulnerability Description
The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**Unknown - Unknown**
Affected versions:
- 4.1.0 (Status: affected)
- 4.0.0 (Status: affected)
- 3.11.0 (Status: affected)
- 0 (Status: affected)
### References
1. [RHBZ#2179422](https://bugzilla.redhat.com/show_bug.cgi?id=2179422)
2. [FEDORA-2023-d9c13996b2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/)
3. [](https://moodle.org/mod/forum/discuss.php?d=445065)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-11704, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-11704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11704
- **State**: PUBLISHED
- **Published Date**: April 12, 2020 at 02:43 UTC
- **Last Updated**: August 04, 2024 at 11:35 UTC
- **Reserved Date**: April 12, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in ProVide (formerly zFTPServer) through 13.1. The Admin Web Interface has Multiple Stored and Reflected XSS. GetInheritedProperties is Reflected via the groups parameter. GetUserInfo is Reflected via POST data. SetUserInfo is Stored via the general parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.provideserver.com/security/)
2. [](https://github.com/belong2yourself/vulnerabilities/tree/master/ProVide/Web%20Admin%20Interface%20-%20Multiple%20Cross-Site-Scripting)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-49943, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-49943 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49943
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 18:02 UTC
- **Last Updated**: May 04, 2025 at 09:41 UTC
- **Reserved Date**: October 21, 2024 at 12:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/guc_submit: add missing locking in wedged_fini
Any non-wedged queue can have a zero refcount here and can be running
concurrently with an async queue destroy, therefore dereferencing the
queue ptr to check wedge status after the lookup can trigger UAF if
queue is not wedged. Fix this by keeping the submission_state lock held
around the check to postpone the free and make the check safe, before
dropping again around the put() to avoid the deadlock.
(cherry picked from commit d28af0b6b9580b9f90c265a7da0315b0ad20bbfd)
### Affected Products
**Linux - Linux**
Affected versions:
- 8ed9aaae39f39130b7a3eb2726be05d7f64b344c (Status: affected)
- 8ed9aaae39f39130b7a3eb2726be05d7f64b344c (Status: affected)
**Linux - Linux**
Affected versions:
- 6.11 (Status: affected)
- 0 (Status: unaffected)
- 6.11.3 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/d88f9bab7e62dd0dbe983fa70cf040042a60cc84)
2. [](https://git.kernel.org/stable/c/790533e44bfc7af929842fccd9674c9f424d4627)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-3340, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-3340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3340
- **State**: PUBLISHED
- **Published Date**: July 03, 2006 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: July 03, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in Pearl For Mambo module 1.6 for Mambo, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via the (1) phpbb_root_path parameter in (a) includes/functions_cms.php and the (2) GlobalSettings[templatesDirectory] parameter in multiple files in the "includes" directory including (b) adminSensored.php, (c) adminBoards.php, (d) adminAttachments.php, (e) adminAvatars.php, (f) adminBackupdatabase.php, (g) adminBanned.php, (h) adminForums.php, (i) adminPolls.php, (j) adminSmileys.php, (k) poll.php, and (l) move.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27169](http://www.osvdb.org/27169)
2. [27171](http://www.osvdb.org/27171)
3. [1956](https://www.exploit-db.com/exploits/1956)
4. [27173](http://www.osvdb.org/27173)
5. [27175](http://www.osvdb.org/27175)
6. [27168](http://www.osvdb.org/27168)
7. [27170](http://www.osvdb.org/27170)
8. [27174](http://www.osvdb.org/27174)
9. [18690](http://www.securityfocus.com/bid/18690)
10. [27177](http://www.osvdb.org/27177)
11. [27172](http://www.osvdb.org/27172)
12. [20819](http://secunia.com/advisories/20819)
13. [27178](http://www.osvdb.org/27178)
14. [ADV-2006-2561](http://www.vupen.com/english/advisories/2006/2561)
15. [27176](http://www.osvdb.org/27176)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-11697, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-11697 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11697
- **State**: PUBLISHED
- **Published Date**: July 23, 2019 at 13:22 UTC
- **Last Updated**: August 04, 2024 at 23:03 UTC
- **Reserved Date**: May 03, 2019 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
If the ALT and "a" keys are pressed when users receive an extension installation prompt, the extension will be installed without the install prompt delay that keeps the prompt visible in order for users to accept or decline the installation. A malicious web page could use this with spoofing on the page to trick users into installing a malicious extension. This vulnerability affects Firefox < 67.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2019-13/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1440079)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-6220, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-6220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6220
- **State**: PUBLISHED
- **Published Date**: December 04, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 15:54 UTC
- **Reserved Date**: December 04, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
typespeed before 0.6.4 allows remote attackers to cause a denial of service (application crash) via unspecified network behavior that triggers a divide-by-zero error.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26671](http://www.securityfocus.com/bid/26671)
2. [27905](http://secunia.com/advisories/27905)
3. [typespeed-packet-dos(38807)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38807)
4. [](http://tobias.eyedacor.org/typespeed/#News)
5. [](http://tobias.eyedacor.org/typespeed/ChangeLog)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-41918, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-41918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41918
- **State**: PUBLISHED
- **Published Date**: October 08, 2021 at 15:35 UTC
- **Last Updated**: August 04, 2024 at 03:22 UTC
- **Reserved Date**: October 04, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
webTareas version 2.4 and earlier allows an authenticated user to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and achieve a Reflected Cross-Site Scripting attack against the platform users and administrators. The issue affects every endpoint on the application because it is related on how each URL is echoed back on every response page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-2197, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-2197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2197
- **State**: PUBLISHED
- **Published Date**: March 19, 2024 at 23:46 UTC
- **Last Updated**: August 01, 2024 at 19:03 UTC
- **Reserved Date**: March 05, 2024 at 17:22 UTC
- **Assigned By**: icscert
### Vulnerability Description
The Chirp Access app contains a hard-coded password, BEACON_PASSWORD. An attacker within Bluetooth range could change configuration settings within the Bluetooth beacon, effectively disabling the application's ability to notify users when they are near a Beacon-enabled access point. This variable cannot be used to change the configuration settings of the door readers or locksets and does not affect the ability for authorized users of the mobile application to lock or unlock access points.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-259: Security Weakness
### Affected Products
**Chirp Systems - Chirp Access**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-067-01)
2. [](https://statement.chirpsystems.com/chirp-systems-icsa-24-067-01-response.html)
### Credits
- Matt Brown reported this vulnerability to CISA.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-12913, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-12913 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12913
- **State**: PUBLISHED
- **Published Date**: June 27, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:45 UTC
- **Reserved Date**: June 27, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Miniz 2.0.7, tinfl_decompress in miniz_tinfl.c has an infinite loop because sym2 and counter can both remain equal to zero.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/richgel999/miniz/issues/90)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-20703, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-20703 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20703
- **State**: PUBLISHED
- **Published Date**: May 15, 2023 at 00:00 UTC
- **Last Updated**: January 24, 2025 at 16:32 UTC
- **Reserved Date**: October 28, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767853; Issue ID: ALPS07767853.
### Affected Products
**MediaTek, Inc. - MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT8183, MT8195**
Affected versions:
- Android 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/May-2023)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-23887, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-23887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23887
- **State**: PUBLISHED
- **Published Date**: January 28, 2022 at 20:44 UTC
- **Last Updated**: August 03, 2024 at 03:59 UTC
- **Reserved Date**: January 24, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily delete user accounts via /admin/admin_manage/delete.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yzmcms/yzmcms/issues/59)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-44543, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-44543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44543
- **State**: PUBLISHED
- **Published Date**: December 12, 2023 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 13:54 UTC
- **Reserved Date**: November 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The femanager extension before 5.5.2, 6.x before 6.3.3, and 7.x before 7.0.1 for TYPO3 allows creation of frontend users in restricted groups (if there is a usergroup field on the registration form). This occurs because the usergroup.inList protection mechanism is mishandled.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://typo3.org/help/security-advisories)
2. [](https://typo3.org/security/advisory/typo3-ext-sa-2022-015)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-1725, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-1725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1725
- **State**: PUBLISHED
- **Published Date**: May 05, 2010 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 01:35 UTC
- **Reserved Date**: May 05, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in offers_buy.php in Alibaba Clone Platinum allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/1004-exploits/alibabacloneplatinum-sql.txt)
2. [12468](http://www.exploit-db.com/exploits/12468)
3. [alibabacloneplatinum-id-sql-injection(58262)](https://exchange.xforce.ibmcloud.com/vulnerabilities/58262)
4. [39846](http://www.securityfocus.com/bid/39846)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-39073, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-39073 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39073
- **State**: PUBLISHED
- **Published Date**: January 06, 2023 at 00:00 UTC
- **Last Updated**: April 10, 2025 at 13:46 UTC
- **Reserved Date**: August 31, 2022 at 00:00 UTC
- **Assigned By**: zte
### Vulnerability Description
There is a command injection vulnerability in ZTE MF286R, Due to insufficient validation of the input parameters, an attacker could use the vulnerability to execute arbitrary commands.
### Affected Products
**n/a - MF286R**
Affected versions:
- Nordic_MF286R_B06, (Status: affected)
### References
1. [](https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1028664)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-1328, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-1328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1328
- **State**: PUBLISHED
- **Published Date**: April 27, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:44 UTC
- **Reserved Date**: April 27, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OneWorldStore allows remote attackers to cause a denial of service (application crash) via a direct request to owConnections/chksettings.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1013782](http://securitytracker.com/id?1013782)
2. [13322](http://www.securityfocus.com/bid/13322)
3. [15724](http://www.osvdb.org/15724)
4. [15057](http://secunia.com/advisories/15057)
5. [](http://www.oneworldstore.com/support_security_issue_updates.asp#April_20_2005_Lostmon)
6. [](http://lostmon.blogspot.com/2005/04/oneworldstore-critical-failure.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-21772, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-21772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21772
- **State**: PUBLISHED
- **Published Date**: May 16, 2024 at 20:47 UTC
- **Last Updated**: August 21, 2024 at 15:01 UTC
- **Reserved Date**: January 02, 2024 at 16:55 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled search path in some Intel(R) Advisor software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**n/a - Intel(R) Advisor software**
Affected versions:
- before version 2024.0 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01047.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01047.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-3718, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-3718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3718
- **State**: PUBLISHED
- **Published Date**: February 10, 2011 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 03:18 UTC
- **Reserved Date**: October 01, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [46177](http://www.securityfocus.com/bid/46177)
2. [oval:org.mitre.oval:def:13969](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13969)
3. [20110205 [SECURITY] CVE-2010-3718 Apache Tomcat Local bypass of security manger file permissions](http://www.securityfocus.com/archive/1/516211/100/0/threaded)
4. [8072](http://securityreason.com/securityalert/8072)
5. [](http://tomcat.apache.org/security-6.html)
6. [HPSBUX02860](http://marc.info/?l=bugtraq&m=136485229118404&w=2)
7. [45022](http://secunia.com/advisories/45022)
8. [RHSA-2011:1845](http://www.redhat.com/support/errata/RHSA-2011-1845.html)
9. [SUSE-SR:2011:005](http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html)
10. [SSRT100627](http://marc.info/?l=bugtraq&m=132215163318824&w=2)
11. [tomcat-servletcontect-sec-bypass(65159)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65159)
12. [APPLE-SA-2011-10-12-3](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html)
13. [MDVSA-2011:030](http://www.mandriva.com/security/advisories?name=MDVSA-2011:030)
14. [oval:org.mitre.oval:def:19379](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19379)
15. [RHSA-2011:0897](http://www.redhat.com/support/errata/RHSA-2011-0897.html)
16. [57126](http://secunia.com/advisories/57126)
17. [RHSA-2011:0791](http://www.redhat.com/support/errata/RHSA-2011-0791.html)
18. [43192](http://secunia.com/advisories/43192)
19. [RHSA-2011:0896](http://www.redhat.com/support/errata/RHSA-2011-0896.html)
20. [DSA-2160](http://www.debian.org/security/2011/dsa-2160)
21. [1025025](http://www.securitytracker.com/id?1025025)
22. [](http://support.apple.com/kb/HT5002)
23. [HPSBUX02725](http://marc.info/?l=bugtraq&m=132215163318824&w=2)
24. [SSRT101146](http://marc.info/?l=bugtraq&m=136485229118404&w=2)
25. [](http://tomcat.apache.org/security-5.html)
26. [oval:org.mitre.oval:def:12517](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12517)
27. [HPSBUX02645](http://marc.info/?l=bugtraq&m=130168502603566&w=2)
28. [HPSBST02955](http://marc.info/?l=bugtraq&m=139344343412337&w=2)
29. [](http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html)
30. [](http://tomcat.apache.org/security-7.html)
31. [[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E)
32. [[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E)
33. [[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E)
34. [[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-3315, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-3315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3315
- **State**: PUBLISHED
- **Published Date**: October 30, 2005 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 23:10 UTC
- **Reserved Date**: October 26, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Novell ZENworks Patch Management 6.x before 6.2.2.181 allow remote attackers to execute arbitrary SQL commands via the (1) Direction parameter to computers/default.asp, and the (2) SearchText, (3) StatusFilter, and (4) computerFilter parameters to reports/default.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.novell.com/cgi-bin/search/searchtid.cgi?10099318.htm)
2. [124](http://securityreason.com/securityalert/124)
3. [1015116](http://securitytracker.com/id?1015116)
4. [20363](http://www.osvdb.org/20363)
5. [VU#536300](http://www.kb.cert.org/vuls/id/536300)
6. [17358](http://secunia.com/advisories/17358)
7. [20362](http://www.osvdb.org/20362)
8. [20051027 [CIRT.DK] - Novell ZENworks Patch Management Server 6.0.0.52 - SQL injection](http://www.securityfocus.com/archive/1/414880)
9. [15220](http://www.securityfocus.com/bid/15220)
10. [ADV-2005-2238](http://www.vupen.com/english/advisories/2005/2238)
11. [](http://cirt.dk/advisories/cirt-39-advisory.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-38002, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-38002 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-38002
- **State**: PUBLISHED
- **Published Date**: June 06, 2025 at 13:43 UTC
- **Last Updated**: June 06, 2025 at 13:43 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
io_uring/fdinfo: grab ctx->uring_lock around io_uring_show_fdinfo()
Not everything requires locking in there, which is why the 'has_lock'
variable exists. But enough does that it's a bit unwieldy to manage.
Wrap the whole thing in a ->uring_lock trylock, and just return
with no output if we fail to grab it. The existing trylock() will
already have greatly diminished utility/output for the failure case.
This fixes an issue with reading the SQE fields, if the ring is being
actively resized at the same time.
### Affected Products
**Linux - Linux**
Affected versions:
- 79cfe9e59c2a12c3b3faeeefe38d23f3d8030972 (Status: affected)
- 79cfe9e59c2a12c3b3faeeefe38d23f3d8030972 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.13 (Status: affected)
- 0 (Status: unaffected)
- 6.14.8 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/bdb7d2ec2e31c46c45d1f32667dfa8216a72705e)
2. [](https://git.kernel.org/stable/c/d871198ee431d90f5308d53998c1ba1d5db5619a)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-3180, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-3180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3180
- **State**: PUBLISHED
- **Published Date**: April 16, 2014 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 23:22 UTC
- **Reserved Date**: August 19, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20111102 kiwi shell meta char injection](http://www.openwall.com/lists/oss-security/2011/11/02/4)
2. [](https://github.com/openSUSE/kiwi/commit/f0f74b3f6ac6d47f7919aa9db380c0ad41ffe55f#)
3. [SUSE-SU-2011:1324](http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00015.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-43286, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-43286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43286
- **State**: PUBLISHED
- **Published Date**: October 28, 2022 at 00:00 UTC
- **Last Updated**: May 07, 2025 at 14:00 UTC
- **Reserved Date**: October 17, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nginx NJS v0.7.2 was discovered to contain a heap-use-after-free bug caused by illegal memory copy in the function njs_json_parse_iterator_call at njs_json.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nginx/njs/issues/480)
2. [](https://github.com/nginx/njs/commit/2ad0ea24a58d570634e09c2e58c3b314505eaa6a)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-8673, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-8673 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8673
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows (Microsoft Store)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT210346)
2. [](https://support.apple.com/HT210348)
3. [](https://support.apple.com/HT210351)
4. [](https://support.apple.com/HT210355)
5. [](https://support.apple.com/HT210356)
6. [](https://support.apple.com/HT210357)
7. [](https://support.apple.com/HT210358)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-41210, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-41210 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41210
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:12 UTC
- **Last Updated**: August 02, 2024 at 18:54 UTC
- **Reserved Date**: August 24, 2023 at 19:16 UTC
- **Assigned By**: zdi
### Vulnerability Description
D-Link DAP-1325 SetHostIPv6StaticSettings StaticDNS2 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1325 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of XML data provided to the HNAP1 SOAP endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18836.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**D-Link - DAP-1325**
Affected versions:
- 1.07b01 (Status: affected)
### References
1. [ZDI-23-1318](https://www.zerodayinitiative.com/advisories/ZDI-23-1318/)
2. [vendor-provided URL](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10351)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-20860, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-20860 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20860
- **State**: PUBLISHED
- **Published Date**: May 07, 2024 at 04:28 UTC
- **Last Updated**: August 01, 2024 at 22:06 UTC
- **Reserved Date**: December 05, 2023 at 04:57 UTC
- **Assigned By**: SamsungMobile
### Vulnerability Description
Improper export of android application components vulnerability in TelephonyUI prior to SMR May-2024 Release 1 allows local attackers to reboot the device without proper permission.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR May-2024 Release in Android 14 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=05)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-0559, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-0559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0559
- **State**: PUBLISHED
- **Published Date**: February 16, 2022 at 10:15 UTC
- **Last Updated**: August 02, 2024 at 23:32 UTC
- **Reserved Date**: February 10, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**radareorg - radareorg/radare2**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e)
2. [](https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e)
3. [FEDORA-2022-7db9e7bb5b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/)
4. [FEDORA-2022-85b277e748](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-14013, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-14013 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14013
- **State**: PUBLISHED
- **Published Date**: October 17, 2017 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 19:13 UTC
- **Reserved Date**: August 30, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
A Client-Side Enforcement of Server-Side Security issue was discovered in ProMinent MultiFLEX M10a Controller web interface. The log out function in the application removes the user's session only on the client side. This may allow an attacker to bypass protection mechanisms, gain privileges, or assume the identity of an authenticated user.
### Weakness Classification (CWE)
- CWE-602: Security Weakness
### Affected Products
**n/a - ProMinent MultiFLEX M10a Controller**
Affected versions:
- ProMinent MultiFLEX M10a Controller (Status: affected)
### References
1. [101259](http://www.securityfocus.com/bid/101259)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-285-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-1116, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-1116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1116
- **State**: PUBLISHED
- **Published Date**: June 25, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:44 UTC
- **Reserved Date**: March 15, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Identix BioLogon 2.03 and earlier does not lock secondary displays on a multi-monitor system running Windows 98 or ME, which allows an attacker with physical access to the system to bypass authentication through a secondary display.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [identix-biologon-auth-bypass(6948)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6948)
2. [20010802 Identix BioLogon Client security bug](http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=IND0108&L=NTBUGTRAQ&F=P&S=&P=71)
3. [5453](http://www.osvdb.org/5453)
4. [3140](http://www.securityfocus.com/bid/3140)
5. [20010808 Response to Identix BioLogon Client security bug](http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=ind0108&L=ntbugtraq&F=P&S=&P=724)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-5439, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-5439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5439
- **State**: PUBLISHED
- **Published Date**: October 31, 2023 at 08:32 UTC
- **Last Updated**: February 05, 2025 at 18:53 UTC
- **Reserved Date**: October 05, 2023 at 19:18 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Wp photo text slider 50 plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 8.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**gopiplus - Wp photo text slider 50**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/515502b5-c344-4855-aff1-57833233c5d2?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/wp-photo-text-slider-50/trunk/wp-photo-text-slider-50.php?rev=2827206#L196)
3. [](https://plugins.trac.wordpress.org/changeset/2985502/wp-photo-text-slider-50#file1)
### Credits
- Lana Codes
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-9961, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-9961 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9961
- **State**: PUBLISHED
- **Published Date**: March 26, 2019 at 18:45 UTC
- **Last Updated**: August 04, 2024 at 22:10 UTC
- **Reserved Date**: March 23, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in ressource view in core/modules/resource/RESOURCEVIEW.php in Wikindx prior to version 5.7.0 allows remote attackers to inject arbitrary web script or HTML via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/wikindx/code/2624/)
2. [](https://sourceforge.net/p/wikindx/code/2656/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-25050, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-25050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25050
- **State**: PUBLISHED
- **Published Date**: March 01, 2022 at 23:46 UTC
- **Last Updated**: August 03, 2024 at 04:29 UTC
- **Reserved Date**: February 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
rtl_433 21.12 was discovered to contain a stack overflow in the function somfy_iohc_decode(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://huntr.dev/bounties/6c9cd35f-a206-4fdf-b6d1-fcd50926c2d9/)
2. [](https://github.com/merbanan/rtl_433/issues/1960)
3. [](https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-1383, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-1383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1383
- **State**: PUBLISHED
- **Published Date**: February 02, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 04:40 UTC
- **Reserved Date**: January 27, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the geo search widget in the Geo Mashup plugin before 1.8.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the search key.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150128 Wordpress Geo Mashup plugin <= 1.8.2 XSS vulnerability](http://seclists.org/fulldisclosure/2015/Jan/113)
2. [](https://wordpress.org/plugins/geo-mashup/changelog/)
3. [[oss-security] 20150127 Re: CVE request: XSS in search functionality for Geo Mashup Wordpress plugin](http://www.openwall.com/lists/oss-security/2015/01/27/26)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-37737, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-37737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37737
- **State**: PUBLISHED
- **Published Date**: October 15, 2021 at 12:31 UTC
- **Last Updated**: August 04, 2024 at 01:30 UTC
- **Reserved Date**: July 29, 2021 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A remote SQL injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.
### Affected Products
**n/a - Aruba ClearPass Policy Manager**
Affected versions:
- ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1 (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-21811, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-21811 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21811
- **State**: PUBLISHED
- **Published Date**: February 14, 2023 at 19:33 UTC
- **Last Updated**: January 01, 2025 at 00:41 UTC
- **Reserved Date**: December 16, 2022 at 22:13 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows iSCSI Service Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows iSCSI Service Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21811)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-45599, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-45599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45599
- **State**: PUBLISHED
- **Published Date**: September 24, 2024 at 18:02 UTC
- **Last Updated**: September 24, 2024 at 18:35 UTC
- **Reserved Date**: September 02, 2024 at 16:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Cursor is an artificial intelligence code editor. Prior to version 0.41.0, if a user on macOS has granted Cursor access to the camera or microphone, any program that is run on the machine is able to access the camera or the microphone without explicitly being granted access, through a DyLib Injection using DYLD_INSERT_LIBRARIES environment variable. The usage of `com.apple.security.cs.allow-dyld-environment-variables` and `com.apple.security.cs.disable-library-validation` allows an external dynamic library to be injected into the application using DYLD_INSERT_LIBRARIES environment variable.
Moreover, the entitlement `com.apple.security.device.camera` allows the application to use the host camera and `com.apple.security.device.audio-input` allows the application to use the microphone. This means that untrusted code that is executed on the user's machine can access the camera or the microphone, if the user has already given permission for Cursor to do so. In version 0.41.0, the entitlements have been split by process: the main process gets the camera and microphone entitlements, but not the DyLib entitlements, whereas the extension host process gets the DyLib entitlements but not the camera or microphone entitlements. As a workaround, do not explicitly give Cursor the permission to access the camera or microphone if untrusted users can run arbitrary commands on the affected machine.
### CVSS Metrics
- **CVSS Base Score**: 3.8/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-277: Security Weakness
### Affected Products
**getcursor - cursor**
Affected versions:
- < 0.41.0 (Status: affected)
### References
1. [https://github.com/getcursor/cursor/security/advisories/GHSA-x352-xv29-r74m](https://github.com/getcursor/cursor/security/advisories/GHSA-x352-xv29-r74m)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-0837, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-0837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0837
- **State**: PUBLISHED
- **Published Date**: April 01, 2010 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 00:59 UTC
- **Reserved Date**: March 03, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Pack200 component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2010-05-18-1](http://lists.apple.com/archives/security-announce/2010//May/msg00001.html)
2. [HPSBMU02799](http://marc.info/?l=bugtraq&m=134254866602253&w=2)
3. [39317](http://secunia.com/advisories/39317)
4. [RHSA-2010:0383](http://www.redhat.com/support/errata/RHSA-2010-0383.html)
5. [40545](http://secunia.com/advisories/40545)
6. [ADV-2010-1454](http://www.vupen.com/english/advisories/2010/1454)
7. [39819](http://secunia.com/advisories/39819)
8. [ADV-2010-1107](http://www.vupen.com/english/advisories/2010/1107)
9. [RHSA-2010:0338](http://www.redhat.com/support/errata/RHSA-2010-0338.html)
10. [oval:org.mitre.oval:def:14276](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14276)
11. [ADV-2010-1793](http://www.vupen.com/english/advisories/2010/1793)
12. [APPLE-SA-2010-05-18-2](http://lists.apple.com/archives/security-announce/2010//May/msg00002.html)
13. [SUSE-SR:2010:011](http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html)
14. [43308](http://secunia.com/advisories/43308)
15. [](http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html)
16. [SSRT100179](http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751)
17. [SSRT100089](http://marc.info/?l=bugtraq&m=127557596201693&w=2)
18. [](http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html)
19. [oval:org.mitre.oval:def:10680](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10680)
20. [RHSA-2010:0339](http://www.redhat.com/support/errata/RHSA-2010-0339.html)
21. [HPSBUX02524](http://marc.info/?l=bugtraq&m=127557596201693&w=2)
22. [39292](http://secunia.com/advisories/39292)
23. [](http://support.apple.com/kb/HT4170)
24. [](http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html)
25. [SUSE-SR:2010:008](http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html)
26. [39659](http://secunia.com/advisories/39659)
27. [RHSA-2010:0471](http://www.redhat.com/support/errata/RHSA-2010-0471.html)
28. [USN-923-1](http://ubuntu.com/usn/usn-923-1)
29. [](http://www.vmware.com/security/advisories/VMSA-2011-0003.html)
30. [RHSA-2010:0337](http://www.redhat.com/support/errata/RHSA-2010-0337.html)
31. [HPSBMA02547](http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751)
32. [](http://support.apple.com/kb/HT4171)
33. [MDVSA-2010:084](http://www.mandriva.com/security/advisories?name=MDVSA-2010:084)
34. [20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX](http://www.securityfocus.com/archive/1/516397/100/0/threaded)
35. [ADV-2010-1191](http://www.vupen.com/english/advisories/2010/1191)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10852, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10852 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10852
- **State**: PUBLISHED
- **Published Date**: August 01, 2019 at 14:47 UTC
- **Last Updated**: August 06, 2024 at 03:38 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 11.54.0.4 lacks ACL enforcement in the AppConfig subsystem (SEC-85).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/54+Change+Log)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-6446, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-6446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6446
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: August 17, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-2564, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-2564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2564
- **State**: PUBLISHED
- **Published Date**: July 28, 2022 at 15:21 UTC
- **Last Updated**: November 20, 2024 at 16:14 UTC
- **Reserved Date**: July 28, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Prototype Pollution in GitHub repository automattic/mongoose prior to 6.4.6.
### Weakness Classification (CWE)
- CWE-1321: Security Weakness
### Affected Products
**automattic - automattic/mongoose**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/Automattic/mongoose/blob/51e758541763b6f14569744ced15cc23ab8b50c6/lib/schema.js#L88-L141)
2. [](https://huntr.dev/bounties/055be524-9296-4b2f-b68d-6d5b810d1ddd)
3. [](https://github.com/automattic/mongoose/commit/a45cfb6b0ce0067ae9794cfa80f7917e1fb3c6f8)
4. [](https://github.com/Automattic/mongoose/compare/6.4.5...6.4.6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-3526, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-3526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3526
- **State**: PUBLISHED
- **Published Date**: October 30, 2017 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:50 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Apache Wicket before 1.5.12, 6.x before 6.17.0, and 7.x before 7.0.0-M3 might allow remote attackers to obtain sensitive information via vectors involving identifiers for storing page markup for temporary user sessions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wicket.apache.org/news/2014/09/22/cve-2014-3526.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-24021, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-24021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24021
- **State**: PUBLISHED
- **Published Date**: May 14, 2025 at 14:48 UTC
- **Last Updated**: May 14, 2025 at 15:13 UTC
- **Reserved Date**: January 16, 2025 at 17:31 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
iTop is an web based IT Service Management tool. Prior to versions 2.7.12, 3.1.3, and 3.2.1, anyone with an account having portal access can set value to object fields when they're not supposed to. Versions 2.7.12, 3.1.3, and 3.2.1 contain a fix for the issue.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Combodo - iTop**
Affected versions:
- < 2.7.12 (Status: affected)
- >= 3.0.0, < 3.1.3 (Status: affected)
- >= 3.2.0, < 3.2.1 (Status: affected)
### References
1. [https://github.com/Combodo/iTop/security/advisories/GHSA-c8hm-h9gv-8jpj](https://github.com/Combodo/iTop/security/advisories/GHSA-c8hm-h9gv-8jpj)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-22795, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-22795 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22795
- **State**: PUBLISHED
- **Published Date**: March 09, 2022 at 14:56 UTC
- **Last Updated**: September 17, 2024 at 04:19 UTC
- **Reserved Date**: January 07, 2022 at 00:00 UTC
- **Assigned By**: INCD
### Vulnerability Description
Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**Signiant - Signiant**
Affected versions:
- Signiant Build 78045 13.5.0 (Status: affected)
- Signiant Build 79008,14.0.0 (Status: affected)
- Signiant Build 79687 14.1.0 (Status: affected)
- Signiant Build 79687 15.0.0 (Status: affected)
### References
1. [](https://www.gov.il/en/departments/faq/cve_advisories)
### Credits
- Anton Golotin
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-4719, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-4719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4719
- **State**: PUBLISHED
- **Published Date**: July 03, 2014 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 18:33 UTC
- **Reserved Date**: July 03, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the login panel (svn/login/) in User-Friendly SVN (aka USVN) before 1.0.7 allows remote attackers to inject arbitrary web script or HTML via the username field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [68155](http://www.securityfocus.com/bid/68155)
2. [](http://packetstormsecurity.com/files/127177/User-Friendly-SVN-Cross-Site-Scripting.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-11211, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-11211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11211
- **State**: PUBLISHED
- **Published Date**: August 11, 2017 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 16:53 UTC
- **Reserved Date**: July 13, 2017 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability in the JPEG parser. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe Systems Incorporated - Acrobat Reader**
Affected versions:
- 2017.009.20058 and earlier (Status: affected)
- 2017.008.30051 and earlier (Status: affected)
- 2015.006.30306 and earlier (Status: affected)
- 11.0.20 and earlier (Status: affected)
### References
1. [100180](http://www.securityfocus.com/bid/100180)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb17-24.html)
3. [1039098](http://www.securitytracker.com/id/1039098)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-39522, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-39522 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39522
- **State**: PUBLISHED
- **Published Date**: August 29, 2023 at 17:23 UTC
- **Last Updated**: October 01, 2024 at 20:19 UTC
- **Reserved Date**: August 03, 2023 at 16:27 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
goauthentik is an open-source Identity Provider. In affected versions using a recovery flow with an identification stage an attacker is able to determine if a username exists. Only setups configured with a recovery flow are impacted by this. Anyone with a user account on a system with the recovery flow described above is susceptible to having their username/email revealed as existing. An attacker can easily enumerate and check users' existence using the recovery flow, as a clear message is shown when a user doesn't exist. Depending on configuration this can either be done by username, email, or both. This issue has been addressed in versions 2023.5.6 and 2023.6.2. Users are advised to upgrade. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-203: Improper Input Validation
### Affected Products
**goauthentik - authentik**
Affected versions:
- >= 2023.6.0, < 2023.6.2 (Status: affected)
- < 2023.5.6 (Status: affected)
### References
1. [https://github.com/goauthentik/authentik/security/advisories/GHSA-vmf9-6pcv-xr87](https://github.com/goauthentik/authentik/security/advisories/GHSA-vmf9-6pcv-xr87)
2. [https://github.com/goauthentik/authentik/commit/aa874dd92a770d5f8cd8f265b7cdd31cd73a4599](https://github.com/goauthentik/authentik/commit/aa874dd92a770d5f8cd8f265b7cdd31cd73a4599)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-1679, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-1679 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1679
- **State**: PUBLISHED
- **Published Date**: May 13, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 04:47 UTC
- **Reserved Date**: February 17, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1678, and CVE-2015-1680.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS15-051](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051)
2. [1032294](http://www.securitytracker.com/id/1032294)
3. [74496](http://www.securityfocus.com/bid/74496)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-1999023, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-1999023 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1999023
- **State**: PUBLISHED
- **Published Date**: July 23, 2018 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 03:18 UTC
- **Reserved Date**: July 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-44012, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-44012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44012
- **State**: PUBLISHED
- **Published Date**: October 02, 2023 at 00:00 UTC
- **Last Updated**: September 23, 2024 at 16:26 UTC
- **Reserved Date**: September 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the helpkey parameter in the Help.aspx component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44012)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-32535, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-32535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32535
- **State**: PUBLISHED
- **Published Date**: July 07, 2021 at 14:12 UTC
- **Last Updated**: September 16, 2024 at 16:38 UTC
- **Reserved Date**: May 10, 2021 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
The vulnerability of hard-coded default credentials in QSAN SANOS allows unauthenticated remote attackers to obtain administrator’s permission and execute arbitrary functions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**QSAN - SANOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-4892-768d9-1.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-4181, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-4181 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4181
- **State**: PUBLISHED
- **Published Date**: August 25, 2017 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 06:04 UTC
- **Reserved Date**: June 04, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in get_file.php in phpMyBackupPro 2.1 through 2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: this vulnerability exists due to an incomplete fix to CVE-2015-4180.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20150604 Re: CVE requests / Advisory: phpMyBackupPro](http://www.openwall.com/lists/oss-security/2015/06/04/10)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-20252, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-20252 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20252
- **State**: PUBLISHED
- **Published Date**: August 11, 2022 at 15:09 UTC
- **Last Updated**: August 03, 2024 at 02:02 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In PackageManager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224547584
### Affected Products
**n/a - Android**
Affected versions:
- Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-13)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-30508, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-30508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30508
- **State**: PUBLISHED
- **Published Date**: June 04, 2021 at 17:15 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Heap buffer overflow in Media Feeds in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to enable certain features in Chrome to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1195340)
3. [GLSA-202107-06](https://security.gentoo.org/glsa/202107-06)
4. [FEDORA-2021-f94dadff78](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/)
5. [FEDORA-2021-ca58c57bdf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-45063, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-45063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45063
- **State**: PUBLISHED
- **Published Date**: September 05, 2024 at 04:31 UTC
- **Last Updated**: September 06, 2024 at 16:18 UTC
- **Reserved Date**: August 27, 2024 at 16:30 UTC
- **Assigned By**: freebsd
### Vulnerability Description
The function ctl_write_buffer incorrectly set a flag which resulted in a kernel Use-After-Free when a command finished processing.
Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**FreeBSD - FreeBSD**
Affected versions:
- 14.1-RELEASE (Status: affected)
- 14.0-RELEASE (Status: affected)
- 13.3-RELEASE (Status: affected)
### References
1. [](https://security.freebsd.org/advisories/FreeBSD-SA-24:11.ctl.asc)
### Credits
- Synacktiv
- The FreeBSD Foundation
- The Alpha-Omega Project
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.