System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27753, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27753
- **State**: PUBLISHED
- **Published Date**: December 08, 2020 at 21:57 UTC
- **Last Updated**: August 04, 2024 at 16:18 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0.
### Weakness Classification (CWE)
- CWE-401: Security Weakness
### Affected Products
**n/a - ImageMagick**
Affected versions:
- prior to 7.0.9-0 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1894229) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48504, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48504 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48504
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 10:15 UTC
- **Last Updated**: October 07, 2024 at 14:01 UTC
- **Reserved Date**: November 16, 2023 at 23:29 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10518, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10518 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10518
- **State**: PUBLISHED
- **Published Date**: April 27, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 20:36 UTC
- **Reserved Date**: April 27, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In CMS Made Simple (CMSMS) through 2.2.7, the "file delete" operation in the admin dashboard contains an arbitrary file deletion vulnerability that can cause DoS, exploitable by an admin user, because the attacker can remove all lib/ files in all directories.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/itodaro/cmsms_cve/blob/master/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6091, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6091
- **State**: PUBLISHED
- **Published Date**: February 09, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 11:20 UTC
- **Reserved Date**: February 09, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in plugins.php in BMForum 5.6, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the tagname parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [bmforum-plugins-sql-injection(45611)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45611)
2. [31522](http://www.securityfocus.com/bid/31522)
3. [6642](https://www.exploit-db.com/exploits/6642) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2657
- **State**: REJECTED
- **Published Date**: August 08, 2022 at 18:52 UTC
- **Last Updated**: August 08, 2022 at 18:52 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30804, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30804 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30804
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 10:54 UTC
- **Last Updated**: March 27, 2025 at 18:56 UTC
- **Reserved Date**: March 26, 2025 at 09:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in maennchen1.de wpShopGermany IT-RECHT KANZLEI allows Cross Site Request Forgery. This issue affects wpShopGermany IT-RECHT KANZLEI: from n/a through 2.0.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**maennchen1.de - wpShopGermany IT-RECHT KANZLEI**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wpshopgermany-it-recht-kanzlei/vulnerability/wordpress-wpshopgermany-it-recht-kanzlei-plugin-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Nguyen Thi Huyen Trang - Skalucy (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3769
- **State**: PUBLISHED
- **Published Date**: August 22, 2008 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 09:52 UTC
- **Reserved Date**: August 22, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in admin/create_order_new.php in Freeway 1.4.1.171, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the include_page parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31475](http://secunia.com/advisories/31475)
2. [](http://www.openfreeway.org/download/change-log.html)
3. [4181](http://securityreason.com/securityalert/4181)
4. [freeway-createordernew-file-include(45036)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45036)
5. [20080818 [DSECRG-08-036] Multiple Security Vulnerabilities in Freeway eCommerce 1.4.1.171](http://www.securityfocus.com/archive/1/495549/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7737
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3615, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3615 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3615
- **State**: PUBLISHED
- **Published Date**: August 17, 2021 at 16:25 UTC
- **Last Updated**: August 03, 2024 at 17:01 UTC
- **Reserved Date**: June 23, 2021 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
A vulnerability was reported in Lenovo Smart Camera X3, X5, and C2E that could allow code execution if a specific file exists on the attached SD card. This vulnerability is the same as CNVD-2021-45262.
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**Lenovo - Smart Camera X3, X5, and C2E firmware**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://iknow.lenovo.com.cn/detail/dc_198417.html)
2. [](https://www.cnvd.org.cn/flaw/show/CNVD-2021-45262)
### Credits
- Lenovo thanks Charles Jiang and Xingcan Chen from Lenovo Global Security Lab for reporting these issues. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36078
- **State**: PUBLISHED
- **Published Date**: May 19, 2024 at 19:36 UTC
- **Last Updated**: February 13, 2025 at 15:59 UTC
- **Reserved Date**: May 19, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Zammad before 6.3.1, a Ruby gem bundled by Zammad is installed with world-writable file permissions. This allowed a local attacker on the server to modify the gem's files, injecting arbitrary code into Zammad processes (which run with the environment and permissions of the Zammad user).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://zammad.com/en/advisories/zaa-2024-04) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8497, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8497 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8497
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 07, 2015 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32839, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32839
- **State**: PUBLISHED
- **Published Date**: April 16, 2025 at 17:38 UTC
- **Last Updated**: April 17, 2025 at 14:18 UTC
- **Reserved Date**: April 11, 2025 at 13:04 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetGateways' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Siemens - TeleControl Server Basic**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-443402.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0267
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
preferences.php in Simple Internet Publishing System (SIPS) before 0.3.1 allows remote attackers to gain administrative privileges via a linebreak in the "theme" field followed by the Status::admin command, which causes the Status line to be entered into the password file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sips.sourceforge.net/adminvul.html)
2. [sips-theme-admin-access(8193)](http://www.iss.net/security_center/static/8193.php)
3. [20020212 SIPS - vulnerable to anyone gaining admin access.](http://marc.info/?l=bugtraq&m=101363233905645&w=2)
4. [4097](http://www.securityfocus.com/bid/4097) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1754, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1754
- **State**: PUBLISHED
- **Published Date**: April 11, 2008 at 20:28 UTC
- **Last Updated**: August 07, 2024 at 08:32 UTC
- **Reserved Date**: April 11, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Symantec Altiris Deployment Solution before 6.9.164 stores the Deployment Solution Agent (aka AClient) password in cleartext in memory, which allows local users to obtain sensitive information by dumping the AClient.exe process memory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [altiris-agent-aclient-info-disclosure(41771)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41771)
2. [28707](http://www.securityfocus.com/bid/28707)
3. [ADV-2008-1197](http://www.vupen.com/english/advisories/2008/1197/references)
4. [29771](http://secunia.com/advisories/29771)
5. [](http://securityresponse.symantec.com/avcenter/security/Content/2008.04.10.html)
6. [1019825](http://www.securitytracker.com/id?1019825)
7. [44388](http://www.osvdb.org/44388) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4748
- **State**: PUBLISHED
- **Published Date**: October 20, 2020 at 14:15 UTC
- **Last Updated**: September 16, 2024 at 19:50 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Spectrum Scale 5.0.0 through 5.0.5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188517.
### Affected Products
**IBM - Spectrum Scale**
Affected versions:
- 5.0.0 (Status: affected)
- 5.0.5.2 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6349449)
2. [ibm-spectrum-cve20204748-xss (188517)](https://exchange.xforce.ibmcloud.com/vulnerabilities/188517) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4634
- **State**: PUBLISHED
- **Published Date**: February 10, 2010 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 07:08 UTC
- **Reserved Date**: February 09, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple integer underflows in FFmpeg 0.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that (1) bypasses a validation check in vorbis_dec.c and triggers a wraparound of the stack pointer, or (2) access a pointer from out-of-bounds memory in mov.c, related to an elst tag that appears before a tag that creates a stream.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2011:088](http://www.mandriva.com/security/advisories?name=MDVSA-2011:088)
2. [36805](http://secunia.com/advisories/36805)
3. [36465](http://www.securityfocus.com/bid/36465)
4. [39482](http://secunia.com/advisories/39482)
5. [](https://roundup.ffmpeg.org/roundup/ffmpeg/issue1240)
6. [MDVSA-2011:061](http://www.mandriva.com/security/advisories?name=MDVSA-2011:061)
7. [MDVSA-2011:112](http://www.mandriva.com/security/advisories?name=MDVSA-2011:112)
8. [MDVSA-2011:114](http://www.mandriva.com/security/advisories?name=MDVSA-2011:114)
9. [](http://scarybeastsecurity.blogspot.com/2009/09/patching-ffmpeg-into-shape.html)
10. [MDVSA-2011:059](http://www.mandriva.com/security/advisories?name=MDVSA-2011:059)
11. [38643](http://secunia.com/advisories/38643)
12. [ADV-2011-1241](http://www.vupen.com/english/advisories/2011/1241)
13. [MDVSA-2011:060](http://www.mandriva.com/security/advisories?name=MDVSA-2011:060)
14. [DSA-2000](http://www.debian.org/security/2010/dsa-2000)
15. [USN-931-1](http://www.ubuntu.com/usn/USN-931-1)
16. [ADV-2010-0935](http://www.vupen.com/english/advisories/2010/0935) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1628, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1628
- **State**: PUBLISHED
- **Published Date**: March 26, 2021 at 16:19 UTC
- **Last Updated**: August 03, 2024 at 16:18 UTC
- **Reserved Date**: December 02, 2020 at 00:00 UTC
- **Assigned By**: Salesforce
### Vulnerability Description
MuleSoft is aware of a XML External Entity (XXE) vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers. Affected versions: Mule 4.x runtime released before February 2, 2021.
### Affected Products
**n/a - Mulesoft**
Affected versions:
- Mule 4.x runtime released before February 2, 2021 (Status: affected)
### References
1. [](https://help.salesforce.com/articleView?id=000357384&type=1&mode=1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-20096, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-20096 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-20096
- **State**: PUBLISHED
- **Published Date**: March 23, 2022 at 21:28 UTC
- **Last Updated**: August 04, 2024 at 14:15 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Whatsapp iOS 2.19.80 and prior and Android 2.19.222 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/zadewg/RIUS)
2. [](http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34045, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34045
- **State**: PUBLISHED
- **Published Date**: April 29, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 02:42 UTC
- **Reserved Date**: April 29, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->counters[IN_INITI][MSG_COUNTER][ProcedureCode_id_E2setup]->Increment().
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jira.o-ran-sc.org/browse/RIC-1047) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20105, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20105 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20105
- **State**: PUBLISHED
- **Published Date**: March 17, 2020 at 02:40 UTC
- **Last Updated**: September 16, 2024 at 19:25 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
The EditApplinkServlet resource in the Atlassian Application Links plugin before version 5.4.20, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.1, and from version 7.1.0 before version 7.1.3 allows remote attackers who have obtained access to administrator's session to access the EditApplinkServlet resource without needing to re-authenticate to pass "WebSudo" in products that support "WebSudo" through an improper access control vulnerability.
### Affected Products
**Atlassian - Application Links**
Affected versions:
- unspecified (Status: affected)
- 6.0.0 (Status: affected)
- unspecified (Status: affected)
- 7.0.0 (Status: affected)
- unspecified (Status: affected)
- 7.1.0 (Status: affected)
- unspecified (Status: affected)
**Atlassian - Jira Server and Data Center**
Affected versions:
- 7.13.8 (Status: affected)
- unspecified (Status: affected)
- 8.4.2 (Status: affected)
- unspecified (Status: affected)
- 8.6.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://ecosystem.atlassian.net/browse/APL-1391)
2. [](https://jira.atlassian.com/browse/JRASERVER-70526) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37009, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37009
- **State**: PUBLISHED
- **Published Date**: January 22, 2025 at 00:00 UTC
- **Last Updated**: January 27, 2025 at 21:43 UTC
- **Reserved Date**: June 28, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `Handover Notification` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cellularsecurity.org/ransacked) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5192
- **State**: PUBLISHED
- **Published Date**: September 26, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 14:55 UTC
- **Reserved Date**: January 06, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.saltstack.com/en/2016.3/topics/releases/2015.8.13.html)
2. [](https://docs.saltstack.com/en/2016.3/topics/releases/2016.3.5.html)
3. [](https://docs.saltstack.com/en/latest/topics/releases/2016.11.2.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31875
- **State**: PUBLISHED
- **Published Date**: June 17, 2022 at 19:24 UTC
- **Last Updated**: August 03, 2024 at 07:26 UTC
- **Reserved Date**: May 31, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an xss vulnerability via the proname parameter in /admin/scheprofile.cgi
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12525
- **State**: PUBLISHED
- **Published Date**: June 18, 2018 at 11:00 UTC
- **Last Updated**: August 05, 2024 at 08:38 UTC
- **Reserved Date**: June 18, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in perfSONAR Monitoring and Debugging Dashboard (MaDDash) 2.0.2. A direct request to /images/ provides a directory listing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pastebin.com/eA5tGKf0)
2. [44910](https://www.exploit-db.com/exploits/44910/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1986
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:07 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in modules.php in Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers with administrative privileges to read arbitrary files via a .. (dot dot) in the startdir parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [coppermine-modulesphp-directory-traversal(16042)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16042)
2. [20040502 [waraxe-2004-SA#026 - Multiple vulnerabilities in Coppermine Photo Gallery for PhpNuke]](http://marc.info/?l=bugtraq&m=108360247732014&w=2)
3. [](http://www.waraxe.us/index.php?modname=sa&id=26)
4. [1010001](http://securitytracker.com/id?1010001)
5. [5758](http://www.osvdb.org/5758)
6. [10253](http://www.securityfocus.com/bid/10253)
7. [11524](http://secunia.com/advisories/11524) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41145
- **State**: PUBLISHED
- **Published Date**: December 18, 2024 at 22:38 UTC
- **Last Updated**: December 28, 2024 at 00:51 UTC
- **Reserved Date**: August 05, 2024 at 20:37 UTC
- **Assigned By**: talos
### Vulnerability Description
A library injection vulnerability exists in the WebView.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-347: Security Weakness
### Affected Products
**Microsoft - Teams (work or school)**
Affected versions:
- 24046.2812.2722.8193 for macOS (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-1990](https://talosintelligence.com/vulnerability_reports/TALOS-2024-1990)
### Credits
- Discovered by Francesco Benvenuto of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26349
- **State**: PUBLISHED
- **Published Date**: March 29, 2022 at 16:37 UTC
- **Last Updated**: April 16, 2025 at 16:36 UTC
- **Reserved Date**: March 17, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in DIAE_eccoefficientHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Delta Electronics - DIAEnergie**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-081-01)
### Credits
- Michael Heinzl and Dusan Stevanovic of Trend Micro’s Zero Day Initiative reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47939
- **State**: PUBLISHED
- **Published Date**: May 20, 2025 at 14:00 UTC
- **Last Updated**: May 20, 2025 at 14:08 UTC
- **Reserved Date**: May 14, 2025 at 10:32 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TYPO3 is an open source, PHP based web content management system. By design, the file management module in TYPO3’s backend user interface has historically allowed the upload of any file type, with the exception of those that are directly executable in a web server context. This lack of restriction means it is possible to upload files that may be considered potentially harmful, such as executable binaries (e.g., `.exe` files), or files with inconsistent file extensions and MIME types (for example, a file incorrectly named with a `.png` extension but actually carrying the MIME type `application/zip`) starting in version 9.0.0 and prior to versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, and 13.4.12 LTS. Although such files are not directly executable through the web server, their presence can introduce indirect risks. For example, third-party services such as antivirus scanners or malware detection systems might flag or block access to the website for end users if suspicious files are found. This could negatively affect the availability or reputation of the site. Users should update to TYPO3 version 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, or 13.4.12 LTS to fix the problem.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-351: Security Weakness
- CWE-434: Security Weakness
### Affected Products
**TYPO3 - typo3**
Affected versions:
- >= 9.0.0, < 9.5.51 (Status: affected)
- >= 10.0.0, < 10.4.50 (Status: affected)
- >= 11.0.0, < 11.5.44 (Status: affected)
- >= 12.0.0, < 12.4.31 (Status: affected)
- >= 13.0.0, < 13.4.12 (Status: affected)
### References
1. [https://github.com/TYPO3/typo3/security/advisories/GHSA-9hq9-cr36-4wpj](https://github.com/TYPO3/typo3/security/advisories/GHSA-9hq9-cr36-4wpj)
2. [https://typo3.org/security/advisory/typo3-core-sa-2025-014](https://typo3.org/security/advisory/typo3-core-sa-2025-014) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7762, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7762 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7762
- **State**: PUBLISHED
- **Published Date**: November 06, 2015 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 07:58 UTC
- **Reserved Date**: October 08, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.openafs.org/dl/openafs/1.6.15/RELNOTES-1.6.15)
2. [](https://www.openafs.org/pages/security/OPENAFS-SA-2015-007.txt)
3. [[OpenAFS-announce] 20151028 OpenAFS security release 1.6.15 available](https://lists.openafs.org/pipermail/openafs-announce/2015/000493.html)
4. [1034039](http://www.securitytracker.com/id/1034039)
5. [DSA-3387](http://www.debian.org/security/2015/dsa-3387) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3640, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3640
- **State**: PUBLISHED
- **Published Date**: October 21, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 01:14 UTC
- **Reserved Date**: October 21, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Linux - Kernel**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979)
2. [](https://vuldb.com/?id.211944)
3. [FEDORA-2022-64ab9153c0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OD7VWUT7YAU4CJ247IF44NGVOAODAJGC/)
4. [FEDORA-2022-65a0a3504a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGOIRR72OAFE53XZRUDZDP7INGLIC3E3/)
5. [FEDORA-2022-7aadaadebc](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG2UPX3MQ7RKRJEUMGEH2TLPKZJCBU5C/)
6. [[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html)
7. [[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2602
- **State**: PUBLISHED
- **Published Date**: May 08, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:21 UTC
- **Reserved Date**: March 24, 2014 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP OneView 1.0 and 1.01 allows remote authenticated users to gain privileges via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBGN03034](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04273152)
2. [SSRT101496](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04273152) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6720
- **State**: PUBLISHED
- **Published Date**: December 13, 2023 at 10:04 UTC
- **Last Updated**: August 02, 2024 at 08:35 UTC
- **Reserved Date**: December 12, 2023 at 08:04 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
An XSS vulnerability stored in Repox has been identified, which allows a local attacker to store a specially crafted JavaScript payload on the server, due to the lack of proper sanitisation of field elements, allowing the attacker to trigger the malicious payload when the application loads.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Repox - Repox**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-repox)
### Credits
- David Cámara Galindo
- Andrés Elizalde Galdeano |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25305, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25305
- **State**: PUBLISHED
- **Published Date**: February 18, 2025 at 18:53 UTC
- **Last Updated**: February 18, 2025 at 19:23 UTC
- **Reserved Date**: February 06, 2025 at 17:13 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Home Assistant Core is an open source home automation that puts local control and privacy first. Affected versions are subject to a potential man-in-the-middle attacks due to missing SSL certificate verification in the project codebase and used third-party libraries. In the past, `aiohttp-session`/`request` had the parameter `verify_ssl` to control SSL certificate verification. This was a boolean value. In `aiohttp` 3.0, this parameter was deprecated in favor of the `ssl` parameter. Only when `ssl` is set to `None` or provided with a correct configured SSL context the standard SSL certificate verification will happen. When migrating integrations in Home Assistant and libraries used by Home Assistant, in some cases the `verify_ssl` parameter value was just moved to the new `ssl` parameter. This resulted in these integrations and 3rd party libraries using `request.ssl = True`, which unintentionally turned off SSL certificate verification and opened up a man-in-the-middle attack vector. This issue has been addressed in version 2024.1.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-940: Code Injection
### Affected Products
**home-assistant - core**
Affected versions:
- < 2024.1.6 (Status: affected)
### References
1. [https://github.com/home-assistant/core/security/advisories/GHSA-m3pm-rpgg-5wj6](https://github.com/home-assistant/core/security/advisories/GHSA-m3pm-rpgg-5wj6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42109
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:13 UTC
- **Last Updated**: August 02, 2024 at 19:16 UTC
- **Reserved Date**: September 06, 2023 at 21:14 UTC
- **Assigned By**: zdi
### Vulnerability Description
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EMF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22136.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**PDF-XChange - PDF-XChange Editor**
Affected versions:
- 10.1.0.380 (Status: affected)
### References
1. [ZDI-23-1484](https://www.zerodayinitiative.com/advisories/ZDI-23-1484/)
2. [vendor-provided URL](https://www.tracker-software.com/support/security-bulletins.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9480, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9480 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9480
- **State**: PUBLISHED
- **Published Date**: June 23, 2020 at 21:50 UTC
- **Last Updated**: August 04, 2024 at 10:26 UTC
- **Reserved Date**: March 01, 2020 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
### Affected Products
**Apache Software Foundation - Apache Spark**
Affected versions:
- Apache Spark 2.4.5 and earlier (Status: affected)
### References
1. [](https://spark.apache.org/security.html#CVE-2020-9480)
2. [[spark-user] 20200803 Re: CVE-2020-9480: Apache Spark RCE vulnerability in auth-enabled standalone master](https://lists.apache.org/thread.html/r03ad9fe7c07d6039fba9f2152d345274473cb0af3d8a4794a6645f4b%40%3Cuser.spark.apache.org%3E)
3. [[spark-dev] 20200803 Re: CVE-2020-9480: Apache Spark RCE vulnerability in auth-enabled standalone master](https://lists.apache.org/thread.html/ree9e87aae81852330290a478692e36ea6db47a52a694545c7d66e3e2%40%3Cdev.spark.apache.org%3E)
4. [[submarine-commits] 20201209 [GitHub] [submarine] QiAnXinCodeSafe opened a new issue #475: There is a vulnerability in Apache Spark 2.3.4,upgrade recommended](https://lists.apache.org/thread.html/rb3956440747e41940d552d377d50b144b60085e7ff727adb0e575d8d%40%3Ccommits.submarine.apache.org%3E)
5. [[doris-commits] 20210402 [GitHub] [incubator-doris] zh0122 opened a new pull request #5593: [FE][Bug] Update Spark version to fix a security issue](https://lists.apache.org/thread.html/ra0e62a18ad080c4ce6df5e0202a27eaada75222761efc3f7238b5a3b%40%3Ccommits.doris.apache.org%3E)
6. [](https://www.oracle.com/security-alerts/cpuApr2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15337, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15337
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 19:50 UTC
- **Reserved Date**: October 14, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
### Affected Products
**Huawei Technologies Co., Ltd. - DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981**
Affected versions:
- DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*] (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0232
- **State**: PUBLISHED
- **Published Date**: March 09, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: March 08, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
newsdesk.cgi in News Desk 1.2 allows remote attackers to read arbitrary files via shell metacharacters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010103 News Desk 1.2 CGI Vulnerbility](http://archives.neohapsis.com/archives/bugtraq/2001-01/0042.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27338
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:47 UTC
- **Last Updated**: April 17, 2025 at 18:22 UTC
- **Reserved Date**: February 21, 2025 at 16:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in graphems List Urls allows Reflected XSS. This issue affects List Urls: from n/a through 0.2.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**graphems - List Urls**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/list-urls/vulnerability/wordpress-list-urls-plugin-0-2-csrf-to-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1518, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1518 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1518
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:18 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [526](http://www.securityfocus.com/bid/526)
2. [19990715 Shared memory DoS's](http://marc.info/?l=bugtraq&m=93207728118694&w=2)
3. [bsd-shared-memory-dos(2351)](https://exchange.xforce.ibmcloud.com/vulnerabilities/2351) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40134, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40134
- **State**: PUBLISHED
- **Published Date**: October 27, 2023 at 20:22 UTC
- **Last Updated**: September 09, 2024 at 19:41 UTC
- **Reserved Date**: August 09, 2023 at 02:29 UTC
- **Assigned By**: google_android
### Vulnerability Description
In isFullScreen of FillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33)
2. [](https://source.android.com/security/bulletin/2023-10-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46680
- **State**: PUBLISHED
- **Published Date**: September 13, 2024 at 05:29 UTC
- **Last Updated**: May 04, 2025 at 09:31 UTC
- **Reserved Date**: September 11, 2024 at 15:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btnxpuart: Fix random crash seen while removing driver
This fixes the random kernel crash seen while removing the driver, when
running the load/unload test over multiple iterations.
1) modprobe btnxpuart
2) hciconfig hci0 reset
3) hciconfig (check hci0 interface up with valid BD address)
4) modprobe -r btnxpuart
Repeat steps 1 to 4
The ps_wakeup() call in btnxpuart_close() schedules the psdata->work(),
which gets scheduled after module is removed, causing a kernel crash.
This hidden issue got highlighted after enabling Power Save by default
in 4183a7be7700 (Bluetooth: btnxpuart: Enable Power Save feature on
startup)
The new ps_cleanup() deasserts UART break immediately while closing
serdev device, cancels any scheduled ps_work and destroys the ps_lock
mutex.
[ 85.884604] Unable to handle kernel paging request at virtual address ffffd4a61638f258
[ 85.884624] Mem abort info:
[ 85.884625] ESR = 0x0000000086000007
[ 85.884628] EC = 0x21: IABT (current EL), IL = 32 bits
[ 85.884633] SET = 0, FnV = 0
[ 85.884636] EA = 0, S1PTW = 0
[ 85.884638] FSC = 0x07: level 3 translation fault
[ 85.884642] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000041dd0000
[ 85.884646] [ffffd4a61638f258] pgd=1000000095fff003, p4d=1000000095fff003, pud=100000004823d003, pmd=100000004823e003, pte=0000000000000000
[ 85.884662] Internal error: Oops: 0000000086000007 [#1] PREEMPT SMP
[ 85.890932] Modules linked in: algif_hash algif_skcipher af_alg overlay fsl_jr_uio caam_jr caamkeyblob_desc caamhash_desc caamalg_desc crypto_engine authenc libdes crct10dif_ce polyval_ce polyval_generic snd_soc_imx_spdif snd_soc_imx_card snd_soc_ak5558 snd_soc_ak4458 caam secvio error snd_soc_fsl_spdif snd_soc_fsl_micfil snd_soc_fsl_sai snd_soc_fsl_utils gpio_ir_recv rc_core fuse [last unloaded: btnxpuart(O)]
[ 85.927297] CPU: 1 PID: 67 Comm: kworker/1:3 Tainted: G O 6.1.36+g937b1be4345a #1
[ 85.936176] Hardware name: FSL i.MX8MM EVK board (DT)
[ 85.936182] Workqueue: events 0xffffd4a61638f380
[ 85.936198] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 85.952817] pc : 0xffffd4a61638f258
[ 85.952823] lr : 0xffffd4a61638f258
[ 85.952827] sp : ffff8000084fbd70
[ 85.952829] x29: ffff8000084fbd70 x28: 0000000000000000 x27: 0000000000000000
[ 85.963112] x26: ffffd4a69133f000 x25: ffff4bf1c8540990 x24: ffff4bf215b87305
[ 85.963119] x23: ffff4bf215b87300 x22: ffff4bf1c85409d0 x21: ffff4bf1c8540970
[ 85.977382] x20: 0000000000000000 x19: ffff4bf1c8540880 x18: 0000000000000000
[ 85.977391] x17: 0000000000000000 x16: 0000000000000133 x15: 0000ffffe2217090
[ 85.977399] x14: 0000000000000001 x13: 0000000000000133 x12: 0000000000000139
[ 85.977407] x11: 0000000000000001 x10: 0000000000000a60 x9 : ffff8000084fbc50
[ 85.977417] x8 : ffff4bf215b7d000 x7 : ffff4bf215b83b40 x6 : 00000000000003e8
[ 85.977424] x5 : 00000000410fd030 x4 : 0000000000000000 x3 : 0000000000000000
[ 85.977432] x2 : 0000000000000000 x1 : ffff4bf1c4265880 x0 : 0000000000000000
[ 85.977443] Call trace:
[ 85.977446] 0xffffd4a61638f258
[ 85.977451] 0xffffd4a61638f3e8
[ 85.977455] process_one_work+0x1d4/0x330
[ 85.977464] worker_thread+0x6c/0x430
[ 85.977471] kthread+0x108/0x10c
[ 85.977476] ret_from_fork+0x10/0x20
[ 85.977488] Code: bad PC value
[ 85.977491] ---[ end trace 0000000000000000 ]---
Preset since v6.9.11
### Affected Products
**Linux - Linux**
Affected versions:
- 86d55f124b52de2ba0d066d89b766bcc0387fd72 (Status: affected)
- 86d55f124b52de2ba0d066d89b766bcc0387fd72 (Status: affected)
- 86d55f124b52de2ba0d066d89b766bcc0387fd72 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.4 (Status: affected)
- 0 (Status: unaffected)
- 6.6.49 (Status: unaffected)
- 6.10.8 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/662a55986b88807da4d112d838c8aaa05810e938)
2. [](https://git.kernel.org/stable/c/29a1d9971e38f92c84b363ff50379dd434ddfe1c)
3. [](https://git.kernel.org/stable/c/35237475384ab3622f63c3c09bdf6af6dacfe9c3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18128
- **State**: REJECTED
- **Last Updated**: February 27, 2023 at 00:00 UTC
- **Reserved Date**: October 09, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24374, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24374
- **State**: PUBLISHED
- **Published Date**: February 24, 2022 at 09:50 UTC
- **Last Updated**: August 03, 2024 at 04:07 UTC
- **Reserved Date**: February 16, 2022 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-23916.
### Affected Products
**appleple inc. - a-blog cms**
Affected versions:
- Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 (Status: affected)
### References
1. [](https://developer.a-blogcms.jp/blog/news/security-202202.html)
2. [](https://jvn.jp/en/jp/JVN14706307/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4185, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4185
- **State**: PUBLISHED
- **Published Date**: November 29, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 01:34 UTC
- **Reserved Date**: November 29, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Navigation in Google Chrome on iOS prior to 108.0.5359.71 allowed a remote attacker to spoof the contents of the modal dialogue via a crafted HTML page. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_29.html)
2. [](https://crbug.com/1373025)
3. [GLSA-202305-10](https://security.gentoo.org/glsa/202305-10)
4. [GLSA-202311-11](https://security.gentoo.org/glsa/202311-11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20456, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20456 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20456
- **State**: PUBLISHED
- **Published Date**: July 10, 2024 at 16:06 UTC
- **Last Updated**: August 01, 2024 at 21:59 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker with high privileges to bypass the Cisco Secure Boot functionality and load unverified software on an affected device. To exploit this successfully, the attacker must have root-system privileges on the affected device.
This vulnerability is due to an error in the software build process. An attacker could exploit this vulnerability by manipulating the system’s configuration options to bypass some of the integrity checks that are performed during the booting process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass of the requirement to run Cisco signed images or alter the security properties of the running system.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Cisco - Cisco IOS XR Software**
Affected versions:
- 24.2.1 (Status: affected)
### References
1. [cisco-sa-xr-secure-boot-quD5g8Ap](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-secure-boot-quD5g8Ap) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2031, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2031
- **State**: PUBLISHED
- **Published Date**: June 21, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 17:49 UTC
- **Reserved Date**: June 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in socialMPN allow remote attackers to execute arbitrary SQL commands via (1) the sid parameter to article.php, (2) uname parameter to user.php, (3) siteid parameter to viewforum.php, (4) username parameter to newtopic.php, the (5) secid or (6) artid parameter to sections.php, (7) siteid parameter to index.php, or (8) sid parameter to friend.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1014214](http://securitytracker.com/id?1014214) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-20079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-20079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-20079
- **State**: PUBLISHED
- **Published Date**: June 21, 2022 at 06:06 UTC
- **Last Updated**: April 15, 2025 at 14:16 UTC
- **Reserved Date**: June 18, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in Hindu Matrimonial Script. Affected by this vulnerability is an unknown functionality of the file /admin/photo.php. The manipulation leads to improper privilege management. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**unspecified - Hindu Matrimonial Script**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/41044/)
2. [](https://vuldb.com/?id.95419)
### Credits
- Ihsan Sencan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9557
- **State**: PUBLISHED
- **Published Date**: March 12, 2019 at 19:00 UTC
- **Last Updated**: August 04, 2024 at 21:54 UTC
- **Reserved Date**: March 04, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ability Mail Server 4.2.6 has Persistent Cross Site Scripting (XSS) via the body e-mail body. To exploit the vulnerability, the victim must open an email with malicious Javascript inserted into the body of the email as an iframe.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/151958/Ability-Mail-Server-4.2.6-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18183
- **State**: PUBLISHED
- **Published Date**: February 24, 2020 at 14:36 UTC
- **Last Updated**: August 05, 2024 at 01:47 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
pacman before 5.2 is vulnerable to arbitrary command injection in lib/libalpm/sync.c in the apply_deltas() function. This can be exploited when unsigned databases are used. To exploit the vulnerability, the user must enable the non-default delta feature and retrieve an attacker-controlled crafted database and delta file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.archlinux.org/pacman.git/tree/lib/libalpm/sync.c?h=v5.1.3#n767)
2. [](https://git.archlinux.org/pacman.git/commit/?id=c0e9be7973be6c81b22fde91516fb8991e7bb07b)
3. [](https://github.com/alpinelinux/alpine-secdb/blob/master/v3.11/community.yaml)
4. [FEDORA-2020-096fbcc91f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K53C45EDWBU3UCN3IRIGR5EZUNWXS7BW/)
5. [FEDORA-2020-781d0b2efe](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2TTUXXUW5OCOASIRMJK4RHEPLEA33Y6C/)
6. [FEDORA-2020-419a75aef6](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KIDJ4XKBZRRVRFFGKUA3ZU6NFIP5JUG3/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27393
- **State**: PUBLISHED
- **Published Date**: May 09, 2024 at 16:37 UTC
- **Last Updated**: May 04, 2025 at 09:04 UTC
- **Reserved Date**: February 25, 2024 at 13:47 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
xen-netfront: Add missing skb_mark_for_recycle
Notice that skb_mark_for_recycle() is introduced later than fixes tag in
commit 6a5bcd84e886 ("page_pool: Allow drivers to hint on SKB recycling").
It is believed that fixes tag were missing a call to page_pool_release_page()
between v5.9 to v5.14, after which is should have used skb_mark_for_recycle().
Since v6.6 the call page_pool_release_page() were removed (in
commit 535b9c61bdef ("net: page_pool: hide page_pool_release_page()")
and remaining callers converted (in commit 6bfef2ec0172 ("Merge branch
'net-page_pool-remove-page_pool_release_page'")).
This leak became visible in v6.8 via commit dba1b8a7ab68 ("mm/page_pool: catch
page_pool memory leaks").
### Affected Products
**Linux - Linux**
Affected versions:
- 6c5aa6fc4defc2a0977a2c59e4710d50fa1e834c (Status: affected)
- 6c5aa6fc4defc2a0977a2c59e4710d50fa1e834c (Status: affected)
- 6c5aa6fc4defc2a0977a2c59e4710d50fa1e834c (Status: affected)
- 6c5aa6fc4defc2a0977a2c59e4710d50fa1e834c (Status: affected)
- 6c5aa6fc4defc2a0977a2c59e4710d50fa1e834c (Status: affected)
**Linux - Linux**
Affected versions:
- 5.9 (Status: affected)
- 0 (Status: unaffected)
- 5.15.154 (Status: unaffected)
- 6.1.85 (Status: unaffected)
- 6.6.26 (Status: unaffected)
- 6.8.5 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/4143b9479caa29bb2380f3620dcbe16ea84eb3b1)
2. [](https://git.kernel.org/stable/c/7c1250796b6c262b505a46192f4716b8c6a6a8c6)
3. [](https://git.kernel.org/stable/c/27aa3e4b3088426b7e34584274ad45b5afaf7629)
4. [](https://git.kernel.org/stable/c/c8b7b2f158d9d4fb89cd2f68244af154f7549bb4)
5. [](https://git.kernel.org/stable/c/037965402a010898d34f4e35327d22c0a95cd51f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21427
- **State**: PUBLISHED
- **Published Date**: February 09, 2023 at 00:00 UTC
- **Last Updated**: March 24, 2025 at 19:49 UTC
- **Reserved Date**: November 14, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper access control vulnerability in NfcTile prior to SMR Jan-2023 Release 1 allows to attacker to use NFC without user recognition.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- R(11), S(12), T(13) (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0694, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0694 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0694
- **State**: PUBLISHED
- **Published Date**: February 04, 2011 at 00:00 UTC
- **Last Updated**: August 08, 2024 at 00:24 UTC
- **Reserved Date**: July 13, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in LHA 1.14 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to "command line processing," a different vulnerability than CVE-2004-0771. NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2004:323](http://www.redhat.com/support/errata/RHSA-2004-323.html)
2. [oval:org.mitre.oval:def:9981](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9981)
3. [RHSA-2004:440](http://www.redhat.com/support/errata/RHSA-2004-440.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10464, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10464 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10464
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 19:56 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9640, MDM9650, QCA6174A, QCA6574AU, QCA9377, SD 210/SD 212/SD 205, SD 425, SD 600, SD 650/52, SD 808, SD 810, SD 820, and SDX20, lack of input validation for HCI H4 UART packet ID cause system denial of service.
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- MDM9206, MDM9607, MDM9640, MDM9650, QCA6174A, QCA6574AU, QCA9377, SD 210/SD 212/SD 205, SD 425, SD 600, SD 650/52, SD 808, SD 810, SD 820, SDX20 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0401, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0401 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0401
- **State**: PUBLISHED
- **Published Date**: May 04, 2010 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 17:48 UTC
- **Reserved Date**: January 27, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenTTD before 1.0.1 accepts a company password for authentication in response to a request for the server password, which allows remote authenticated users to bypass intended access restrictions or cause a denial of service (daemon crash) by sending a company password packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://security.openttd.org/en/CVE-2010-0401)
2. [39669](http://secunia.com/advisories/39669)
3. [](http://bugs.openttd.org/task/3754) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38357
- **State**: PUBLISHED
- **Published Date**: August 15, 2022 at 22:07 UTC
- **Last Updated**: August 03, 2024 at 10:54 UTC
- **Reserved Date**: August 15, 2022 at 00:00 UTC
- **Assigned By**: tenable
### Vulnerability Description
Improper neutralization of special elements leaves the Eyes of Network Web application vulnerable to an iFrame injection attack, via the url parameter of /module/module_frame/index.php.
### Affected Products
**n/a - Eyes of Network Web**
Affected versions:
- 5.3 (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2022-29) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3910, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3910 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3910
- **State**: PUBLISHED
- **Published Date**: September 05, 2014 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 10:57 UTC
- **Reserved Date**: May 27, 2014 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Emurasoft EmFTP allows local users to gain privileges via a Trojan horse executable file that is launched during an attempt to read a similarly named file that lacks a filename extension.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://jvn.jp/en/jp/JVN50367052/995292/index.html)
2. [JVN#50367052](http://jvn.jp/en/jp/JVN50367052/index.html)
3. [JVNDB-2014-000103](http://jvndb.jvn.jp/jvndb/JVNDB-2014-000103) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2952, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2952 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2952
- **State**: PUBLISHED
- **Published Date**: December 07, 2022 at 22:59 UTC
- **Last Updated**: April 16, 2025 at 17:41 UTC
- **Reserved Date**: August 22, 2022 at 19:31 UTC
- **Assigned By**: icscert
### Vulnerability Description
GE CIMPICITY versions 2022 and prior is
vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-824: Security Weakness
### Affected Products
**GE - CIMPLICITY**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-04)
### Credits
- Kimiya working with Trend micro Zero Day Initiative reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6870, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6870 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6870
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 10, 2015 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45667, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45667
- **State**: PUBLISHED
- **Published Date**: December 02, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 14:55 UTC
- **Reserved Date**: November 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda i22 V1.0.0.3(4687) is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolRestoreSet/fromSysToolRestoreSet.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44177
- **State**: PUBLISHED
- **Published Date**: October 12, 2023 at 23:00 UTC
- **Last Updated**: September 19, 2024 at 13:10 UTC
- **Reserved Date**: September 26, 2023 at 19:30 UTC
- **Assigned By**: juniper
### Vulnerability Description
A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos and Junos EVO allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service.
Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition.
This issue affects Juniper Networks:
Junos OS:
* All versions prior to 19.1R3-S10;
* 19.2 versions prior to 19.2R3-S7;
* 19.3 versions prior to 19.3R3-S8;
* 19.4 versions prior to 19.4R3-S12;
* 20.2 versions prior to 20.2R3-S8;
* 20.4 versions prior to 20.4R3-S8;
* 21.2 versions prior to 21.2R3-S6;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S4;
* 22.1 versions prior to 22.1R3-S3;
* 22.2 versions prior to 22.2R3-S1;
* 22.3 versions prior to 22.3R3;
* 22.4 versions prior to 22.4R2.
Junos OS Evolved:
* All versions prior to 20.4R3-S8-EVO;
* 21.2 versions prior to 21.2R3-S6-EVO;
* 21.3 versions prior to 21.3R3-S5-EVO;
* 21.4 versions prior to 21.4R3-S4-EVO;
* 22.1 versions prior to 22.1R3-S3-EVO;
* 22.2 versions prior to 22.2R3-S1-EVO;
* 22.3 versions prior to 22.3R3-EVO;
* 22.4 versions prior to 22.4R2-EVO.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 0 (Status: affected)
- 19.2 (Status: affected)
- 19.3 (Status: affected)
- 19.4 (Status: affected)
- 20.2 (Status: affected)
- 20.4 (Status: affected)
- 21.2 (Status: affected)
- 21.3 (Status: affected)
- 21.4 (Status: affected)
- 22.1 (Status: affected)
- 22.2 (Status: affected)
- 22.3 (Status: affected)
- 22.4 (Status: affected)
**Juniper Networks - Junos OS Evolved**
Affected versions:
- 0 (Status: affected)
- 21.2 (Status: affected)
- 21.3 (Status: affected)
- 21.4 (Status: affected)
- 22.1 (Status: affected)
- 22.2 (Status: affected)
- 22.3 (Status: affected)
- 22.4 (Status: affected)
### References
1. [](https://supportportal.juniper.net/JSA73140) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39447
- **State**: PUBLISHED
- **Published Date**: October 10, 2023 at 12:32 UTC
- **Last Updated**: September 18, 2024 at 20:35 UTC
- **Reserved Date**: October 05, 2023 at 19:17 UTC
- **Assigned By**: f5
### Vulnerability Description
When BIG-IP APM Guided Configurations are configured, undisclosed sensitive information may be logged in restnoded log.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**F5 - BIG-IP**
Affected versions:
- 17.1.0 (Status: unaffected)
- 16.1.0 (Status: affected)
- 15.1.0 (Status: affected)
- 14.1.0 (Status: unaffected)
- 13.1.0 (Status: unaffected)
**F5 - BIG-IP**
Affected versions:
- 6.0 (Status: affected)
### References
1. [](https://my.f5.com/manage/s/article/K47756555)
### Credits
- F5 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1589, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1589 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1589
- **State**: REJECTED
- **Published Date**: November 05, 2020 at 19:47 UTC
- **Last Updated**: November 05, 2020 at 19:47 UTC
- **Reserved Date**: January 04, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2898
- **State**: PUBLISHED
- **Published Date**: September 14, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:53 UTC
- **Reserved Date**: September 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NOTE: this issue has been disputed by the vendor. FileZilla 2.2.14b and 2.2.15, and possibly earlier versions, when "Use secure mode" is disabled, uses a weak encryption scheme to store the user's password in the configuration settings file, which allows local users to obtain sensitive information. NOTE: the vendor has disputed the issue, stating that "the problem is not a vulnerability at all, but in fact a fundamental issue of every single program that can store passwords transparently.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://filezilla.sourceforge.net/forum/viewtopic.php?t=1328)
2. [filezilla-password-weak-encryption(22135)](https://exchange.xforce.ibmcloud.com/vulnerabilities/22135)
3. [14730](http://www.securityfocus.com/bid/14730)
4. [20050902 FileZilla weakly-encrypted password vulnerability: advisory + PoC](http://marc.info/?l=bugtraq&m=112577523810442&w=2)
5. [20050904 Re: FileZilla weakly-encrypted password vulnerability: advisory + PoC](http://marc.info/?l=bugtraq&m=112605448327521&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19693
- **State**: PUBLISHED
- **Published Date**: November 29, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 11:44 UTC
- **Reserved Date**: November 29, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in tp5cms through 2017-05-25. admin.php/system/set.html has XSS via the title parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/fmsdwifull/tp5cms/issues/6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38436
- **State**: PUBLISHED
- **Published Date**: July 21, 2024 at 07:12 UTC
- **Last Updated**: August 02, 2024 at 04:12 UTC
- **Reserved Date**: June 16, 2024 at 08:00 UTC
- **Assigned By**: INCD
### Vulnerability Description
Commugen SOX 365 – CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Commugen - SOX 365**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://www.gov.il/en/Departments/faq/cve_advisories)
### Credits
- Itamar Yochpaz |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9379, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9379
- **State**: PUBLISHED
- **Published Date**: January 23, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 17, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://xenbits.xen.org/xsa/xsa198.patch)
2. [94473](http://www.securityfocus.com/bid/94473)
3. [GLSA-201612-56](https://security.gentoo.org/glsa/201612-56)
4. [](http://xenbits.xen.org/xsa/advisory-198.html)
5. [1037347](http://www.securitytracker.com/id/1037347)
6. [](https://support.citrix.com/article/CTX218775) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45106, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45106
- **State**: PUBLISHED
- **Published Date**: December 03, 2024 at 09:06 UTC
- **Last Updated**: December 03, 2024 at 15:52 UTC
- **Reserved Date**: August 21, 2024 at 21:51 UTC
- **Assigned By**: apache
### Vulnerability Description
Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if:
* ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false.
* The user configured in ozone.s3g.kerberos.principal is also configured in ozone.s3.administrators or ozone.administrators.
Users are recommended to upgrade to Apache Ozone version 1.4.1 which disables the affected endpoint.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Apache Software Foundation - Apache Ozone**
Affected versions:
- 1.4.0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/rylnxwttp004kvotpk9j158vb238pfkm)
### Credits
- Ethan Rose
- Ivan Zlenko |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35395, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35395
- **State**: PUBLISHED
- **Published Date**: August 16, 2021 at 11:07 UTC
- **Last Updated**: February 04, 2025 at 19:39 UTC
- **Reserved Date**: June 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Realtek Jungle SDK version v2.x up to v3.4.14B provides an HTTP web server exposing a management interface that can be used to configure the access point. Two versions of this management interface exists: one based on Go-Ahead named webs and another based on Boa named boa. Both of them are affected by these vulnerabilities. Specifically, these binaries are vulnerable to the following issues: - stack buffer overflow in formRebootCheck due to unsafe copy of submit-url parameter - stack buffer overflow in formWsc due to unsafe copy of submit-url parameter - stack buffer overflow in formWlanMultipleAP due to unsafe copy of submit-url parameter - stack buffer overflow in formWlSiteSurvey due to unsafe copy of ifname parameter - stack buffer overflow in formStaticDHCP due to unsafe copy of hostname parameter - stack buffer overflow in formWsc due to unsafe copy of 'peerPin' parameter - arbitrary command execution in formSysCmd via the sysCmd parameter - arbitrary command injection in formWsc via the 'peerPin' parameter Exploitability of identified issues will differ based on what the end vendor/manufacturer did with the Realtek SDK webserver. Some vendors use it as-is, others add their own authentication implementation, some kept all the features from the server, some remove some of them, some inserted their own set of features. However, given that Realtek SDK implementation is full of insecure calls and that developers tends to re-use those examples in their custom code, any binary based on Realtek SDK webserver will probably contains its own set of issues on top of the Realtek ones (if kept). Successful exploitation of these issues allows remote attackers to gain arbitrary code execution on the device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.realtek.com/en/cu-1-en/cu-1-taiwan-en)
2. [](https://www.realtek.com/images/safe-report/Realtek_APRouter_SDK_Advisory-CVE-2021-35392_35395.pdf)
3. [](https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3721, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3721 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3721
- **State**: PUBLISHED
- **Published Date**: July 03, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 05:56 UTC
- **Reserved Date**: May 07, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The kernel in Apple iOS before 8.4 and OS X before 10.10.4 does not properly handle HFS parameters, which allows attackers to obtain sensitive memory-layout information via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [75491](http://www.securityfocus.com/bid/75491)
2. [](http://support.apple.com/kb/HT204941)
3. [APPLE-SA-2015-06-30-2](http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html)
4. [1032760](http://www.securitytracker.com/id/1032760)
5. [](http://support.apple.com/kb/HT204942)
6. [APPLE-SA-2015-06-30-1](http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6641, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6641 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6641
- **State**: PUBLISHED
- **Published Date**: September 22, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:24 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Homesteading Today (aka com.tapatalk.homesteadingtodaycom) application 3.7.14 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
3. [VU#205417](http://www.kb.cert.org/vuls/id/205417) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2763, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2763
- **State**: PUBLISHED
- **Published Date**: July 12, 2023 at 07:05 UTC
- **Last Updated**: September 05, 2024 at 14:18 UTC
- **Reserved Date**: May 17, 2023 at 15:42 UTC
- **Assigned By**: 3DS
### Vulnerability Description
Use-After-Free, Out-of-bounds Write and Heap-based Buffer Overflow vulnerabilities exist in the DWG and DXF file reading procedure in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted DWG or DXF file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
- CWE-787: Out-of-bounds Write
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Dassault Systèmes - SOLIDWORKS Desktop**
Affected versions:
- Release SOLIDWORKS 2021 Golden (Status: affected)
- Release SOLIDWORKS 2022 Golden (Status: affected)
- Release SOLIDWORKS 2023 Golden (Status: affected)
### References
1. [](https://www.3ds.com/vulnerability/advisories)
### Credits
- Mat Powell from Trend Micro's Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21346, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21346 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21346
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 18:04 UTC
- **Last Updated**: April 02, 2025 at 13:23 UTC
- **Reserved Date**: December 11, 2024 at 00:29 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office Security Feature Bypass Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-693: Security Weakness
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2024**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Office 2016**
Affected versions:
- 16.0.0 (Status: affected)
### References
1. [Microsoft Office Security Feature Bypass Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21346) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12874, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12874 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12874
- **State**: PUBLISHED
- **Published Date**: May 15, 2025 at 20:06 UTC
- **Last Updated**: May 20, 2025 at 19:29 UTC
- **Reserved Date**: December 20, 2024 at 21:01 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Top Comments WordPress plugin through 1.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Top Comments**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/7cc14a87-4605-49f6-9d51-0b9eb57e6c9d/)
### Credits
- Steven Pereira (Cursed271)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25464, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25464 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25464
- **State**: PUBLISHED
- **Published Date**: April 07, 2023 at 12:03 UTC
- **Last Updated**: January 10, 2025 at 18:57 UTC
- **Reserved Date**: February 06, 2023 at 12:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in StreamWeasels Twitch Player plugin <= 2.1.0 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**StreamWeasels - Twitch Player**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/ttv-easy-embed-player/wordpress-twitch-player-plugin-2-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- yuyudhn (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3871, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3871
- **State**: PUBLISHED
- **Published Date**: July 24, 2023 at 21:31 UTC
- **Last Updated**: August 02, 2024 at 07:08 UTC
- **Reserved Date**: July 24, 2023 at 16:38 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in Campcodes Beauty Salon Management System 1.0. This affects an unknown part of the file /admin/edit_category.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235233 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Campcodes - Beauty Salon Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.235233)
2. [](https://vuldb.com/?ctiid.235233)
3. [](https://github.com/nagenanhai/cve/blob/main/1.pdf)
### Credits
- xiafine (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7953
- **State**: PUBLISHED
- **Published Date**: July 07, 2017 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 13:03 UTC
- **Reserved Date**: October 07, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Race condition in the bindBackupAgent method in the ActivityManagerService in Android 4.4.4 allows local users with adb shell access to execute arbitrary code or any valid package as system by running "pm install" with the target apk, and simultaneously running a crafted script to process logcat's output looking for a dexopt line, which once found should execute bindBackupAgent with the uid member of the ApplicationInfo parameter set to 1000.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://android.googlesource.com/platform/frameworks/base/+/a8f6d1b%5E%21/)
2. [20150417 CVE-2014-7953 Android backup agent code execution](http://www.securityfocus.com/archive/1/535296/100/1100/threaded)
3. [20150417 CVE-2014-7953 Android backup agent code execution](http://seclists.org/fulldisclosure/2015/Apr/52)
4. [74213](http://www.securityfocus.com/bid/74213) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19638
- **State**: PUBLISHED
- **Published Date**: December 08, 2019 at 03:00 UTC
- **Last Updated**: August 05, 2024 at 02:25 UTC
- **Reserved Date**: December 08, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function load_pnm at frompnm.c, due to an integer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/saitoha/libsixel/issues/102) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41624
- **State**: PUBLISHED
- **Published Date**: October 19, 2022 at 21:19 UTC
- **Last Updated**: May 08, 2025 at 18:14 UTC
- **Reserved Date**: September 30, 2022 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
In BIG-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.2, 15.1.x before 15.1.7, 14.1.x before 14.1.5.2, and 13.1.x before 13.1.5.1, when a sideband iRule is configured on a virtual server, undisclosed traffic can cause an increase in memory resource utilization.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-401: Security Weakness
### Affected Products
**F5 - BIG-IP**
Affected versions:
- 17.0.x (Status: affected)
- 16.1.x (Status: affected)
- 15.1.x (Status: affected)
- 14.1.x (Status: affected)
- 13.1.x (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K43024307)
### Credits
- This issue was discovered internally by F5. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1522, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1522 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1522
- **State**: PUBLISHED
- **Published Date**: May 03, 2011 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 04:08 UTC
- **Reserved Date**: March 28, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in the Doctrine\DBAL\Platforms\AbstractPlatform::modifyLimitQuery function in Doctrine 1.x before 1.2.4 and 2.x before 2.0.3 allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110328 Re: CVE Request -- php-doctrine-Doctrine -- SQL injection flaw](http://openwall.com/lists/oss-security/2011/03/28/3)
2. [47034](http://www.securityfocus.com/bid/47034)
3. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622674)
4. [DSA-2223](http://www.debian.org/security/2011/dsa-2223)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=689396)
6. [[oss-security] 20110325 CVE Request -- php-doctrine-Doctrine -- SQL injection flaw](http://openwall.com/lists/oss-security/2011/03/25/2)
7. [](http://www.doctrine-project.org/blog/doctrine-security-fix) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4442
- **State**: PUBLISHED
- **Published Date**: January 19, 2011 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 03:43 UTC
- **Reserved Date**: December 06, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows local users to affect availability via unknown vectors related to the Kernel.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [solaris-kernel-dos(64801)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64801)
2. [70577](http://osvdb.org/70577)
3. [45891](http://www.securityfocus.com/bid/45891)
4. [42984](http://secunia.com/advisories/42984)
5. [1024975](http://www.securitytracker.com/id?1024975)
6. [ADV-2011-0151](http://www.vupen.com/english/advisories/2011/0151)
7. [](http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43619
- **State**: PUBLISHED
- **Published Date**: March 29, 2023 at 00:00 UTC
- **Last Updated**: February 14, 2025 at 16:16 UTC
- **Reserved Date**: October 21, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of ConfigFileUpload requests to the web management portal. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-16141.
### Weakness Classification (CWE)
- CWE-134: Security Weakness
### Affected Products
**D-Link - DIR-1935**
Affected versions:
- 1.03 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1493/)
2. [](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10310)
### Credits
- Anonymous |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3387
- **State**: PUBLISHED
- **Published Date**: October 20, 2010 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 22:41 UTC
- **Reserved Date**: September 15, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
vdrleaktest in Video Disk Recorder (VDR) 1.6.0 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: a third party disputes this issue because the script erroneously uses a semicolon in a context where a colon was intended
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598308) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18981, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18981 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18981
- **State**: PUBLISHED
- **Published Date**: January 24, 2019 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 17:28 UTC
- **Reserved Date**: November 06, 2018 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
In Rockwell Automation FactoryTalk Services Platform 2.90 and earlier, a remote unauthenticated attacker could send numerous crafted packets to service ports resulting in memory consumption that could lead to a partial or complete denial-of-service condition to the affected services.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Rockwell - Rockwell Automation FactoryTalk Services Platform v2.90 and earlier**
Affected versions:
- Rockwell Automation FactoryTalk Services Platform v2.90 and earlier (Status: affected)
### References
1. [106279](http://www.securityfocus.com/bid/106279)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-331-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10849, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10849 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10849
- **State**: PUBLISHED
- **Published Date**: December 06, 2024 at 08:24 UTC
- **Last Updated**: December 06, 2024 at 14:18 UTC
- **Reserved Date**: November 05, 2024 at 11:59 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The NewsMash theme for WordPress is vulnerable to Stored Cross-Site Scripting via a malicious display name in all versions up to, and including, 1.0.71 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**desertthemes - NewsMash**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb30dac-e0f3-43dd-a20d-9af6c7af3cb4?source=cve)
2. [](https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=250662%40newsmash&new=250662%40newsmash&sfp_email=&sfph_mail=)
### Credits
- Matthew Rollings |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27459, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27459 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27459
- **State**: PUBLISHED
- **Published Date**: March 26, 2024 at 20:01 UTC
- **Last Updated**: August 02, 2024 at 14:37 UTC
- **Reserved Date**: March 01, 2023 at 14:31 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in WPEverest User Registration.This issue affects User Registration: from n/a through 2.3.2.1.
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**WPEverest - User Registration**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/user-registration/wordpress-user-registration-plugin-2-3-2-1-authenticated-php-object-injection-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8474
- **State**: PUBLISHED
- **Published Date**: September 13, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 06:54 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A security feature bypass vulnerability exists when Lync for Mac 2011 fails to properly sanitize specially crafted messages, aka "Lync for Mac 2011 Security Feature Bypass Vulnerability." This affects Microsoft Lync.
### Affected Products
**Microsoft - Microsoft Lync**
Affected versions:
- Mac 2011 (Status: affected)
### References
1. [1041633](http://www.securitytracker.com/id/1041633)
2. [105268](http://www.securityfocus.com/bid/105268)
3. [45936](https://www.exploit-db.com/exploits/45936/)
4. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8474) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-40655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-40655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-40655
- **State**: PUBLISHED
- **Published Date**: June 10, 2025 at 10:03 UTC
- **Last Updated**: June 10, 2025 at 14:13 UTC
- **Reserved Date**: April 16, 2025 at 08:38 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
A SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the name parameter in /antcatalogue.asp.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Dmacroweb - DM Corporative CMS**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb)
### Credits
- Oscar Atienza |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8105, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8105 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8105
- **State**: PUBLISHED
- **Published Date**: August 26, 2024 at 19:15 UTC
- **Last Updated**: September 09, 2024 at 20:21 UTC
- **Reserved Date**: August 22, 2024 at 19:50 UTC
- **Assigned By**: certcc
### Vulnerability Description
A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.
### Affected Products
**Acer - vz2694g**
Affected versions:
- d61d0e09d008bfb29bc32532b1b94fcc4ee2af5e8372c6d38722a4e73ecc71d6 (Status: affected)
**Acer - aspire s 27**
Affected versions:
- 2bd2bfaf79a72eaca45e544e5c6a5bb842b292bdc229b8975b3101a4013e0d5f (Status: affected)
**Acer - aspire s32-1856**
Affected versions:
- 29837e239487cc83818a7f40f9280d9692a50376487899edd603494b0f30e4c5 (Status: affected)
**Acer - aspire xc-1710**
Affected versions:
- cdaa406bda1a58fbe9933622dec218a26f79871d42f0d3576fbf878e51a16201 (Status: affected)
**Acer - c24-1655**
Affected versions:
- 399f68dc94a6c42030efcd57fd034ff721f860b7b5d447779e7a6a6c99aba34f (Status: affected)
**Acer - aspire c22-1600**
Affected versions:
- d938d08543d35d4249a51057c1d9c62bb1f6440af19913c5feffcea47dd3de95 (Status: affected)
**Acer - c24-962**
Affected versions:
- 3d525f96f63995c51ab1bcd2c50ebb71661ffeca9f78f97cc97e851d0e2bbbdd (Status: affected)
**Acer - altos r680 f4**
Affected versions:
- a2679a9595a104d70bddc024dbc4f65f0dc9d906f30a0d1ae6b996b14246a6c2 (Status: affected)
**Acer - altos r680s f4**
Affected versions:
- e5fdaabf11b236c5c7b040d674936e84db746a180ab9999317e16dcb77aeeba4 (Status: affected)
**Aopen - iAPLx-DE(TAA30 TEST)**
Affected versions:
- 94c6f84946db100b505af8a308f69ef6cddc2e310b50641a6e2e63bc9aed54e0 (Status: affected)
**Aopen - iKBLMUx-DER(Volta Charging)**
Affected versions:
- fcd339e12730f057e41ad41228f9612d4954f2d0dbcfeef37e14dcdaf2866e05 (Status: affected)
**Dell - inspiron-15-3510-laptop**
Affected versions:
- 7fbfd8b03d178e074572dff764f28af98c87c7556ce3837ccb8dfe993efa1940 (Status: affected)
**Dell - alienware-x17-r2-laptop**
Affected versions:
- 65f5939878deede2e1b24a6412ba025b78f45b1562e9d365d97e1c76a32a1832 (Status: affected)
**Dell - alienware-m17-r4-laptop**
Affected versions:
- f75b595b9ce5e1e25a5d64e54edffdf696251b4f4e860c0d3a03a183631f090e (Status: affected)
**Dell - alienware-x14-r1-laptop**
Affected versions:
- 620848eeadb74a572d6400672aecca35f46dfdc7b5152bb028fbcbf74ea7bccd (Status: affected)
**Dell - alienware-aurora-r15-amd-desktop**
Affected versions:
- 6348442334e85e8374884ea848685771053a7cf274ccb77559c710b5a00f61e9 (Status: affected)
**Dell - alienware-m17-r3-laptop**
Affected versions:
- 413a04c12bde19f1f97d9d334ed57197f0405f9f10ab7154d2b71e5471577c97 (Status: affected)
**Dell - alienware-area51m-r2-laptop**
Affected versions:
- 253743e7a39d0b709122c5329799f4c4608536eeb632218e7f0cbe1f6e8b5db8 (Status: affected)
**Dell - alienware-x15-r1-laptop**
Affected versions:
- 4fc54067f263791aed2fa4b57b226ea15c4eb0f55b3797e002bb62aa936bdd8c (Status: affected)
**Dell - inspiron-15-3521-laptop**
Affected versions:
- e2242e4aa3a284fcbbcf2f38a10bec24408f1eff74bb307e699ea46f483359f2 (Status: affected)
**Dell - alienware-aurora-r11-desktop**
Affected versions:
- 8f79d9de33f5f131226a78ccb10bb16218a5be51b2105cc32e38ceb0c8c30e9a (Status: affected)
**Dell - inspiron-15-3502-laptop**
Affected versions:
- 62c02a9b5a4d4328ac41c3e3aa7757e64e6c5cd52b9e047333ad18e60d17fcb6 (Status: affected)
**Dell - alienware-aurora-r13-desktop**
Affected versions:
- dc5912033c5ca14475f2d59ca47f25c8840f362f0c8553d13bb06a8e47c42abf (Status: affected)
**Dell - xps-8950-desktop**
Affected versions:
- 6982be0bd8e1aed1251fe5300eec2b515b7cab70e761cfb72074f5d658d092d9 (Status: affected)
**Dell - alienware-aurora-r15-desktop**
Affected versions:
- 7e310dca802db0f7a22d39bb2d7d5b79c7e9df8e5698f0e691942ec334ce5794 (Status: affected)
**Dell - alienware-aurora-r14-desktop**
Affected versions:
- 26a447a94e96fa8d9c590888cae490750c32d5af95faece3595f21efc41c1f2c (Status: affected)
**Dell - alienware-aurora-r16-desktop**
Affected versions:
- 06a9dffc8fb3edafd1b6377cf38879860a0ae3c87f97258e09d189d291f64ead (Status: affected)
**Dell - xps-8960-desktop**
Affected versions:
- 0dcd7494f4926fb04b56e9713f0b62eff3a345b626fa2adaf47636bf0bb4c3eb (Status: affected)
**Dell - alienware-m15-r2-laptop**
Affected versions:
- 69da86e9cf24c49496529f3041604a6bb1c0c0ab86c192239d31d3a9b92467cd (Status: affected)
**Dell - inspiron-17-3782-laptop**
Affected versions:
- 602a23f43b11817ad5439579969753866a54b836f34dfe19342e5188cf088d85 (Status: affected)
**Dell - alienware-15-r4**
Affected versions:
- 608e410d1c0475dac58b1e8f36b477aa8d9e9f28d30ec89d44b550e36bbbaf47 (Status: affected)
**Dell - inspiron-5680-gaming-desktop**
Affected versions:
- f1075841f54237735c1135ebf92baeab9c0c3f8b051229f898520f5b0f265353 (Status: affected)
**Dell - alienware-17-laptop**
Affected versions:
- d4ed519bd5e5ba2f027d00635494d485f19f3080d8baf6d711b190323294e216 (Status: affected)
**Dell - alienware-13-laptop**
Affected versions:
- cb25317443d65ba126174c8b7547c7d2f6c0288f859e2063436eb7b350d9bf62 (Status: affected)
**Dell - inspiron-3472-desktop**
Affected versions:
- 02877ae1ee43c787fa980d6e897e14546ac193100395bbcc6bc26fdf3077e860 (Status: affected)
**Dell - alienware-17-r3**
Affected versions:
- 003130dabf11c8b5df286d9584b3174faa9529cd6149513d13c7ce85d63d97b0 (Status: affected)
**Dell - alienware-13-r2**
Affected versions:
- e6819bd24e063807336994f36e1b7cafbbec46c2679a365dde1b54b720a049e4 (Status: affected)
**Dell - vostro-24-5460-aio**
Affected versions:
- d54e560849c716d0ded4b25d9aacc746f77174cc6d3eeb3a50424eaf337c92aa (Status: affected)
**Dell - inspiron-20-3059-aio**
Affected versions:
- 4b4fd4cc68e48cfbacaf1279ff42ce6e9d37aa7706efffb2a0bb84fbda2aabd2 (Status: affected)
**Dell - inspiron-24-5459-aio**
Affected versions:
- 2c6a0bd7b3a91b9e1b309bde7d405812a42abe40001ce661252d81e7cd009650 (Status: affected)
**Dell - inspiron-22-3263-desktop-aio**
Affected versions:
- 13deddbbdccb6e5411317e96bdb045e28c0dcbb7e86ed5f32e5d24b4b54a5657 (Status: affected)
**Dell - inspiron-3250-small-desktop**
Affected versions:
- 95446bcddec63d36a9f5554815892c104febb73c676a075d789e4b7c69979fa6 (Status: affected)
**Dell - inspiron-24-3464-aio**
Affected versions:
- 3ffd081959db4684563f0044cca9ac16d5467a42d40913f503bad8d171bf1c99 (Status: affected)
**Dell - inspiron-3662-desktop**
Affected versions:
- 5a02b9214bb7ca03030323835a85efd84d369ff02a6baf9193083e2b22e8d0c3 (Status: affected)
**Dell - alienware-13**
Affected versions:
- fe9e2b75babda09ba22a3e99494198e125188d9345bda2b961f10e98e6c2b784 (Status: affected)
**Dell - inspiron-one-23-2330-aio**
Affected versions:
- 374f19a62abe5b7c195038ebc945528046478ba7fac2b7b429edfaa47122e6e6 (Status: affected)
**Dell - alienware-17-r2**
Affected versions:
- e94ccb36573d53127cfdf1f6d617c31ba8562fbdd4b43e48fe1fd52325315756 (Status: affected)
**Dell - poweredge-c5230**
Affected versions:
- 52dbddaf0c9803e7f9dd389519b829515abe97dc0fbd9b979230de28880f595d (Status: affected)
**Dell - alienware-alpha**
Affected versions:
- f1d2c02737ba96e93892f38c161b3f35fbca79a4302e439e8405d3434ed88fdb (Status: affected)
**Dell - inspiron-15-5552-laptop**
Affected versions:
- 73e72a45f92daa7ef76dcf82e6d13113cd9acbd2250d78d2e02232535f83fbc5 (Status: affected)
**Dell - inspiron-3646-small-desktop**
Affected versions:
- 081c82a0748297ca5841b1772330fb6e776c678d425789a66e3072fb73d072d7 (Status: affected)
**Dell - inspiron-24-3455-aio**
Affected versions:
- 2fd0f72190810fa5c4a2a3f57a7bce51dd0baa47584b59b7cba4752a92c66ee5 (Status: affected)
**Dell - vostro-20-3052-aio**
Affected versions:
- c4574a6a5e1e6b4f3b4a3317b51d75c3764395775f900b9ede99dca5e76849f2 (Status: affected)
**Dell - vostro-3252-small-desktop**
Affected versions:
- 9cc04e65928cf4852d0ae16d55808b42542387ae389ebbd3e42f888638909932 (Status: affected)
**Dell - inspiron-3655-desktop**
Affected versions:
- 31a7af2885146a94a82ce214a26e4dcdcfa36969aa47a7a1eaf3725fa6a2198d (Status: affected)
**Dell - inspiron-22-3265-desktop-aio**
Affected versions:
- 7c0c8fab8b15d6de59936a3921f85d9e79f710c6c6db6459804b679d82760e26 (Status: affected)
**Dell - inspiron-17-5755-laptop**
Affected versions:
- 19967c4eebd851b31936c8cab20f86008c7f065cf93217f6cc82350521cc640f (Status: affected)
**Dell - inspiron-3656-desktop**
Affected versions:
- a0e12007dd08b6d9a22fcc6548d0562ea3a966b2030ea9d00c739971e02b6c9a (Status: affected)
**Dell - vostro-20-3015-aio**
Affected versions:
- 05b03dab647098c957cadd2a66ebb1401dc5dae51f267351c0d076c239d5856b (Status: affected)
**Formelife - Studio Sys UPD**
Affected versions:
- a451ed9d6359fd109f495c75bab2678285265a72be64b3e5d0d5447a0e167cd5 (Status: affected)
**Gigabyte - E152-ZE1 (rev. A00)**
Affected versions:
- a9638651a2475403924f124552dc199689a45d2e2e59e3dea2b223667dfb63de (Status: affected)
**Fujitsu - AU47 M1**
Affected versions:
- d3715136d50fc486ef59fb4aee1d7f06552fdf98423809939538fe905a1aa0b3 (Status: affected)
**Fujitsu - PRIMERGY TX100 S3p**
Affected versions:
- bfadb1d20541d4c39857e7b295b7ad20ce81d393f014eae27565bc173c1880c0 (Status: affected)
**Fujitsu - PRIMERGY CX270 S2**
Affected versions:
- e44c2088ee54191192cc690787d74d8ddbfe3fc97c58fb2c42cf8a952784c94f (Status: affected)
**Fujitsu - PRIMERGY CX420 S1 Chassis**
Affected versions:
- c27a0e267f18a89c8ba8aadd37786ef8fe18162b60b45fc209bf992b570837af (Status: affected)
**Fujitsu - PRIMERGY RX100 S7p**
Affected versions:
- e71744d4e18cbee18a1fe381a8a83350487baa6cfbf3729d999f85d7b650610a (Status: affected)
**Fujitsu - PRIMERGY TX120 S3p**
Affected versions:
- 51a9197d05b1aad84546d9469b2c400bd7536eea62b2760a308e5bf84e71d74b (Status: affected)
**Gigabyte - G152-Z12**
Affected versions:
- ad457250d51a0638880d9cf1df9dd029ab34b36265eda73c5459d8d0460ba3de (Status: affected)
**Gigabyte - G242-Z11**
Affected versions:
- 2ab6af312a78886a13144814ce766a771604755f8dd303381658026304415280 (Status: affected)
**Gigabyte - G242-Z12**
Affected versions:
- eef3fd99672410b85e6342c5757723d0d3ccecef9805237955baa20780de8b4f (Status: affected)
**Gigabyte - G262-ZR0**
Affected versions:
- f21b8f836105cdb4051d8bb29302dcf86836b640bf048b24f3c76e930b513b32 (Status: affected)
**Gigabyte - G292-Z20 (rev. A00)**
Affected versions:
- 62bb737d55f4caa082b7ea2aa6f8a59c8efdaf9d5ac5b158cbfb32a6cead8164 (Status: affected)
**Gigabyte - G292-Z43**
Affected versions:
- 1b6ff7d60400c7c21a5b28f947475e61abee187627c1ff12cddb25b1ce59ecb3 (Status: affected)
**Gigabyte - G292-Z45**
Affected versions:
- 18def9ce5aa6551c1d7e77e9f53e34701f77b89d6b32d41ea050cc94d52941e1 (Status: affected)
**Gigabyte - G482-Z50**
Affected versions:
- b14d2e3fadc16c97684a4ae947798bb3a67372441dd7252568f71fc86e98ae9f (Status: affected)
**Gigabyte - G492-Z52**
Affected versions:
- 062e3100bfbe635c66feed863141f7a6f2bfcf0b887a5b3d7ae31fb610d17cac (Status: affected)
**Gigabyte - H252-Z12 (rev. A02)**
Affected versions:
- ac416150a9752dc20107bef240e73c6054af4992348003429bfd97a7373f4f27 (Status: affected)
**Gigabyte - H262-Z61**
Affected versions:
- 340cc5c8f4468eb2d36b684dffbf139b4ac4504b5db3993c3c1b5145858c5131 (Status: affected)
**Gigabyte - H262-Z6B**
Affected versions:
- 0e761b6f3c7d3a1407addf499ff848c493a9d0b0197368cbe858bbc4fa5a4702 (Status: affected)
**Gigabyte - H282-ZC0 (rev. A00)**
Affected versions:
- 0b739af751913ea6ff42999069963dcf6a1bdd58a3de800ab721d9bdbd59bf0d (Status: affected)
**Gigabyte - MZ32-AR0 (rev. 3.x)**
Affected versions:
- a4102b19258804214beb838f61699a7623cc654341e6f60ad986dae805935c14 (Status: affected)
**Gigabyte - MZ72-HB0 (rev. 3.x/4.x)**
Affected versions:
- e0a3837abd91821c4ad98687d2dc6456b7fcb05c8b672c48f242ffeabfa3e9b4 (Status: affected)
**Gigabyte - MZ72-HB2 (rev. 3.x)**
Affected versions:
- 7678e64f7728c059b228ddec74f0918f0544d5193f7b8efe0bf03e8f36c2f5c5 (Status: affected)
**Gigabyte - R162-Z10**
Affected versions:
- 122baff0bf1243b945a7eaa9ca55303469d624d6150d4da136d697878177f1a8 (Status: affected)
**Gigabyte - R162-ZA2**
Affected versions:
- 9d318d27111a3c5a2e3a6451103750d70dec9d6e9d048f7e98fcd60066b98aee (Status: affected)
**Gigabyte - R182-Z90 (rev. A00/B00/AT0)**
Affected versions:
- dbd77ee47e4bccbb2b8af2883765641e9d7c404937da2942637fa1b4b6d4d635 (Status: affected)
**Gigabyte - R262-ZA2**
Affected versions:
- c7f73261e85bdc43932e49254cb8654ed2ce0945379592cecb081d51e5834289 (Status: affected)
**Gigabyte - R282-Z97 (rev. A00)**
Affected versions:
- 076310804e591d1c2d4ab1d53cff0866c04a4189e03e6964b528b8a94faa7991 (Status: affected)
**Gigabyte - S252-ZC0**
Affected versions:
- 8927ee41096d71b75bbef2672e22f640a22ae3588f4f44786fff92c70b861885 (Status: affected)
**Gigabyte - ME03-CE0 (rev. 1.0)**
Affected versions:
- 79700c28616b906f5534cf45d4582878a73f96eff24f1f894bd04b24c00eade8 (Status: affected)
**Gigabyte - ME03-PE0 (rev. 1.x)**
Affected versions:
- ac5ec67cafd72fd7f497c3759b0dcf359de8b7db6941120c0c69d5f3eea4bcbc (Status: affected)
**Gigabyte - ME33-AR0 (rev. 1.0)**
Affected versions:
- 8bdf9b526d2e9e65f23ded60745006c65678d184a258761666d3864432cc0cac (Status: affected)
**Gigabyte - R143-EG0-AAC1**
Affected versions:
- 630321979d80b22e20ca5fc713b2e3e1a8d9ec9ecaa6e2f814193ab8471636aa (Status: affected)
**Gigabyte - R243-E30-AAC1**
Affected versions:
- ae9c0a6e84b0c2912eda99c2de4e95d45c0c8feb2a097e02832ae03c74796f50 (Status: affected)
**Gigabyte - G191-H44**
Affected versions:
- 28068e88e5041161f4485f958f49060d6a865e4beb0b53bafc8f3c5e5e3923b9 (Status: affected)
**Gigabyte - G241-G40 (rev. 100)**
Affected versions:
- 912834981a1de06dcdd4f8cfd11e7db46ac691e5ef20616d76d859e889c303be (Status: affected)
**Gigabyte - G291-2G0 (rev. 100)**
Affected versions:
- 0dbbb711ff0879479dc30b9a7116fb94f093e0225b74916f6b79edae90d8fb2a (Status: affected)
**Gigabyte - G591-HS0**
Affected versions:
- bce2bb4589e9ba8bc8029514a887f3f3bb4ded3556bb5d77dc1a38bad564b435 (Status: affected)
**Gigabyte - H231-G20 (rev. 100/A00)**
Affected versions:
- 819cf98fc21e036b3ae7e6390ae09edcf6fc6c260b22bf6ede0852029ef2495b (Status: affected)
**Gigabyte - H261-H61 (rev. 100)**
Affected versions:
- 190d03dff0cfed20b38ae3270c8bb197b024765963dff6b7730d96bfebcbb24c (Status: affected)
**Gigabyte - H261-NO0**
Affected versions:
- 7eab23785afd939c2abdf53e001e896c67216a6cc75b646d990fdf92ae226748 (Status: affected)
**Gigabyte - H281-PE0**
Affected versions:
- 9f715f7b4128701de97332885c28547fe89ca4214de5af85623ab90670fdbbff (Status: affected)
**Gigabyte - MD61-SC2 (rev. 1.x)**
Affected versions:
- 98c90d7d56e82fcf28b362fbf659c3dfd3f987de96d997defe2ef2e78f33cecf (Status: affected)
**Gigabyte - MD71-HB0 (rev. 1.x)**
Affected versions:
- 82bbbdeed52e95c3f19ad09cc8fff5ea17f9f5341fbef5f88fba478c24e9fd66 (Status: affected)
**Gigabyte - MD71-HB1 (rev. 1.x)**
Affected versions:
- c6957244c7417f2ea28889e02d23b63091b6049b82263872ec3a952765becf9c (Status: affected)
**Gigabyte - MU71-SU0 (rev. 1.x)**
Affected versions:
- 67c4f4ad83e151ebe6e61092bec3153ec269e7be1945dbba0c61091a345a885e (Status: affected)
**Gigabyte - R161-340 (rev. 100/200)**
Affected versions:
- 1bea20b7f9327d743487da2db53e5fb89ace6d22f56600b58918737418e716ee (Status: affected)
**Gigabyte - R281-3C1**
Affected versions:
- aef16fc11c0f6ddca64581dc5b42b9d6e4ab66807ae7c5a30ccfd8f6774a2b18 (Status: affected)
**Gigabyte - R281-3C2**
Affected versions:
- 5077c5d90bce52e6e22371dd64910f30aad69c42aaf9a144165682fffe23c3e0 (Status: affected)
**Gigabyte - T181-G20 (rev. 1.0)**
Affected versions:
- c2b46f65550950fb75d45f5bff54bbed8d4877d803a9688739abd47909fc5f6e (Status: affected)
**Gigabyte - MC13-LE0 (rev. 1.x/3.x)**
Affected versions:
- a1f593c61f035734a87dddbe547a18a52d641785c40cfd320b0a0802be57a1e5 (Status: affected)
**Gigabyte - R123-C00**
Affected versions:
- ddce5a86b35fcf3fe494169bd1834b1f40f24b1a4938e5239bba011dfb981949 (Status: affected)
**Gigabyte - R133-C10 (rev. AAG1)**
Affected versions:
- a09c15eaf24a7804b16fa6fc8e4d16c8ebbc850d070439b2c1ead835f4626dc0 (Status: affected)
**Gigabyte - G293-Z23**
Affected versions:
- 36b879d3be098143f10fd76db48424f3c3470ffffbe2f828ec7462bd8ec73dcf (Status: affected)
**Gigabyte - G293-Z42 (rev. IAP1)**
Affected versions:
- b98e94dc0b78131fe59ca6a9c0a142037d412e2ce5fcdb9d0d6d10f102b1d5fe (Status: affected)
**Gigabyte - G363-ZR0**
Affected versions:
- b2bdfb3a454065b92210cf8a11ef836b45b1db8679d31b45e65a71d1f5efdee8 (Status: affected)
**Gigabyte - G493-ZB4 (rev. AAP1)**
Affected versions:
- 930761233953091f36c6f92e069229f7dd6c86555c03315e1cf51f9fd349ac79 (Status: affected)
**Gigabyte - G593-ZD1 (rev. AAX1)**
Affected versions:
- c564d83ca92af69a296c473cf748d2a6062883164794856c8be429a652e421fe (Status: affected)
**Gigabyte - G593-ZD2 (rev. AAX1)**
Affected versions:
- 74e19d515a7d2d4644f026bd8ea3ee5035b1d325189d9ff2184892a62a7cddc2 (Status: affected)
**Gigabyte - G593-ZX1 (rev. AAX1)**
Affected versions:
- 637be0a8baa2b2a07788add89178c5ff71b837b0d7313d31252293e87a8c3734 (Status: affected)
**Gigabyte - H223-Z10 (rev. AAP1)**
Affected versions:
- 3d2868fe9d5c6ff7e0397d929f170cc6ff006c5d1b5f7bd99d937de8f93dbcd5 (Status: affected)
**Gigabyte - H233-Z80**
Affected versions:
- 5bcc229773a51f96a3904ab181bc621231f881b88a9f59b9427555d9bc868045 (Status: affected)
**Gigabyte - H253-Z10**
Affected versions:
- 4978fa8b487795206594ef340a6c846814e02e248aaf6d6d22e21e58c194fc00 (Status: affected)
**Gigabyte - H273-Z80**
Affected versions:
- 7d216a628dc15d65ad64ee6535a8c190260c9616945108237dab43b3fb1ed549 (Status: affected)
**Gigabyte - MZ33-AR0 (rev. 1.x)**
Affected versions:
- 2c185f2a4900213d87796a8f1b7ba719d3506961c3587cc6b6c39ebae2067e93 (Status: affected)
**Gigabyte - MZ33-CP0 (rev. 1.x)**
Affected versions:
- 13b00bbbbe69eb17f726a086841770b17b9b5b02c903d165e5dcbc371b87e4d6 (Status: affected)
**Gigabyte - MZ73-LM0 (rev. 2.x)**
Affected versions:
- 140cae90bff7b80c41f0fc69c6439ec9ef3e7b54e408a29dcb9b41bcdf07bb3d (Status: affected)
**Gigabyte - MZ73-LM1 (rev. 1.x)**
Affected versions:
- 36d2df2564747908c8f8b28df00ea5504783b9308fc76899d0a5ac1b57f43361 (Status: affected)
**Gigabyte - R163-Z35 (rev. AAC1)**
Affected versions:
- 6e276e4fdfd0ddecdf0c1df49718595d0c4bcb28850897215b88fa01c239b62d (Status: affected)
**Gigabyte - R183-Z90 (rev. LAD1)**
Affected versions:
- 9bb0e8c4030538d2b820b333ffa1b211a7930953f30bc9ba206eb26adfa45741 (Status: affected)
**Gigabyte - R183-Z93 (rev. AAV1)**
Affected versions:
- 44c75c03ddbd8689b7a5df96689d730f002367d428da0982bf089c8f6909a75e (Status: affected)
**Gigabyte - R263-Z35 (rev. AAF1)**
Affected versions:
- 4f59fb01703b0e6cd5140683e9eb6d98c452b3acb64ab642004276daf49e1ace (Status: affected)
**Gigabyte - R283-Z93**
Affected versions:
- 59c838f97265422664d3508ad13e370351e9f482983d942dd7fbf33bbbf00587 (Status: affected)
**Gigabyte - R283-Z97**
Affected versions:
- 42329f479e5572eadd01b94fa8f3f3ae16b7fb4452ac2111f886855e4f52597b (Status: affected)
**Gigabyte - R283-ZF0 (rev. IAL1)**
Affected versions:
- 3b999a0a4b3a7336597e7373e3317dd29b91f5510fdfcc8323988d1edab6c23a (Status: affected)
**Gigabyte - TO25-Z12 (rev. AA01)**
Affected versions:
- 920c4d1c705e8b80e94b19f2c690d1fa4f25f0f6954db6209ed5118d7927fc32 (Status: affected)
**Gigabyte - H223-V10**
Affected versions:
- c9387dfa08afff4cd1f875331c6eb24ac6758d608976603c7398c039dde35890 (Status: affected)
**Gigabyte - H263-V60**
Affected versions:
- 76f7ae620a91ff5e8590a2f22f59018e613aeb12b626b886d6ce2f5e4276fce9 (Status: affected)
**Gigabyte - H263-V11**
Affected versions:
- 57be6485a091b1f60afa9a2af34cff051e293d03696c04ba578f97ac38a34d4f (Status: affected)
**Gigabyte - H263-V60 (rev. AAW1)**
Affected versions:
- 2221d582286ebe04101fc5bd7e353e3f8826c86f948defeb8ac265b8c7ceb8d9 (Status: affected)
**Gigabyte - E162-220**
Affected versions:
- 0c8eb9d218ca1706bd15989efc2915e792918b52cdcac38a4845913631f6cccd (Status: affected)
**Gigabyte - G262-IR0**
Affected versions:
- ebf41cbd3da1701755a788922944f1ec7e13aa8396a03611cef2e3940da4cc20 (Status: affected)
**Gigabyte - G292-280**
Affected versions:
- 5caad5c1ff5d9518017d64a2dc8cb2a83e294520ba6460c0a1b14212688f39a4 (Status: affected)
**Gigabyte - G492-ID0 (rev. 100)**
Affected versions:
- c2902ae30064150ea9236e92b819a2cf96c47ad73f0439233471b89bb04cc13a (Status: affected)
**Gigabyte - H252-3C0 (rev. 100)**
Affected versions:
- 436d56f15a1373c341638cc0edd950866bd519e0cb1e0de07ab7df2c59fba5d1 (Status: affected)
**Gigabyte - H262-PC0 (rev. 100)**
Affected versions:
- 83eeeab2bc322fa12b1ab2be69ba64ade98d999f8e1118ba1d6957c45b52a6c7 (Status: affected)
**Gigabyte - H262-PC1 (rev. 100)**
Affected versions:
- 083289beeb6b2d85285084059994d0ae833833cc7284428b6eea303099d99090 (Status: affected)
**Gigabyte - H262-PC2**
Affected versions:
- db38dafec56ac3bb8948390f699fddf5a3f3f2b33d0a696d41c803c059a5b940 (Status: affected)
**Gigabyte - MD72-HB0 (rev. 1.x/2.0)**
Affected versions:
- eff883c442f1805faa24a44e645413d9c9d3d95e6e0bb5c227124f7eac8187b6 (Status: affected)
**Gigabyte - MD72-HB1 (rev. 1.x)**
Affected versions:
- 43eacbb8f8ffe499f4d0715cf6f798cd81351474abce0e410ecfeed7071740e3 (Status: affected)
**Gigabyte - MD72-HB2 (rev. 1.x)**
Affected versions:
- ede862fa7c647cdd18ab5b2cc90aeec53c35e7f2a9e8d3cc9bd4f1f4e7837b30 (Status: affected)
**Gigabyte - MD72-HB3 (rev. 1.x)**
Affected versions:
- 5ffc9128e64f5a30a78f594923301a6110a8a97c236665f4d4ca7ea28d8a8d21 (Status: affected)
**Gigabyte - MU72-SU0 (rev. 1.x/2.x)**
Affected versions:
- 776719490d81637a1604081fa3e9ea7fc975020cbb45103bbe4efc70ed69c6e6 (Status: affected)
**Gigabyte - MU92-TU0 (rev. 1.x)**
Affected versions:
- d6c0481e584911e1758040140b89593d1839956ef379a6d45d5ac37d0666b866 (Status: affected)
**Gigabyte - MU92-TU1 (rev. 1.x/2.x)**
Affected versions:
- 80073632c479a5522a64e14cd9bdb4cb12c3b86eb8eee5c36f63c40c96865334 (Status: affected)
**Gigabyte - R182-34A**
Affected versions:
- da898f000b47ebe799f88868276a9f9a0744ae283480c70b4506f17218696a52 (Status: affected)
**Gigabyte - R182-NA0**
Affected versions:
- 0b851b25b7dfd2d50e710016c21c06a5aab78fcd64597ca631669b7e6344db6d (Status: affected)
**Gigabyte - R182-NC0**
Affected versions:
- 75adec4e87cb200578f3899c3bd7435bbdadcc4941e5edcb5a3fe3055a8ad190 (Status: affected)
**Gigabyte - R282-G30**
Affected versions:
- ee788077e078691ba0f587f2f9f044667b3463f794d8f38fa0c96e8b68550703 (Status: affected)
**Gigabyte - G493-ZB1 (rev. AAP1)**
Affected versions:
- 64c336027bad7ec398c64d31ec444c47ec0d0b60eaf89202547967cc1b21fed3 (Status: affected)
**Gigabyte - MZ33-AR0 (rev. 1.0)**
Affected versions:
- 4270e08e2fca65beb36f8adaf338c4b94d248a98eb3d205d0fcf6a1cd2d6ca6e (Status: affected)
**Gigabyte - MZ73-LM0 (rev. 2.0)**
Affected versions:
- 29ed1fb8fd445c86fb30ef02e78db0b5be5213ece5edebf5f9702daaa94f5ed2 (Status: affected)
**Gigabyte - MZ73-LM1 (rev. 1.0)**
Affected versions:
- 5be6bd89d0e644714c6c98502efcb6e5b90fbdf3101f82cd821d04d2fb11e60f (Status: affected)
**Gigabyte - R263-Z34 (rev. AAH1)**
Affected versions:
- 00089e4dbac3fcc36ba347ac7d7f9067722601a9a55c2360bf9cae439a52c010 (Status: affected)
**Gigabyte - R263-Z35 (rev. AAL1)**
Affected versions:
- ea3e4c728b066bf6827adb0497ec6e32ab66c546c4ca89fca8f3113c3d74e950 (Status: affected)
**Gigabyte - GA-H110M-DS2 (rev. 1.0/1.1/1.2)**
Affected versions:
- 5e55411efbcff6e593a2de57f46b6040324f35c1ed14f902333a71b6cea38930 (Status: affected)
**Gigabyte - E251-U70 (rev. 100)**
Affected versions:
- 6c404dfcb9550bf9080bb679ccfba607c96b149772c345ddeab0f881fdd16f8b (Status: affected)
**Gigabyte - G293-Z40**
Affected versions:
- 84c011953dcd5981156d4d5488c82f53ee73cc839d3359004d491b0f1fbf2808 (Status: affected)
**Gigabyte - G493-ZB0 (rev. AAP1)**
Affected versions:
- c4dca3104af399295b160bd3ad7d01d38f9dc86e7143dceae68403480d7c19cc (Status: affected)
**Gigabyte - R283-Z94**
Affected versions:
- 47da1b96a4296aa07edf9e4f54df7dc663e8c8134477ee8718319667073a5d7f (Status: affected)
**Gigabyte - R283-ZF0 (rev. AAL1)**
Affected versions:
- 0f77013fe1a7795b311828614ab371df89c88dd7ddd165d17130422289838731 (Status: affected)
**Gigabyte - MX34-BS0 (rev. 1.x)**
Affected versions:
- c5b7f646ddc82ab730c91e13b52d86d9fa3c28d0b0cd1569fcf0a9b77509d7c4 (Status: affected)
**Gigabyte - R123-X00 (rev. AA01)**
Affected versions:
- 876f82d1e8632fff9b24a04be60fb1486a1e4eefb8b20183580874680fc06150 (Status: affected)
**Gigabyte - R162-ZA1**
Affected versions:
- 8567d8f2fd8a32c33c81aae33ef21e34f818159199f0beed6c10dd6e2283351f (Status: affected)
**Gigabyte - G242-Z10**
Affected versions:
- c7e9eff716b9e7000c89692637c58014ee0be37d7ddd39a0c2ae4ecba82e38fe (Status: affected)
**Gigabyte - MC12-LE0 (rev. 1.x)**
Affected versions:
- 8e37407821e4af774debc51d6dd492c11fe6652ebfd25febae7a603a7ef69822 (Status: affected)
**Gigabyte - MW34-SP0 (rev. 1.0)**
Affected versions:
- add3e41160a5effcd5a6dbfcda45072059e02f5a6fa39042fdbf36ae8193067f (Status: affected)
**Gigabyte - E133-C10**
Affected versions:
- 2d5900b5a13292df17073793a00393ea8e60a645104ebf8d95c5407674421c76 (Status: affected)
**Gigabyte - E163-Z30**
Affected versions:
- 1ecbdd2c9fdb6e9bc4f2e48b5b3e1651977a39eddc6480cc4888462636648f38 (Status: affected)
**Gigabyte - MC62-G41 (rev. 1.0)**
Affected versions:
- dc4153ee0a3333ab789383cef8b0d9760b9f416138a093cd3357370261babf4e (Status: affected)
**Gigabyte - MX33-BS0 (rev. 1.x)**
Affected versions:
- a0e138096681313a3923eefa3bd3480e6416c73d627d3888b36ce7bb6b2b989f (Status: affected)
**Gigabyte - MC13-LE0 (rev. 1.x)**
Affected versions:
- b9f880e1df8c0a237dd9cf607e19287817eb75f59057e8df89ade763ca7b6812 (Status: affected)
**Gigabyte - R263-Z33 (rev. AAL1)**
Affected versions:
- d18f17a61f21b0b96542a3efd2a543cf87b434d86055e48aaac951f09c53e0e3 (Status: affected)
**Gigabyte - R133-X13 (rev. AAB1)**
Affected versions:
- 3e3fbdde80c01e9755408922f67ad04834a61cb5e519ab010b151b68772a9784 (Status: affected)
**Gigabyte - B760M D2HX LITE SI (rev. 1.0)**
Affected versions:
- 641b9c056a8fecdc3a572db60e00f0b0fed7722fe9cf377bc4b6ee9208423107 (Status: affected)
**Gigabyte - GB-BER7-7840**
Affected versions:
- f63845840d8dabf49f4a1137c4b1558257748fc26812bd693de92ed0257362ec (Status: affected)
**Gigabyte - R163-Z32 (rev. AAG1)**
Affected versions:
- 7fd571d3ff56fa697a130f06d98ae3d2568e4e3d5848cc0966f4e00617801cf2 (Status: affected)
**Gigabyte - MD72-HB2 (rev. 1.x/2.x)**
Affected versions:
- e01af875c3100fa3d72d014aaf93417317a1a4a4e69c4a28c216c73dfa5e041f (Status: affected)
**Gigabyte - GA-H310MSTX-HD3**
Affected versions:
- 094ba53bd3f96434153ed4c426a2c9f8b62ccab2b7ff60932061f9fa84a9309e (Status: affected)
**Gigabyte - GA-H310TN-CM**
Affected versions:
- 9f5d955a2b3e33b9ba93e98d56a3ce4c997c4234161a4637aa88eda81cfc743a (Status: affected)
**Gigabyte - GA-H310TN-R2 (rev. 1.0)**
Affected versions:
- 5ad827acb383f51e80cfd4605f8b02186b680f61ba0129e6c054af896dbe6d48 (Status: affected)
**Gigabyte - H310N**
Affected versions:
- de983965452c5d6bdbf7e4137ef30782337efded699beb2db1cb1cfab2a9cdb9 (Status: affected)
**Gigabyte - R143-E30 (rev. AAB1)**
Affected versions:
- a0ed7595a6c1b6e26d1e930ca3a8c1c0dd619db049ef112fa653b8bf9b026bda (Status: affected)
**Gigabyte - TO25-Z11**
Affected versions:
- c70331be155ee7c048b0296e15de195158c1215b1ddb31fb842018467c5857d1 (Status: affected)
**Gigabyte - G293-S46 (rev. AAM1)**
Affected versions:
- 4151a030854ddba555d497a9d2626723d662a9c81e86b39e4e2c02c209ebabbc (Status: affected)
**Gigabyte - R163-S35 (rev. AAH1)**
Affected versions:
- f8c33896586db20586273c8378d4fd18e49a4db7b6ac15333eb67536536c40da (Status: affected)
**Gigabyte - R283-S94**
Affected versions:
- 70ed5ca85b768ef6f9bb36baa9596d07fb259c775b457464c138a7494f7340a2 (Status: affected)
**Gigabyte - TO25-S11 (rev. AA01)**
Affected versions:
- 9ad9beef2a8253dc72e6bdd37d76bd54fcae482fbd3308904d87dfaa4df281e2 (Status: affected)
**Gigabyte - G482-Z54**
Affected versions:
- f446b6d7d932602558e4abdbea9a9b826a12d27c535ca6c2d0bafa5e34ec3864 (Status: affected)
**Gigabyte - R183-S90 (rev. LAD1)**
Affected versions:
- 9cee49e6b444421c55798f7ce7bf7a1eebc6d6f75319c2bcb39bd11b4075c71a (Status: affected)
**Gigabyte - MX34-BS0 (rev. 1.0)**
Affected versions:
- 5380cc7bc3d652f0d0316dd3225fb45f1bb054e9c568b9c8e8bf9591306cdbaf (Status: affected)
**Gigabyte - G293-S45**
Affected versions:
- 77b27203150cbb0b885df35e361b1a193163316e3f315be4e7967312b097aedd (Status: affected)
**Gigabyte - R163-S30 (rev. AAB1)**
Affected versions:
- e0c5fec105a86f8b7ffa77bd983d3ed0b54cbc65542e0ffdb9aae29cfc2ddd8e (Status: affected)
**Gigabyte - R133-X11 (rev. AAG1)**
Affected versions:
- e8f28f55ed2fb648c7237e216e5c377da45e9f6d6a746605515002aaf502ae4c (Status: affected)
**Gigabyte - E283-Z91 (rev. AAV1)**
Affected versions:
- 1fee6620306388e1d23dba7889b858bd56a091cf04ee68db32639e14d9b87a14 (Status: affected)
**Gigabyte - R143-EG0 (rev. AAC1)**
Affected versions:
- 672102a1648ac9839230ff8c818edc737b01fbe92250ae0db8ae2441b257f5d7 (Status: affected)
**Gigabyte - GB-BEi3-1220 (rev. 1.0)**
Affected versions:
- 39ea2372c5af03dacf3a4112895e5bb59489497c23828e38acd4b4fec35df970 (Status: affected)
**Gigabyte - GB-BEi5-1240 (rev. 1.0)**
Affected versions:
- 2d34f17d147062c8aa223fd2e528b8c10c0879e8ee2d6064607f45e93908a935 (Status: affected)
**Gigabyte - GB-BEi7-1260 (rev. 1.0)**
Affected versions:
- dc45a2e1fd0112f5deac4678b7b093d4e233256af8e492104658c38a5ad426da (Status: affected)
**Gigabyte - E283-S90 (rev. AAD1)**
Affected versions:
- 059d906408ac5c7daa81504d9e9057023d7686c9383faa48ef6f195d4b32d997 (Status: affected)
**Gigabyte - G493-SB0**
Affected versions:
- 394bf746dc6183441ea4d034769683c92eb999195fe6ab6e1fbf10c4cd1aed32 (Status: affected)
**Gigabyte - H263-S62**
Affected versions:
- d733c74eeca529ae54b842ea757213532781db14b38c9222f4eb34be5ac7e1b8 (Status: affected)
**Gigabyte - R163-SG0 (rev. AAC1)**
Affected versions:
- 35ec23b26774c9030a1deca1b66837805aa7bedd6518d5be506681f2296b5e17 (Status: affected)
**Gigabyte - S453-S70**
Affected versions:
- 9fb2a464f53ad26c1bab90ee2437c0c265ef6d0faf419af58baca323c6156b7a (Status: affected)
**Gigabyte - E163-S30 (rev. AAB1)**
Affected versions:
- a7ac0837b77d7a91edb4e5fbfde127eafe1601e858a6312af9e555646de46480 (Status: affected)
**Gigabyte - G293-Z20**
Affected versions:
- abe7715141d75d5817b2456105d037d116c441796c7a373dbf3307412e111bf5 (Status: affected)
**Gigabyte - TO15-Z40**
Affected versions:
- b0766c740aceae7f71543bfb22d3c757640e714e52f32a17a3d42f9d16d39383 (Status: affected)
**Gigabyte - E133-C10 (rev. AAA1)**
Affected versions:
- 2af044c4474abc534ec6da84e1e6415386421dbc897ed2946efe131840de8161 (Status: affected)
**Gigabyte - R271-Z00 (rev. B00)**
Affected versions:
- dcff49fc24b1b8cf02fce97a15b0bc8bb19c6979df21136007c677ac3b9023c7 (Status: affected)
**Gigabyte - ME03-PE0 (rev. 1.0)**
Affected versions:
- 2bf55cd3046c8fb548063466ea9eb0802c4401f3c04a13f9ef693fe7c23570ef (Status: affected)
**Gigabyte - GA-H110M-DS2 (rev. 1.3)**
Affected versions:
- 8448a4dad1df740fb0882eb8533c40a2227e385f9f2f07a546c1d2e6020b7cbf (Status: affected)
**Gigabyte - GA-H110M-H**
Affected versions:
- 0dc9159572d38d754e168d1290219dc558cc72e67e8fa72727ddd43a5ad187e7 (Status: affected)
**Gigabyte - E152-ZE0**
Affected versions:
- 83d24271a7b1b9bba7070c128edcc8b4d6a5e7c96caa920baf5c014efbf6775d (Status: affected)
**Gigabyte - R282-Z93 (rev. A00)**
Affected versions:
- 255ffd2b1161bb8a53626ad3920c40eb5f0f63cb1d5710969abf31797f8771de (Status: affected)
**Gigabyte - R162-ZA0 (rev. A00)**
Affected versions:
- 85f9cdc44ed670c411f0892b769e91567f9a81bcdeb92861fcf6e2ffc7773f9c (Status: affected)
**Gigabyte - S453-Z30**
Affected versions:
- 92c197c09f8aaa2e20427f649cacd1484ef7a345040f54eeb3135745b6f671dd (Status: affected)
**Gigabyte - G262-ZO0**
Affected versions:
- efc056c3caa782e178b7ade2333316ef39a0a6e17157c68a61927b3a045061e9 (Status: affected)
**Gigabyte - H262-Z6A**
Affected versions:
- 2ac696517ae7da9f3efe81af66b89b5f7b24beb6e09aca06e61e454915070a3b (Status: affected)
**Gigabyte - MZ72-HB0 (rev. 3.0/4.0)**
Affected versions:
- 2ad038a3b127e95df1fc8fa61bafb96a113fe0093d9ecee66db9ece973c5a257 (Status: affected)
**Gigabyte - MZ72-HB2 (rev. 3.0)**
Affected versions:
- 225cea866d8c5843d32d6edc97764b69b05707e47c9537e6e6e7f4ac06775816 (Status: affected)
**Gigabyte - G152-Z12 (rev. 200)**
Affected versions:
- e7969888310f2eceb73544fd8108eda95c1a3ea62ff57da93c643bc55b898f50 (Status: affected)
**Gigabyte - G292-Z40**
Affected versions:
- d31512a9a475071b6e14a03aed7c5286aa0c622925d7a840bdee7158a7d9583c (Status: affected)
**Gigabyte - H242-Z10 (rev. A00)**
Affected versions:
- 1096dfa8e4e5f5d2410eacac73c51bd1b946bc4d2f110a44e8c33f53d0182eb5 (Status: affected)
**Gigabyte - R152-Z30**
Affected versions:
- 5297e4a26fd8ed927abcb2438a5ac2a4e35e770d06d272ed77b3d847bebb11fb (Status: affected)
**Gigabyte - GB-BSi3-6100 (rev. 1.0)**
Affected versions:
- e81cd2760e4d5090b1d0da86309ba993256d88a4abb8065ce83266bcf4f0ca34 (Status: affected)
**Gigabyte - E283-Z90**
Affected versions:
- 40d4956a427564b83b0c1a86f1c32510feeeb5282eccfb211bd29f0a0a7767c4 (Status: affected)
**Gigabyte - R163-Z30 (rev. AAB1)**
Affected versions:
- 58a47d7e153b03ce005686aac24bfe31f405a7cc4670b826ccc775a839de7ee1 (Status: affected)
**Gigabyte - G262-IR0 (rev. 100)**
Affected versions:
- 43dd7e97fc6fd1fc0ac1ef601c00eed9ec9b5d5325243fb8c6f0ae3517fce89b (Status: affected)
**Gigabyte - G292-280 (rev. 100)**
Affected versions:
- 5b7eee5f852ce1424dfd476d8713650e528fa359f19e551b7adb9b6a12ad467e (Status: affected)
**Gigabyte - G492-H80**
Affected versions:
- e79fefca976e762f76a8ce36494928dc2ba039de02b69659a87b5245cb27ac2f (Status: affected)
**Gigabyte - H262-NO0**
Affected versions:
- d04141fdfff53843c10ef247e885ad9fb62ffc58c89580718ecd2b102a590f30 (Status: affected)
**Gigabyte - H262-NO1**
Affected versions:
- ca65772cdd5fef0d287957d5a6e308fa1126b9b40a2cd701e1190e852ce0bfd2 (Status: affected)
**Gigabyte - R182-340 (rev. 100)**
Affected versions:
- ade7666d9e200c0929260025880128674b63349911f1d03857a42cf753f10b80 (Status: affected)
**Gigabyte - G291-280**
Affected versions:
- 6917b15d532856e0c0f7cbfc3501f4d5c273616046d94695e01ce07303f6011f (Status: affected)
**Gigabyte - G481-H80 (rev. 100)**
Affected versions:
- 53a8edb12be4b79c231d3f950e20343f20f3727a6544504259639fa6506f2457 (Status: affected)
**Gigabyte - H231-H60 (rev. 100/A00)**
Affected versions:
- 56289ef76755acc7f4e843b3ee0f29ec8f063f113f640b157d095d18a866d874 (Status: affected)
**Gigabyte - R181-2A0 (rev. 100)**
Affected versions:
- 01c95a23c9bfeff78ab2b6d77ca33e6a967cf624d1afb5fad393776c79a25920 (Status: affected)
**Gigabyte - S251-3O0 (rev. 100)**
Affected versions:
- 303797b38020f7b91381f887954f819112509c4b855ebd75c7a31dd227acf1cc (Status: affected)
**Gigabyte - S451-3R0**
Affected versions:
- c9a2e7d55dcf6e3f7537515d2c6cb0e36770a5fbea7a01dafe4a90359ade90eb (Status: affected)
**Gigabyte - WRX80-SU8-IPMI (rev. 1.0)**
Affected versions:
- 249510667c5c37bd25d731655d7dbf18c5fc2d8d377c0c2326810cda6d9c0f46 (Status: affected)
**Gigabyte - R292-4S0**
Affected versions:
- 1dcce1bfce8c75c3fdf8a307ba7f6d0231504095e1c4e6bf2166a4cf75df29cc (Status: affected)
**Gigabyte - R283-Z93 (rev. AAF1)**
Affected versions:
- dcb8c9ec0cdddcf94852ac34e952a349af1ca970d825dc239075286875a9257d (Status: affected)
**Gigabyte - GB-BNE3HG4-950 (rev. 1.0)**
Affected versions:
- ed3834eedb770cbb44be9357c5b05d9800ec9577ba3eb6faa3c47460d78814ee (Status: affected)
**Gigabyte - R161-R12**
Affected versions:
- 523e9d1bf5710144e36f9535141955dcf9a3d075fff092f6b4d1e12ee2eda562 (Status: affected)
**Gigabyte - GB-BXBT-2807**
Affected versions:
- 16f990d85b5a42e9b762a08f69614b0c6e3f5c1236364ca38efe92a5dd729bb4 (Status: affected)
**Gigabyte - MB12-CE0 (rev. 100)**
Affected versions:
- bcf637c0c5be2018d76681b66661d1e6f061c2e1366124f4ef8754c074f8a95c (Status: affected)
**Gigabyte - R263-Z30 (rev. AAC1)**
Affected versions:
- 92780ca87316f207f58c61f65bc8f702fbb2881688d9819dbe8ebbbbed6e1f67 (Status: affected)
**Gigabyte - TO23-H60**
Affected versions:
- 955038954a0d1463be658fe518b6006f9fde166b67e9007f3befb9cfa62e5da9 (Status: affected)
**Gigabyte - GB-BRR7-4700**
Affected versions:
- a462c1a73072f541b6719e4cdee351d44a7cb3593dabbc6809b5b387d909eee5 (Status: affected)
**Gigabyte - GB-BRR7-4800**
Affected versions:
- 424e8b46bd3feec4aae4ec33eae1ca8658526eeb66e121adb244d3c322dd005d (Status: affected)
**Gigabyte - GB-BRR3-4300 (rev. 1.0)**
Affected versions:
- 5cc12fd686928c97fa7fbfda17250579adc4e7bd11e46e88650de5ebca6ed03c (Status: affected)
**Gigabyte - GB-BRR5-4500 (rev. 1.0)**
Affected versions:
- 6ea44803e9b188161126374021e9d845136edd676d33fc80e5f9348b8d577a87 (Status: affected)
**Gigabyte - W771-Z00 (rev. 100)**
Affected versions:
- d07d7094aa0dbdb896f8d3dceb093ea8c1d72ee0009472ece73190d2071aee6e (Status: affected)
**Gigabyte - MB51-PS0 (rev. 1.0)**
Affected versions:
- 372c9a6f86f60d7cef6ae2d2ee7ca0d55df998ba0a47468668c6758b3d3db725 (Status: affected)
**Gigabyte - X299 UD4 Pro (rev. 1.0)**
Affected versions:
- ca8a556421eb318b0e5901085e97c448f1646a1636e34ec6e4d76f4a3d61f601 (Status: affected)
**Gigabyte - G492-ZD2 (rev. A00)**
Affected versions:
- c8ab653dc8a40406c0a8a4d71b56059a2f9b7c7ab9e883290acd071941c7bc25 (Status: affected)
**Gigabyte - MW22-SE0 (rev. 1.0)**
Affected versions:
- d369b68d0c38afedcbb0eeb82f2d06d486e9c0ce212ebe3b0d9f8dfcdbbbf5b0 (Status: affected)
**Gigabyte - MX32-4L0 (rev. 1.0)**
Affected versions:
- 78ce8406e3b09a3450d41ba11c1dae91456f25c796441dabb52c7b7e261b3a69 (Status: affected)
**Gigabyte - MW32-SP0 (rev. 1.0)**
Affected versions:
- 0cd64d233ea4db6db2a90962d2888f4e5b967fbb24fa944ccbbfc2c02d5a358a (Status: affected)
**Gigabyte - MX32-BS0 (rev. 1.0)**
Affected versions:
- 40234a98894a9855db1a921ffe9d272caa1e5702dcdd14afc82f6a91753fd460 (Status: affected)
**Gigabyte - GB-BER3-5300**
Affected versions:
- a3ab1a934f5806b5472f13257771924e3fcbaed289b2d6a860ec2fbbfd2d0c11 (Status: affected)
**Gigabyte - GB-BER3-5400**
Affected versions:
- 06879fa2383284b0222247992f7d359bf5d0ddcebfdcd5b42a20ee5f46a8473f (Status: affected)
**Gigabyte - GB-BER5-5500 (rev. 1.0)**
Affected versions:
- 68f88269c87ecb16f9b7d9269005ce505a3498b9e3440054742481a2254d5aea (Status: affected)
**Gigabyte - GB-BER5-5600**
Affected versions:
- d98134626baccb58d0d97613efeae6d504b112a4f8d8849e2599ceecf55f7fad (Status: affected)
**Gigabyte - GB-BER7-5700**
Affected versions:
- ec439231fb2d3491a63b173bda078a128bf02b19262b3549f3a799992442d9e7 (Status: affected)
**Gigabyte - GB-BER7-5800**
Affected versions:
- 7704838038c24fa47fadd54f19c5911fa39823ecfb5f451db59271112a07e777 (Status: affected)
**Gigabyte - GB-BMCE-4500C**
Affected versions:
- 43cce322b194b9be7bedb247098e8b691878f238b14199cfba11af4422b3464d (Status: affected)
**Gigabyte - GB-BMCE-5105**
Affected versions:
- c412ba0cc85278e93f349b9fae6011982f23f8f3a7b6539a36d90b551ae1006f (Status: affected)
**Gigabyte - GB-BMPD-6005**
Affected versions:
- 6f14b4087af44921d294462fb0d65259f18af0cc23b7ab1c5b87773b9c3c13e4 (Status: affected)
**Gigabyte - GB-BRi3-10110 (rev. 1.0)**
Affected versions:
- d6626703c5940d244a87f2967f0c54f4a5a7b53597dd92a0b561f28a2f9a9161 (Status: affected)
**Gigabyte - GB-BRi7-10510 (rev. 1.0)**
Affected versions:
- af98c4cea319d387751cb356a28390fa630a1b2f66920a3202b37e0acb861ade (Status: affected)
**Gigabyte - MF51-ES1 (rev. 1.0)**
Affected versions:
- dbe505cc1f3a4135628b7e22c7fddb99bf3ee1d46f82a84219e8cb0905c20ff2 (Status: affected)
**Gigabyte - MF51-ES0 (rev. 1.0)**
Affected versions:
- d27437e85db58b607bc173e844b31dbfb8b949ea3c225e13377ae942572c4611 (Status: affected)
**Gigabyte - MF51-ES2 (rev. 1.0)**
Affected versions:
- 9bd110e7a5a1e1cdd77af3702309d98f748cdec6d25a5e76c04f63417e2e6a8d (Status: affected)
**Gigabyte - G492-Z50 (rev. A00)**
Affected versions:
- 0b2bd8851706081fb9e310e5f4a7a97c3a0bb32eb7167a609e602ba6cec1ea89 (Status: affected)
**Gigabyte - GA-J1800M-D3P (rev. 1.x)**
Affected versions:
- 19c85b8fbc25322544c775c9fdcee793a563d51b32ede6b29c02248e0813f42b (Status: affected)
**Gigabyte - GB-BSRE-1505 (rev. 1.0)**
Affected versions:
- 2f18902d7afbe8d900b6552c2d7a86760f05c4698c1018053b2fad97f6ab51f7 (Status: affected)
**Gigabyte - GB-BSi3-1115G4 (rev. 1.0)**
Affected versions:
- 6f6c034629c0d8df05227f4e7d85d02d8fa52d7fda0940fd4f80f62a23be06c8 (Status: affected)
**Gigabyte - GB-BSi5-1135G7**
Affected versions:
- baddfacc85e4aa97915493c4f66cde6002104bfc10ecfa3839c4fc6e32597953 (Status: affected)
**Gigabyte - GB-BSi7-1165G7**
Affected versions:
- b191f4293202c488ba673c288bb5edbaf506a9835a508ec38fa705797738c918 (Status: affected)
**Gigabyte - GA-H110M-S2PH**
Affected versions:
- a5013d7b2208a6c2d1ea75bbef06711be676430321f4b275140049d6fd53f8df (Status: affected)
**Gigabyte - GA-H110M-S2PV**
Affected versions:
- 60d70e509fc3f7c1da701e5195218f20e297c11d2dd4f0327ea4d25732c120d0 (Status: affected)
**Gigabyte - G292-Z20 (rev. 100)**
Affected versions:
- e0ae28d4aca350a31f66402f4b0f46e05e4aaf77adfc813179a7df20c8f4b148 (Status: affected)
**Gigabyte - W331-Z00 (rev. 100)**
Affected versions:
- 4f7c60d69e3c374da221c2ab2d2393794965f2e0e1cf296f5a64d4d77299089e (Status: affected)
**Gigabyte - X299 AORUS Gaming**
Affected versions:
- c5534cc441ef64739b9609ed3160f296cefda8faaae992448baedb01e9310be7 (Status: affected)
**Gigabyte - X299 AORUS Gaming 3**
Affected versions:
- 82f181dfcdb973537274d8fbf4ad83d60ba8b7315bf99def64780a8c29c6a843 (Status: affected)
**Gigabyte - X299 AORUS Gaming 3 Pro**
Affected versions:
- 810a53fa70ab5b27f2dbe92948b79638dc87fe6015f94c41501562a47805e28f (Status: affected)
**Gigabyte - X299 AORUS Gaming 7 (rev. 1.0)**
Affected versions:
- ee03798b5db2710360c33566b2e61b46bc664ff8a25b257bbfb620c332d70f2b (Status: affected)
**Gigabyte - X299 AORUS Gaming 7 Pro (rev. 1.0)**
Affected versions:
- 6ca7152161d4d3a65a2d4fa707a3784811bbb7507332f1c82662456f5f76b5a5 (Status: affected)
**Gigabyte - X299 AORUS Gaming 9 (rev. 1.0)**
Affected versions:
- 14d6cfb20110768c3da503050dd9222a2514aecd0ca49f2c08e64bf6595b0cd2 (Status: affected)
**Gigabyte - X299 AORUS MASTER**
Affected versions:
- 326280954738ecffd23930791fec6dc0ba2b9774c85886b98d33723974c3427d (Status: affected)
**Gigabyte - X299 AORUS Ultra Gaming (rev. 1.0)**
Affected versions:
- 91933d348054953096135089baa7b6ca61dc43e9fc25dff45c9fb4dbf9e8d606 (Status: affected)
**Gigabyte - X299 AORUS Ultra Gaming Pro (rev. 1.0)**
Affected versions:
- 22869435dede4b52f75a6b82266b67f8930857829185f97bd322c3a72a8899e1 (Status: affected)
**Gigabyte - X299 DESIGNARE EX (rev. 1.0)**
Affected versions:
- 0a1aa3edaeb6b389a08cded1ce036ea9178527389ca1549442a35f8b1b2bcdf6 (Status: affected)
**Gigabyte - X299 UD4 (rev. 1.0)**
Affected versions:
- 3716034ddd789a3e8e1c688a477e4735f228bc3acfa18b63e719d7cd1e8fedfb (Status: affected)
**Gigabyte - X299 UD4 EX (rev. 1.0)**
Affected versions:
- 6fbe2e27bf4b4543e39c88a4702f487b15d02a47b04e006759cfb6432d82fa0b (Status: affected)
**Gigabyte - X299-WU8**
Affected versions:
- d15d9bd6d7980d27bb56848643aecef336c8ff0a695e155071b7dafb1f75d08c (Status: affected)
**Gigabyte - H261-Z60**
Affected versions:
- 826f711b5accbc542c3e33d607f1dd10edfb3486772975f204aa2de43bdb52fb (Status: affected)
**Gigabyte - MZ71-CE0 (rev. 3.x/4.x)**
Affected versions:
- c0c4215e8207d397914a56edf50428f01ad3676c23630ef7b8c06cf36e45a7e1 (Status: affected)
**Gigabyte - G292-Z40 (rev. 100)**
Affected versions:
- fcbed542b232be01a0ed2d52dcd3dddc101fafed3da9f3e3aa6b17b652e640f4 (Status: affected)
**Gigabyte - G182-C20**
Affected versions:
- e133210fdecf2d57cde25b0bc706437210318e37655eb22a97000bf27a02c177 (Status: affected)
**Gigabyte - R162-ZA0 (rev. 100)**
Affected versions:
- 03e23d40902c4e68730e74ddadcc716f46032774001e1b6bc606c5294d4bacf8 (Status: affected)
**Gigabyte - MZ72-HB0 (rev. 1.x)**
Affected versions:
- 390cd14f2be9ff14cdcc90a9e705cc017bb2535e66b93859eddc233425998937 (Status: affected)
**Gigabyte - G221-Z30**
Affected versions:
- 8e8b934cc0bd3127262a9e52fac754d64abe27c09902a78acec81c0daf883f77 (Status: affected)
**Gigabyte - G291-Z20 (rev. A00)**
Affected versions:
- 8d49dfb69b420390cf13ff8f3a3b3ab88e5dcd46a182c4ac5be9868bc6278c35 (Status: affected)
**Gigabyte - MZ71-CE0 (rev. 1.x)**
Affected versions:
- d3b797002d243cbed1182569ffc6b5e5f6243e59ee27bbabae7362fa80be6e91 (Status: affected)
**Gigabyte - R181-Z90**
Affected versions:
- 24be564cb337350bd9cbf409cd95f29b760e1ff872f99b27379c40b533e9f2e6 (Status: affected)
**Gigabyte - R271-Z00 (rev. A00)**
Affected versions:
- 99f913a3f88561d7163bb1ed79380dd346897e577315eef71695aeb861e82579 (Status: affected)
**Gigabyte - T181-Z70 (rev. A00)**
Affected versions:
- e42a49d2674808c57b781e8b3d78613a143ba9797d1a856ccd2a62302a49520e (Status: affected)
**Gigabyte - GB-BRi7-10710 (rev. 1.0)**
Affected versions:
- 14c74b9b80e71d3302c13aea0dfea3560e1452a55c698c20e457c5b495154443 (Status: affected)
**Gigabyte - GB-BRi5-10210(E)**
Affected versions:
- 56430f2f4f9aef4e50f503dc8397fdb20b005bf38a8b9029c43e3eed56c39229 (Status: affected)
**Gigabyte - G492-ZD0**
Affected versions:
- bacd1c945c9ff1ecea3e29039ad8b742c6d040e5792bb45008c1b7f664fb36bb (Status: affected)
**Gigabyte - G292-Z46**
Affected versions:
- 31aa7ba19f6edb9472a3da22793803c265a0cb0b7cd7979db56251c37edcfe5f (Status: affected)
**Gigabyte - R282-Z90 (rev. A00)**
Affected versions:
- 8cc6129ba23848fbd65b91a9b70999aad19d3b7a6d168066cbe4a0b759fc5a5c (Status: affected)
**Gigabyte - R282-Z96 (rev. 100)**
Affected versions:
- 605db3a5cf91d915929488803446e5a51dda16d661e76840b707474d2df79069 (Status: affected)
**Gigabyte - G482-Z50 (rev. 100)**
Affected versions:
- 9b0c2aaaef88b38db18e4efd44b2582c8401f9a17f2c54d0e1f07d2c94a9a5f4 (Status: affected)
**Gigabyte - GA-H61M-S**
Affected versions:
- 5fb07e319cf6d523a488d879e7eeef3321e90fbee049efb642b34ad2a32611b8 (Status: affected)
**Gigabyte - G492-ZD0 (rev. 100)**
Affected versions:
- 25555956322c0eaecf58fd759ed9b0b7857f9dd149b02de55e2f5eedb291117b (Status: affected)
**Gigabyte - W281-G40**
Affected versions:
- f7c504d3d3907aa4c7f70ca1fbe1fed7e73426eb987b9c5e2f6b31d42e801af1 (Status: affected)
**Gigabyte - MW51-HP0 (rev. 1.x)**
Affected versions:
- 1190d15905ff8656d2d0601c388df633b1646fd585de4fe871fdf93fc23d35a0 (Status: affected)
**Gigabyte - G482-Z53**
Affected versions:
- f5f61e3f93c7f6615cfdc26efce6a83b3188d697e2243643d08d10dfa9de8afb (Status: affected)
**Gigabyte - G482-Z54 (rev. 100)**
Affected versions:
- 0fe0c762e396660fb30aeddcf5a5928af864eb44399271ed975913f36e46190e (Status: affected)
**Gigabyte - GB-BXi5-4570R**
Affected versions:
- 3353c109a69e6fdd86adbec899e2669cce724bc35db33a86fb0bf1c81a508c2c (Status: affected)
**Gigabyte - C621 AORUS XTREME (rev. 1.0)**
Affected versions:
- 7edc3eecb5d5ed515e06f8130d875fcae07cb0c7bfaa2e4cd8d86862e5ecc256 (Status: affected)
**Gigabyte - MJ11-EC0 (rev. 1.2)**
Affected versions:
- 3631995d059e336863527f1511894bdfc61361bc0691a430b3896fb94746aded (Status: affected)
**Gigabyte - GA-E6010N (rev. 1.0)**
Affected versions:
- c9c8f182cf3b058d12bddb039d8a3f3686d1c325c9b2719ec5fc8644e066274a (Status: affected)
**Gigabyte - GB-BACE-3000**
Affected versions:
- 2da499751e8a5446ac8445cee5b95f6bf75ded5c8ec6738eb67f5c4ac2081c32 (Status: affected)
**Gigabyte - G291-Z20 (rev. 100)**
Affected versions:
- 6d6107f0d094fab41eaf6073089de8a0b24bb7a66c5851f534a8f1d26812c3d2 (Status: affected)
**Gigabyte - H261-Z60 (rev. 100)**
Affected versions:
- edd3eccfbbc2ef2ac40e723697f67a346fca062ddd6679c5ff8cfbb91d3b6afb (Status: affected)
**Gigabyte - R181-Z90 (rev. 100)**
Affected versions:
- 575fc48c70ea9ee40f8016ea2328ebe790e7e556333a95b9b511be466047f668 (Status: affected)
**Gigabyte - H261-T60 (rev. 100)**
Affected versions:
- 6b636c9fc0ec84737f2238365e71c23e9227695cd5ad52bf40dbe8290920fb60 (Status: affected)
**Gigabyte - GB-BSi7HT-6500**
Affected versions:
- e9bc71596a97741893377b2c52a13b5b2ff0a7b6f985af40725e0755d2c537c8 (Status: affected)
**Gigabyte - C621-SD8**
Affected versions:
- d6ad23c1fab3f0a2babb23e7907385e25a06801c2edd50d108e5b08f923855a8 (Status: affected)
**Gigabyte - C621-SU8 (rev. 1.0)**
Affected versions:
- b9017e90f6c47a9d9560cfd92206c4b2e624cd91cd7f0680fb75dd972ef9582d (Status: affected)
**Gigabyte - GB-BSRE-1605 (rev. 1.0)**
Affected versions:
- d72f64d5a25b9088f7fff456d3783c2fb0e7926cd4de6469c6c3f57690830907 (Status: affected)
**Gigabyte - GA-Z170X-Gaming G1 (rev. 1.0)**
Affected versions:
- 0455dd8b57341d5667d4c4dd71767321c3f72770f84db4e46f93d31e50b376a7 (Status: affected)
**Gigabyte - C621-WD12-IPMI (rev. 1.0)**
Affected versions:
- 0215ce75b3629651d0c64b0b241095b58f0af921cec3022c524d531c22f1385e (Status: affected)
**Gigabyte - C621-WD12**
Affected versions:
- f528dbe55aba35bd4e5d55fe853afed41c54d78719765944a5ea74dbc062f4b5 (Status: affected)
**Gigabyte - GA-Z77X-D3H**
Affected versions:
- cc7b733f36b027823b3f501864d74397d308f8bc169149cca5307855234a4527 (Status: affected)
**Gigabyte - GA-J1900N-D3V (rev. 1.x)**
Affected versions:
- 19b4ba1388707838d0de17b6f2e9ce01f70f728926ab7e2dcc0566f6dbce8e90 (Status: affected)
**Gigabyte - G211-H4G**
Affected versions:
- 9546a8c62b6d285172acc0ca17340040cd18ff76bfe5b9e7672824e948f7331f (Status: affected)
**Gigabyte - MW21-SE0 (rev. 1.0)**
Affected versions:
- 60370916ce5edea7899125ad1b470d59cc04b0aeccea1ae5474f78ccf187e4ae (Status: affected)
**Gigabyte - MW31-SP0 (rev. 1.0)**
Affected versions:
- a89940e207a6fdd61170536d0d8fe66b4584c38a804c0df15d23c0cf30d49e35 (Status: affected)
**Gigabyte - R121-340**
Affected versions:
- d2565f697c692df559b665d0b97b3743c9de07c0ffa83b0fbb5b86aa821e8622 (Status: affected)
**Gigabyte - R121-X30 (rev. 100)**
Affected versions:
- 2ca3df4ff24732338397d64dc81509ea5a7c4b979ca3f2ee6c7446d690355c52 (Status: affected)
**Gigabyte - W131-X30**
Affected versions:
- 7fb3aff9b87102cb3535bd80904b7252c40ba4f556d9f355a45fc9003cb29e9d (Status: affected)
**Gigabyte - G292-Z42 (rev. 100)**
Affected versions:
- 09d1d8dff99b19615f14413d6ba20891819d481b12667452786510209344095e (Status: affected)
**Gigabyte - G180-G00 (rev. 100)**
Affected versions:
- e32576a5522533c1914ea8aed13f238022bf60eb6fb86ec5393bc8ee56cf5a06 (Status: affected)
**Gigabyte - G190-G30**
Affected versions:
- cbb6d5a01124074eda2161e53a5128e0d0d8eedaffa55b14c1dfdd6fbc5a067d (Status: affected)
**Gigabyte - G190-H44**
Affected versions:
- bef72cba124fcef35a3ccd67b94707f20c2bfe2a4f4d89f3497affd72b8c2a73 (Status: affected)
**Gigabyte - G250-G50 (rev. 400)**
Affected versions:
- 9424cd10408253ab228dc2125524340f5ca53759e3ad4e996e7cf0320f41884f (Status: affected)
**Gigabyte - G250-G51 (rev. 400)**
Affected versions:
- c17b5d0b9140f95f5317619866739be362765e6165292cb183f539b6758f34b3 (Status: affected)
**Gigabyte - H230-R4C (rev. 100)**
Affected versions:
- 59a3fe40e2896be666fd2712f7e5176ab10ca9335b39bd04fa48867ee607c066 (Status: affected)
**Gigabyte - H23N-H60**
Affected versions:
- d4fc77114a472bf1902a66a35f51a11689446c8d0dc18000717a5f74ae6b3a2b (Status: affected)
**Gigabyte - H23N-R4O**
Affected versions:
- a5cda726ef82b73f9c764e39a64ceab32e4d6e238c3019e06d3b7f2218d68ea8 (Status: affected)
**Gigabyte - H270-F4G (rev. 100)**
Affected versions:
- 934742dd01634ef45d78c2a7f9f3e89a0db2cbc7baf994570cd8b64fa4491da0 (Status: affected)
**Gigabyte - H270-H70 (rev. 100)**
Affected versions:
- 499d17336ee9e6be59a733507c25f7b343933bd728f296f6ef08af611d0a8ae2 (Status: affected)
**Gigabyte - MD30-RS0 (rev. 1.0)**
Affected versions:
- 3b9ef069c1c67a9caa29f8eaa915605cd0bbf1edb735d92abf2c4e959ca4a726 (Status: affected)
**Gigabyte - MD60-SC0 (rev. 1.1)**
Affected versions:
- 473033483d404754621122afe34dc8f8f47432bde116cfdde03ac38fdf2fb054 (Status: affected)
**Gigabyte - MD60-SC1 (rev. 1.1)**
Affected versions:
- 7213c438e3f07e82dff82a5b6cdeb5f80e8b82ce6e12fc377732a8df2c527bfc (Status: affected)
**Gigabyte - MD70-HB1 (rev. 1.2)**
Affected versions:
- 7540b3951f0ddc6c1c1f4eaf062525f55a1c6e862022e4a545530895510d772a (Status: affected)
**Gigabyte - MD70-HB2 (rev. 1.0)**
Affected versions:
- 0db641b3a89e75061d6af75e41e365cab69a819f6880d4bd0a0f4ea7960fa17e (Status: affected)
**Gigabyte - MD80-TM0 (rev. 1.0)**
Affected versions:
- 15f2bdadf43e6d3731df0693552d4aa4780ed958dcbe0ea4ef80bc27510cdc85 (Status: affected)
**Gigabyte - MD80-TM1 (rev. 1.0)**
Affected versions:
- 298d5755fa084d9268d09063222030993755cee31f9fe5429323b830c8c3f5cb (Status: affected)
**Gigabyte - MU70-SU0 (rev. 1.0)**
Affected versions:
- 4b5caac23e6866a9bbfd7962a5557ddc9b0369cdce09b664910b35bd66e690cd (Status: affected)
**Gigabyte - MW50-SV0 (rev. 1.0)**
Affected versions:
- cde8f07d2e7d14233748df612e113ce348140090694b96c407053fe4e6e1690b (Status: affected)
**Gigabyte - MW70-3S0 (rev. 1.0)**
Affected versions:
- f8c314404f2801dc3b04cce95fa27a97f58459f9d70c8e3b03bbfd45bbaf5e40 (Status: affected)
**Gigabyte - R180-F28 (rev. 152)**
Affected versions:
- 5d3bf4c8452e70a4ee31e25cfd555694af3cf64eda965fade0b21e8a262a2c10 (Status: affected)
**Gigabyte - R260-R3C**
Affected versions:
- e6bc9c983e21a0cfcb2d86a9dc88c28e5ba33387acdff81bccd6caf780e4619c (Status: affected)
**Gigabyte - R270-R3C (rev. 143)**
Affected versions:
- 6b6d0ebe479ce082420f5412fc099860ab825450e58d96a6b33c5013ea061864 (Status: affected)
**Gigabyte - R280-G2O**
Affected versions:
- efaf5f327a471776f0a75a2b8b7f963c8ab72190be7f606d51a0c04715dafe70 (Status: affected)
**Gigabyte - D120-C20 (rev. 230)**
Affected versions:
- cef953fd8883203ef326a6b195a90328ae31ddc10736afa171b617a906fab77e (Status: affected)
**Gigabyte - G150-B10 (rev. 111)**
Affected versions:
- fe702d3ce5fdade4ab194ec43fcf6f0a070123ab547ae49b9cbaec33c474dfb0 (Status: affected)
**Gigabyte - G482-Z51 (rev. 100)**
Affected versions:
- 4dcab1a378bb4cc541f210917c563b95dd678e185b4d0dc8483b175cbf9097ad (Status: affected)
**Gigabyte - MB10-DS0 (rev. 1.3)**
Affected versions:
- 3aa61cde7b1886fab7e60e077bdb39d0a94e3c451593d13e87306b88b4e56a80 (Status: affected)
**Gigabyte - MZAPLAI (rev. 1.0)**
Affected versions:
- cd755796109542b3da08826c56951102e5034c76428138d1a6dd4f1ca29955a7 (Status: affected)
**Gigabyte - GB-BPCE-3350 (rev. 1.0)**
Affected versions:
- b22a7a1693d8cb2deb608f8e3ab366f5eea0e6bdef6ddb03a86d599fb2efdd48 (Status: affected)
**Gigabyte - GB-BPCE-3350C (rev. 1.0)**
Affected versions:
- a42535bbb37725951ac18b0fa9b5771454ce707bcdbeacb8120d0aa0eee0cf1b (Status: affected)
**Gigabyte - GB-BPCE-3455**
Affected versions:
- 03662e2e512cfe18afe431d968d60e944af5f7514f840754864ee4cd97990130 (Status: affected)
**Gigabyte - GB-BPCE-3455C**
Affected versions:
- 47b54ae65d44b227a3bab252fcd465df6e6d4875cf2511f1261f1c8e5b196e1a (Status: affected)
**Gigabyte - GB-EACE-3450**
Affected versions:
- 421dfe54ac2554e627762ea96f454f95f7232f3f238dc9f5d5fc96bbf284fbac (Status: affected)
**Gigabyte - GB-EAPD-4200**
Affected versions:
- c6009503816a44e0d4fa7d0d74ac7418b6551e31e58bab97390711055449e52d (Status: affected)
**Gigabyte - GA-IMB1900N**
Affected versions:
- cb4e9aa8b2416ed2fb7593a3c93d5fed07d24d1f349761a1790deb97778a565c (Status: affected)
**Gigabyte - GA-IMB1900TN (rev. 1.0)**
Affected versions:
- 93d6ae2ede6573f018ca1dccc5b686a0461a0d662a353511a0b420a10935267d (Status: affected)
**Gigabyte - W42G-P08R**
Affected versions:
- f0d6176199b56171ec12bd663025c664b2bf3f8b844bc90edc8dbc3cc062871d (Status: affected)
**Gigabyte - MA10-ST0 (rev. 1.1)**
Affected versions:
- 00f354e79abadfb8b4aea11bb07c3ddc16f00b3055ec8c221ad4d69538bdeffd (Status: affected)
**Gigabyte - MDH11HI (rev. 1.0)**
Affected versions:
- 2fdb64f2007196150cda167f3eb121cedba80d75d0b79def30c4d7155ea0b2a7 (Status: affected)
**Gigabyte - GB-GZ1DTi7-1070-NK (rev. 1.0)**
Affected versions:
- 0d274a7eb05cebe468e07b2e6692a11c90f222d18077b3d058fc02b464046265 (Status: affected)
**Gigabyte - S12-P04R (rev. 1.0)**
Affected versions:
- 25b628eb776a57d9fa45cffb00f8f3347cb9d7c2f3c33712348b85c3ecad2d4f (Status: affected)
**Gigabyte - R272-Z30 (rev. 100)**
Affected versions:
- fbf652a641fc3d847c148abb65130f7eece7a51a9c6607f1c403a8bbdde6ce48 (Status: affected)
**Gigabyte - GB-BNi7HG4-1050Ti (rev. 1.0)**
Affected versions:
- a0c57eb7255f99412b62429f165eeb1f8a297c26a13eb6d7ddbee91e32dbce6c (Status: affected)
**Gigabyte - GB-GZ1DTi5K (rev. 1.0)**
Affected versions:
- f37453e390737ec297686b784da5aad11acbaf8375d377fac533caee996c1d66 (Status: affected)
**Gigabyte - R160-S34**
Affected versions:
- 898a0ddce89b59e6993ea651b0a0d4b54752957b63274dda75160674fa0928f6 (Status: affected)
**Gigabyte - R181-T90 (rev. 100)**
Affected versions:
- c02c66a7d393e7bd8cf757197bbc6bc22fd9f9b38a8a1068166eba97bc5b4a29 (Status: affected)
**Gigabyte - MDH11BM (rev. 1.0)**
Affected versions:
- 410a0aebc3826f029ee6a4cd0c5816eb0676fe99a0b112e8ce55e8b2f3b49e6d (Status: affected)
**Gigabyte - MDH11JI (rev. 1.0)**
Affected versions:
- 05cb527ef122bbe9ebe54d4678686e6a21b961f16392841f5f0b0bc3882a184e (Status: affected)
**Gigabyte - MDH11KI (rev. 1.0)**
Affected versions:
- 945d5b0e567bf5604ea9b12fc7f3f3bb12ccfb1935b9de78c9bc77241632fc9b (Status: affected)
**Gigabyte - MDH11TI (rev. 1.0)**
Affected versions:
- 7796142d4d8a09c6f416d5b3cd452caa659cfca40992683d7f8af55cf4e6a7c8 (Status: affected)
**Gigabyte - MFH27AI (rev. 1.0)**
Affected versions:
- 4d3a05e1006e9d5a1045ea65277cc4fba148ab4533ccb1b6d52ffe54edc7fffc (Status: affected)
**Gigabyte - J4105N H**
Affected versions:
- 3d1879acf606abac026703a7fe242feb538192ec6f01642ca33ba6d6de55a725 (Status: affected)
**Gigabyte - GA-N3160N-D2H**
Affected versions:
- bc5aa15ece1e486f4b7d31c5ba6d45382204c115e556a6412d751e25703a4a7d (Status: affected)
**Gigabyte - GB-BRi5-8250**
Affected versions:
- 3584936b2dad0ff3ee3d6b167442d39dce8400e1016267462827ff20d15dcdf7 (Status: affected)
**Gigabyte - GA-SBC4100 (rev. 1.0)**
Affected versions:
- 873e676d25545b3d6e133a2c85cedd5a4627a11f67513e54e6a99e812e7618cc (Status: affected)
**Gigabyte - GB-BRi7-8550 (rev. 1.0)**
Affected versions:
- 591b486bba979b64d20fc90bd63a5991b7df16b5aab1447de888e3d6090f1086 (Status: affected)
**Gigabyte - GB-BKi5A-7200 (rev. 1.0)**
Affected versions:
- e13105b80056966dee303194e6eb7e2f622dccb80f5fc5780100197d43b871ea (Status: affected)
**Gigabyte - GB-BKi7A-7500**
Affected versions:
- 002c5c88a393a9da6b48c30d64bd702f6b50fef07c32f45b7c09f40fe2f3f2c0 (Status: affected)
**Gigabyte - GB-BNi5HG6-1060**
Affected versions:
- 289cffe9f81f1e9a9cd087bc529701a9343084e499684caf4d34bfe8db15f3f7 (Status: affected)
**Gigabyte - GB-BNi7G4-1050Ti**
Affected versions:
- 9d8b09f7fdf906dff7d92049fa20921927f3cfebf564455eac78ce2518ad03a1 (Status: affected)
**Gigabyte - GB-BNi7HG6-1060 (rev. 1.0)**
Affected versions:
- 3835eeda7653120a02ce98ea98ba75ebce53ac1efabe3b81d0b6dcc9e611d1ac (Status: affected)
**Gigabyte - GB-BKi3A-7100 (rev. 1.0)**
Affected versions:
- c5697a205b0e85c8f31e3538135e32b72ca60d1652162c30007d94ad079096fe (Status: affected)
**Gigabyte - GB-EKi3A-7100**
Affected versions:
- 2f7481194b1e0a153551fbc9e68fef59f463882e3fc0238673ed6293715366c5 (Status: affected)
**Gigabyte - GB-EKi3M-7100**
Affected versions:
- c1cc2040975c62eabeae3df92e63b2c1a22c690a97edcea1576f83e975355db4 (Status: affected)
**Gigabyte - GB-BKi5HT-7200 (rev. 1.0)**
Affected versions:
- 47a969af17efdfe04690233319d36d12ff820901d0817ce17846281e7d5f49ea (Status: affected)
**Gigabyte - GB-BKi5HT2-7200 (rev. 1.0)**
Affected versions:
- 0aa384720b8e5c0d09b9b0b14cf14a105e4b607681f778bcaa202412e666bdf1 (Status: affected)
**Gigabyte - GB-BKi7HT-7500**
Affected versions:
- f61c63e919c797c1faae135458e0db89f288a1d05402380823562f34452806be (Status: affected)
**Gigabyte - GB-BKi7HT2-7500 (rev. 1.0)**
Affected versions:
- cb0603d8ecac9baf7de500500990ad0a7e9068dfee69f296d62de549f69f9b1c (Status: affected)
**Gigabyte - GB-BRi3-8130**
Affected versions:
- a74d2353acccf98743271fd296b2bf6f1e047cca1fcaccc2fd9095a7f72fba2d (Status: affected)
**Gigabyte - iTXL-Q170A**
Affected versions:
- fa7e7ca9fd48d608094d5f56ad6f0166db7be91862666abbb6fa631055b98f5c (Status: affected)
**Gigabyte - GB-BSi7A-6600 (rev. 1.0)**
Affected versions:
- 6504f61ce57f6caae37cc7c56910267d18a1db46e6681178b6807f0e26ab966c (Status: affected)
**Gigabyte - GB-BSi5HT-6200 (rev. 1.0)**
Affected versions:
- e649eb460cc049ddac440fe93528336fa42bdd9cd7a284ad9a2481647b57e75a (Status: affected)
**Gigabyte - GB-BNi7HG4-950**
Affected versions:
- b772a8c72de61e4821a04793a16c8dc8ff7b354fa2a0bff189d879df254c9f1e (Status: affected)
**Gigabyte - GB-BNi7QG4-950 (rev. 1.0)**
Affected versions:
- f4426a3de06ca8015af5798b631afe601a78a069be9e70fc818222d9b4f679cf (Status: affected)
**Gigabyte - GA-J1800N-D2H (rev. 1.x)**
Affected versions:
- ee21f7397347f3b42d5229b41f9d9a6b4be739419f6f2bef1c3eec8f5d3a17e2 (Status: affected)
**Gigabyte - GB-BACE-3150**
Affected versions:
- 66ff6219a24fb3662b7b3d4fb1fb7937649dcf052cea4364d4c9b178735807f3 (Status: affected)
**Gigabyte - GB-BSi7H-6500-LA-IW (rev. 1.0)**
Affected versions:
- 9e23a81c581d5e6c351c2cac1a944ef5759271739f6150c3ef6857bfe401ae62 (Status: affected)
**Gigabyte - GA-IMB4100TN**
Affected versions:
- 5abc359c698cd90030a597105c4ef899e4ef56271b9e0f43c843408b9fb53d33 (Status: affected)
**Gigabyte - GA-N3160M-D3P**
Affected versions:
- cf2df7d9f1ff5f087021f7b47cef6aa3efb47cbfd639f730512bc630e0c91f81 (Status: affected)
**Gigabyte - GB-BNi7G4-950 (rev. 1.0)**
Affected versions:
- 210688036c5ecadc5d764691d511e738ff32146bc69f26601fd45321c65b0c7d (Status: affected)
**Gigabyte - GB-BSCE-3955**
Affected versions:
- 327e84e3cfce4cb086435232d033a20ebcd4b95cd5aa4b85cb92206f44507170 (Status: affected)
**Gigabyte - GB-BSCEA-3955**
Affected versions:
- 6e166fd67041801b0481c69bc271ae73e0657f1078442b5740b09f6774128e01 (Status: affected)
**Gigabyte - GB-BSi7A-6500 (rev. 1.0)**
Affected versions:
- 6662b3f0d921aaee11ecae2893271fe861524620b05540e255d1e364aa65abb6 (Status: affected)
**Gigabyte - GB-BNi5HG4-950**
Affected versions:
- 030031c6c1b9422a56ed44f04efa2ec84fc8a2de254f24d14989934f613d12b8 (Status: affected)
**Gigabyte - GB-BSI3H-6100-ZA-IWUS (rev. 1.0)**
Affected versions:
- 6399b690346ae7ceda0f8dafbca5acd17ac4d796619568a51cc8e50f5b630b42 (Status: affected)
**Gigabyte - GB-BSi3A-6100 (rev. 1.0)**
Affected versions:
- e7049738618fc298adb3099074b3419bcf553f0e54acd9ada2d611fe64925026 (Status: affected)
**Gigabyte - GB-BSi5-6200 (rev. 1.0)**
Affected versions:
- 044e3800c05a232d4a8821edc28aae7927474c8814a385f717010ef9b12a5622 (Status: affected)
**Gigabyte - GB-BSi5A-6200**
Affected versions:
- d86ef77e6d28671ef838b314840a4ff9237798c058244805b3b3bc01010db097 (Status: affected)
**Gigabyte - GB-BSi5A-6300 (rev. 1.0)**
Affected versions:
- 8ca806b8be055f9b5df84871c469279930b34b89de515068b1cb30bfa9c3cae0 (Status: affected)
**Gigabyte - GB-BSi5H-6200-B2-IW (rev. 1.0)**
Affected versions:
- 40f56a09ded19979902613399e9d6c84cee02b72b7114cabac53629fe2c068be (Status: affected)
**Gigabyte - GB-BSi7-6500**
Affected versions:
- 5cb60622a0063c6d261c5693fd423d7fa44d826e8250812f50c7b9a28921712c (Status: affected)
**Gigabyte - GB-BACE-3150-FT-BW (rev. 1.0)**
Affected versions:
- c754aa67ba523b595de11270897af05dc22907a4fce3f4880bb372b1e18d9164 (Status: affected)
**Gigabyte - GB-BACE-3000-FT-BW (rev. 1.0)**
Affected versions:
- 19a209b004631abf16b5f6abdbe22b3e9578e1f5ffc4bb94b6601fb612ae47f1 (Status: affected)
**Gigabyte - GA-7PXSL1 (rev. 1.0)**
Affected versions:
- 663977d4a882f59c8a8791d427ef4431ca63f89ed5683a4cb6d61006f1b1c8d5 (Status: affected)
**Gigabyte - GA-X99-Gaming 5 (rev. 1.0)**
Affected versions:
- 4260703c9695e6975438598d85f4046bd34a1f16f77fe797b22cb45b4428f83c (Status: affected)
**Gigabyte - GA-X99-Gaming 5P**
Affected versions:
- e5ddbae819b82a8237740cccc23cee00844fa79a15e18e6187854b29e7e81a2a (Status: affected)
**Gigabyte - GA-X99-Gaming 7 WIFI (rev. 1.0)**
Affected versions:
- b767595393d045e4adb4225856611b3a51848a17495666be273823220a0dd165 (Status: affected)
**Gigabyte - GA-X99-Gaming G1 WIFI (rev. 1.0)**
Affected versions:
- d3e85abb0959e87075f3a91e0048163e92c1831edf3c70a4d85f6ebbe5d56cfd (Status: affected)
**Gigabyte - GA-X99-Phoenix SLI**
Affected versions:
- fe510a8d06c948ca3e699a51d8f60bc0411df8056124d5e4a993cd526da8a0a5 (Status: affected)
**Gigabyte - GA-X99-SOC Champion**
Affected versions:
- a85cfd3acbec43f545c8586b63aa52622d9fd00303bf80ff3890012032699ea7 (Status: affected)
**Gigabyte - GA-X99-UD4**
Affected versions:
- 95eddffa23bfc032d7d65b730d49a4d87bdaa93e349fd9e30dde6a450b9a9bff (Status: affected)
**Gigabyte - GA-X99-UD5 WIFI**
Affected versions:
- 36b023bf42423988805835e5b7c48af57c0b487c7308cfaf5a7a0ff75e3ae8cc (Status: affected)
**Gigabyte - GA-X99-UD7 WIFI**
Affected versions:
- f93b61306682c563bb68ecb67dea64f9d5b86a8e1c7cfa7fb2b4ea02a15146e5 (Status: affected)
**Gigabyte - GA-X99-Ultra Gaming**
Affected versions:
- 90818dd14d621360badea1463f975a367952e2a0d43e7dc73401a7ab0a2d3a1f (Status: affected)
**Gigabyte - GA-X99M-Gaming 5 (rev. 1.0)**
Affected versions:
- e3b8e6db2e08d8cf93dcd44adf437d6a6fabfa7b309702b35f7ddd4c1790734c (Status: affected)
**Gigabyte - GA-X99-Designare EX**
Affected versions:
- 71337bea704f642aad176d64c9f64fdcdb9f38f8107294a417c9bce7a104cdd4 (Status: affected)
**Gigabyte - GA-X99-SLI**
Affected versions:
- 0307e5ffce3a9981334d7eb19b13caeed61ab8074212943438b4a423b5d2a9b8 (Status: affected)
**Gigabyte - GA-X99-SOC Force**
Affected versions:
- 678f05bab483e1cb9cc2cd51415c920bb4307b31ff917dc46cc44c6c2083b5bb (Status: affected)
**Gigabyte - GA-X99-UD3**
Affected versions:
- 295417e80fba51a322a02a7e4c35ab04af54a48355711066339743e88e3922f1 (Status: affected)
**Gigabyte - GA-X99-UD3P (rev. 1.0)**
Affected versions:
- 51c5cd38074336d75c166ad86a2df881b53b4fed849b538e3281d1bcf0502094 (Status: affected)
**Gigabyte - GA-X99-UD4P (rev. 1.0)**
Affected versions:
- 27abdc6ac0e50d6d6ca0e937c0a7ab1efe8d2c53c46532b68f0cb1a5fb955517 (Status: affected)
**Gigabyte - GB-BACE-3160**
Affected versions:
- 9cd9ea2490848b03659e0e7dd7871ac815c54080e5588a530afe35cfc1ed585e (Status: affected)
**Gigabyte - GA-B150N-GSM**
Affected versions:
- 01b2fa505a7a377587ea64b20e1a1570eb7f6567a9204ec972ae478998236a0e (Status: affected)
**Gigabyte - MVBAYAI (rev. 1.0)**
Affected versions:
- 86a0a4b3efcbc51e14a0a307a0efe343c7a7e3e2bae3a6e0502869f610034ead (Status: affected)
**Gigabyte - MZBAYAC (rev. 1.0)**
Affected versions:
- 073a6246ab57b038afd9050e2dd017aefdde6dfad5d61b80bb2d5c3c71134b73 (Status: affected)
**Gigabyte - MZBAYAD (rev. 1.0)**
Affected versions:
- be9c2feced70f810a5d08ec03dd8e7df75f9abd066a2ee30ad82136f355ceaf7 (Status: affected)
**Gigabyte - MZBAYAG (rev. 1.0)**
Affected versions:
- 305b23937168ebedc60ac6756010c07e4588c48e9fe4694fb935945dbf4be6ee (Status: affected)
**Gigabyte - MZBAYAI (rev. 1.0)**
Affected versions:
- 4ab2b4adb933a22cc5b3b3739e315a68c9a9a3dca20b1ae7f27713c0279f6670 (Status: affected)
**Gigabyte - MZBAYVA (rev. 1.2)**
Affected versions:
- f96a77ebf7806cc05507582f25810237aeaea30ef819dbe90ab2227f8a36ce8c (Status: affected)
**Gigabyte - GA-H110M-S2H DDR3**
Affected versions:
- 8bc76dc04271ff2014eaab3560bbe3177cc08eb3337f4f512c7d44b98a40d1d9 (Status: affected)
**Gigabyte - GA-H110M-HD2 (rev. 1.0)**
Affected versions:
- 713c6e95151ae02f075d0391a12e47fa2aaeed199379377bddc00590ceda1795 (Status: affected)
**Gigabyte - GA-H110N**
Affected versions:
- b66a10f650f73f5497b22a2d45d9c0bf4df9a987668c4d617e62925c5c26c388 (Status: affected)
**Gigabyte - GA-H110-D3A (rev. 1.0)**
Affected versions:
- 447d66dd22c3af2bbdeea4b2a766cb3fa4442466d0c02d62647de9f3683cd6c2 (Status: affected)
**Gigabyte - GA-H110M-A**
Affected versions:
- a04064b45ec7d0c5b6ae123d779095e23315e6ac1a150d4b3190909a2237603b (Status: affected)
**Gigabyte - GA-H110M-S2H**
Affected versions:
- b1276f7ad8788d3db650a672e6ce6785d5c3922d2bc5aae554ad1b48b62dec5d (Status: affected)
**Gigabyte - GA-X150M-PLUS WS**
Affected versions:
- 3ba7690791f1adeaa12e45dc9adca1ee7f08c99bf5f1c51961c6975d1cd14770 (Status: affected)
**Gigabyte - GA-B150M-D3H (rev. 1.0)**
Affected versions:
- efb150fe9825a88101d934fb5a9801f970f6e734e758344062d37152e8baa1af (Status: affected)
**Gigabyte - GA-H110-D3**
Affected versions:
- f5f374f38948ddbde29b9673cd70ce05e27af9f3be23a7bc086f37f35a68ede4 (Status: affected)
**Gigabyte - GA-H110M-D3H R2 (rev. 1.0)**
Affected versions:
- ec7f01320c848a88e89d3db821f462448f62e5ae65fb4fd02dc3a5602ad1eac0 (Status: affected)
**Gigabyte - GA-H110M-DS2V (rev. 1.0)**
Affected versions:
- 577535df524a000747a1e15828af3de0cfe6865b0b20170d024974d6b5b81160 (Status: affected)
**Gigabyte - GA-H110M-Gaming 3 (rev. 1.0)**
Affected versions:
- 901396591f3682b308f9cfa279cf1a7f8d4cc6622a9ca799e6b5e1d5bf769f2e (Status: affected)
**Gigabyte - GA-H110M-S2 (rev. 1.x)**
Affected versions:
- 6a24bb276e5c9b05ac4cca0da01e1b381245a0d217efb5190543de6ec41b2505 (Status: affected)
**Gigabyte - GA-H110M-WW**
Affected versions:
- b565acd86a3f4e294d606bf6c0e42eedc4b7361f4adf7c31ee4a806b54767cfb (Status: affected)
**Gigabyte - GA-P110-D3**
Affected versions:
- c544cd0b03384834b08b784ec0339e2b91a129ee56e7f4881101a10af567e6a2 (Status: affected)
**Gigabyte - GA-H110M-DS2V DDR3 (rev. 1.0)**
Affected versions:
- 8b02d988ee00fe78039974032b856c56e741a4594744b4f6376cbe1df8271226 (Status: affected)
**Gigabyte - MZBSWAI (rev. 1.0)**
Affected versions:
- 41bbe9daa5808a1c5b9836a654d6c6d312ed7034c304f963af28d13eaad84340 (Status: affected)
**Gigabyte - GA-H110M-M.2**
Affected versions:
- 18216a9c0fedbfa3a8c8cb3380845ff086beaec130296234d58d02d24fe051a2 (Status: affected)
**Gigabyte - GA-H110M-S2PT**
Affected versions:
- 210d858cd9ce7dbb1b76277fd580e1c71214d1f7ceff46788efda64e817fa95e (Status: affected)
**Gigabyte - GA-H110M-S2V**
Affected versions:
- c80df47ed107f7ea4eca4e15a55fce37f1578b985ed45131b8c67dce9ac2bdad (Status: affected)
**Gigabyte - GA-H110MSTX-HD3 (rev. 1.0)**
Affected versions:
- 55099b8c517078f75299dc02afe1f09167bcd7760c0f46546cf4f8274b54c465 (Status: affected)
**Gigabyte - GA-H110TN (rev. 1.0)**
Affected versions:
- f5fa2136e6ebb55d5aa3c0bcee64bcf4506a7854ca10fb5a43b8141ff4bf1275 (Status: affected)
**Gigabyte - GA-X150-PLUS WS (rev. 1.0)**
Affected versions:
- 0bd8853cb934be142b7edb2ef31a2031fb348a6ecea1db37e466dce25bf7fd6a (Status: affected)
**Gigabyte - GA-J1800M-D2P**
Affected versions:
- a08c05bf56e1c4e4d180d69266bbcb244e7e2f85259d86c05bfcf5593cfa33f9 (Status: affected)
**Gigabyte - GA-J1800M-D2P-IN (rev. 1.1)**
Affected versions:
- 98372c6dea313b0660ae2f1b1c80a8a5d7e93ce07010621392faca75818c0fe6 (Status: affected)
**Gigabyte - GA-J1800N-D2P (rev. 1.0)**
Affected versions:
- af4026ab4defc142e75d57ae35e7ef4492fac8ab6c0cc55c6de47f3e21f5ac24 (Status: affected)
**Gigabyte - GA-J1800N-D2PH (rev. 1.1)**
Affected versions:
- b2977acab6438edeb2af8a4e3d0c353fd89e9b2d47082b528c3c23fbddbdcbe3 (Status: affected)
**Gigabyte - GA-J1800N-H**
Affected versions:
- 464be29c2ee1a3f706063374be13365d0a296776aed73fd0c8506f1cdddb568a (Status: affected)
**Gigabyte - GA-J1900M-D2P (rev. 1.1)**
Affected versions:
- f89741fdf7f21d8670407a4b8038e75319d73486009e08a795632e94fa27df82 (Status: affected)
**Gigabyte - GA-J1900M-D3P**
Affected versions:
- 5641071fccfc0169979343e131d614caa71a2b334ffa45d1ee10817ccef73d8a (Status: affected)
**Gigabyte - GA-J1900N-D2H**
Affected versions:
- ed85051f384bd7694f0a86322c705f819cc18a0ced71d4e3c3946b37d4f3abe7 (Status: affected)
**Gigabyte - GA-6LASL (rev. 1.0)**
Affected versions:
- 2c0e4341f91bcedf78c301778d52492fa304380cdd15bdda725910cc6709e033 (Status: affected)
**Gigabyte - GA-6LISL (rev. 1.1)**
Affected versions:
- 9a8e636b33372a34e9719b8b20d2073bc56f549b64e5af83fe617187a51b97c1 (Status: affected)
**Gigabyte - GA-X99P-SLI**
Affected versions:
- fa52c6150c49a84699bec9739b84f5a2c073f4f69b1bc84028f3b2cb15b2167f (Status: affected)
**Gigabyte - G1.Sniper B7**
Affected versions:
- 92311971e888a24238c48086febf47b2d0820856e514dd6308575291b6de4e48 (Status: affected)
**Gigabyte - G1.Sniper M7 (rev. 1.0)**
Affected versions:
- 6051ccb31aaab7240147a1fdf9b8f444c7ee4bde73ffb4baca63b02bc77dea81 (Status: affected)
**Gigabyte - G1.Sniper Z170 (rev. 1.0)**
Affected versions:
- 3df7b53ef2284dd2f3385aaa589f87f2e3fadc93d2755e28781452a273d999ec (Status: affected)
**Gigabyte - GA-B150-HD3 (rev. 1.0)**
Affected versions:
- 878450f31de9dd84201895e81547ada2085ec94608d7fb6bdf84d73dc3b98538 (Status: affected)
**Gigabyte - GA-B150-HD3 DDR3**
Affected versions:
- d1d3adca998106090f4b2f08d6c50769e88e944ed640518d23f8865102c2ec0d (Status: affected)
**Gigabyte - GA-B150-HD3P**
Affected versions:
- 4cec11820244f485baa7f61d50e60a514b0c5aedb87d1a26cd6b6fb153fdf9ef (Status: affected)
**Gigabyte - GA-B150M-D2V**
Affected versions:
- fdedaff9a18229027689f23bef37cd8424e248412137bbf710fb6163eac6ac43 (Status: affected)
**Gigabyte - GA-B150M-D2V DDR3 (rev. 1.0)**
Affected versions:
- da480d23fe57a6003e41f8c88e2aacbade99186f0b62ba4561663b346e9f96e9 (Status: affected)
**Gigabyte - GA-B150M-D3H DDR3**
Affected versions:
- 5fd1eb03f29343e1ba70dce50264a7143129fe60bde396f6e3715330623db8de (Status: affected)
**Gigabyte - GA-B150M-D3V**
Affected versions:
- f2da89fe72acf6892b139fd4f7a047c30eea75cf5c572da6f901511658ae1522 (Status: affected)
**Gigabyte - GA-B150M-DS3H (rev. 1.0)**
Affected versions:
- b3148d78c2efd368e986a43b19e209f2ad4817e8a4ef41bb79c57ec7b9dc09f3 (Status: affected)
**Gigabyte - GA-B150M-DS3H DDR3**
Affected versions:
- 086d80a421ed4cc907120e6c96117c3b69b9edaf2ef6951fde7d3dbe6ea4c878 (Status: affected)
**Gigabyte - GA-B150M-DS3P**
Affected versions:
- e69ba3bdca3335f01b749abb84c702f6f926eab3e4d6ca70dd5ab84c3aee24a2 (Status: affected)
**Gigabyte - GA-B150M-Gaming (rev. 1.0)**
Affected versions:
- 639cd1a8d45af689d2fe1aea44b62d2110146b314f39be8a5d472e412842e61c (Status: affected)
**Gigabyte - GA-B150M-HD3**
Affected versions:
- 94a5124370c2d66b38a568b3d8be4a98dd8d2e25313b68506f7753c4d60be97e (Status: affected)
**Gigabyte - GA-B150M-HD3 DDR3**
Affected versions:
- 825b4bc9bf807631611cd33434d1455bca3d412b9a03463fdd1092c54d5ebbfd (Status: affected)
**Gigabyte - GA-B150N Phoenix (rev. 1.0)**
Affected versions:
- 12886ede3cef3c93c4602ff26519a04c9143e903b103006ca3805c3df2744c8c (Status: affected)
**Gigabyte - GA-B150N Phoenix-WIFI (rev. 1.0)**
Affected versions:
- 330f761ad2d43d72a4a09776d76bdffdfdd88d4ddf6002e0056e2826828372ab (Status: affected)
**Gigabyte - GA-H110M-D3H (rev. 1.0)**
Affected versions:
- fddafb4af375516cb2f72c9308852c88738a66d57af9deb08e9a10f1dc983499 (Status: affected)
**Gigabyte - GA-H110M-D3H R2 TPM (rev. 1.0)**
Affected versions:
- 4ecd2f653fab0c6dc0ed24c68a8f04c454cf8dea68b58d149e9d79758aac2c54 (Status: affected)
**Gigabyte - GA-H110M-DS2 DDR3 (rev. 1.0)**
Affected versions:
- f71a5cfc0646d85af2847e6816752e81f3b4d2a3ea5fa94516aed9464eaa4024 (Status: affected)
**Gigabyte - GA-H110M-H DDR3**
Affected versions:
- a402dd098614ebc89fe70642661c52da9ed9ba0b21627cff4868defc97db0274 (Status: affected)
**Gigabyte - GA-H110M-HD3 DDR3**
Affected versions:
- 2e24220caffd6ba7c7e1835f12740073a9e3a826a1ffb9bca210756c224eb99a (Status: affected)
**Gigabyte - GA-H110M-S2 DDR3**
Affected versions:
- 7802bf1fde1f8771ff7165acab0474471598a46df398d7db84adf911d2d37260 (Status: affected)
**Gigabyte - GA-H110M-S2HP (rev. 1.0)**
Affected versions:
- 4b0a77259b2af63a9704b094688237ff3c29fac1c011a373a0f2537a8a543d1a (Status: affected)
**Gigabyte - GA-H110M-S2PH DDR3**
Affected versions:
- b73d5f184db4524883fae5f01e681f52371964740bd6fa957998ab4d65537732 (Status: affected)
**Gigabyte - GA-H110M-S2PV DDR3**
Affected versions:
- ebd6b43db01ccccaffc4a08182e03cf6633d5371aa69c82f7300141277fe7d7d (Status: affected)
**Gigabyte - GA-H110M-S2V DDR3 (rev. 1.0)**
Affected versions:
- 756777ea660defef2629b8802bcbdd29b61020fa8ae8cb07045a7d5f991f3508 (Status: affected)
**Gigabyte - GA-H110TN-E**
Affected versions:
- 879f28f51c3b235744352f0808b6267258131f2594f3ff85a6938401e73eb9da (Status: affected)
**Gigabyte - GA-H110TN-M**
Affected versions:
- 50f77912004b73bade539e1c3983a7ab78984b8590a64d3e030ade4352c49eb0 (Status: affected)
**Gigabyte - GA-H170-D3H (rev. 1.0)**
Affected versions:
- e4a209b19361c13d7a18fa41d8a257a22f6c806bd62f04dd24cd77abd7d3134f (Status: affected)
**Gigabyte - GA-H170-D3HP (rev. 1.0)**
Affected versions:
- 2e1be66c511bc8367a2b1ab41a3ca60cfe46648bcab2d5f1f5bdf5df14de1c05 (Status: affected)
**Gigabyte - GA-H170-Designare (rev. 1.0)**
Affected versions:
- 6ea3c21e1aadbadfc2e9ac0860d94eb87e6590ab37f98326e00b9615a13a6208 (Status: affected)
**Gigabyte - GA-H170-Gaming 3**
Affected versions:
- 2cb69c081c6413077fd076d7230ff816931ae65bbead2f94f0b12d33e1861c9e (Status: affected)
**Gigabyte - GA-H170-Gaming 3 DDR3 (rev. 1.0)**
Affected versions:
- eacba20ef05b116d70c6344a54486bb7c23a131d7c897f5399b9a084a5bd5205 (Status: affected)
**Gigabyte - GA-H170-HD3**
Affected versions:
- 38643b383b7d51cc53298693e108cc293779dc43f254b2e2b17f66a80f9e4175 (Status: affected)
**Gigabyte - GA-H170-HD3 DDR3**
Affected versions:
- b3cb86dfc649346ea7ed4c8ff117ca91b59435b9baa9bdd8e6f2bde1dc1b1124 (Status: affected)
**Gigabyte - GA-H170M-D3H**
Affected versions:
- 60a230b0a5722bfbb364b6d64ae3e1b1cccb6161bbd6f8cc034977f4d283b4f7 (Status: affected)
**Gigabyte - GA-H170M-D3H DDR3**
Affected versions:
- 1c6801b8a7920939facfa379b6141016651601971156e426db947ca40b6f1708 (Status: affected)
**Gigabyte - GA-H170M-DS3H**
Affected versions:
- b9ea15324d90a1b750cfcbf964321370a56b116b44a0cbee2035cf11ffcc0ef8 (Status: affected)
**Gigabyte - GA-H170M-HD3 DDR3**
Affected versions:
- 78bff3425a6b42b846508850f03a040c22c43566947ac1d039b431fb80a31451 (Status: affected)
**Gigabyte - GA-H170N-WIFI**
Affected versions:
- 03299dee42886b0856629da99bce9cedee322b80bfbb89aa6943913d2da15e03 (Status: affected)
**Gigabyte - GA-Z170-D3H**
Affected versions:
- 523817566d04fde3f7fc0215b4c4758243319affa5c1819e4f041c290a36970f (Status: affected)
**Gigabyte - GA-Z170-Gaming K3 (rev. 1.0)**
Affected versions:
- db4668c191b9266a2afbf974c348885a9d10a3e1750d1e100418aaa896a5a103 (Status: affected)
**Gigabyte - GA-Z170-HD3 (rev. 1.0)**
Affected versions:
- bf0aac3f13b0d68c6a255735eaed4000c7e5f09748818746b4a1038f0be34f78 (Status: affected)
**Gigabyte - GA-Z170-HD3 DDR3 (rev. 1.0)**
Affected versions:
- bceea4f950f07347b40c579223456984c0515a2cc94c4cedbbea3c17e1c459eb (Status: affected)
**Gigabyte - GA-Z170-HD3P**
Affected versions:
- 20607b0f670b297b45523730d2204e46603cb3c65f47e6cf8293b07b7b1178ec (Status: affected)
**Gigabyte - GA-Z170M-D3H (rev. 1.0)**
Affected versions:
- a34cb81eac53b0800c2c02d2984c0960c0d68a22707869befd4af3996be42e7c (Status: affected)
**Gigabyte - GA-Z170M-D3H DDR3 (rev. 1.0)**
Affected versions:
- fc0eb68179f1363c19896c7cc043021a57cd45a3492187829b329474c361722a (Status: affected)
**Gigabyte - GA-Z170MX-Gaming 5**
Affected versions:
- b87e20d143fef2fc32233444070130834ce5dbbffe06409cb537e59c911f49cf (Status: affected)
**Gigabyte - GA-Z170N-Gaming 5 (rev. 1.0)**
Affected versions:
- 209045f2bba172fb91679d4319cfe548c24921f1e28dd9f887e3a78bce515e7c (Status: affected)
**Gigabyte - GA-Z170N-WIFI**
Affected versions:
- d67b82421d81df8f3d64966609e3c963be6d0dbd87df531ba5f3ef0bd61e5353 (Status: affected)
**Gigabyte - GA-Z170X-Designare**
Affected versions:
- c061fffcfd8d7e38afb97fb434afc78d39d22bf9b02884c7c1b04487cbb7dea7 (Status: affected)
**Gigabyte - GA-Z170X-Gaming 3 (rev. 1.0)**
Affected versions:
- 7b1cb9593c0c1890a7f1e922777c206012f2f1ded7b3339d66fa49efaca44c74 (Status: affected)
**Gigabyte - GA-Z170X-Gaming 5 (rev. 1.0)**
Affected versions:
- 438bf66c9433bfe1ba92452f5f7eb1d46cbdf9af9ab3c3d1d4354e902fb0f257 (Status: affected)
**Gigabyte - GA-Z170X-Gaming 6**
Affected versions:
- 25917f5dcd5f5a4c2daaa9fc0cdf991b365e226856202b4e5e987d406e6af95b (Status: affected)
**Gigabyte - GA-Z170X-Gaming 7**
Affected versions:
- 75468e84df86d3133927f5c08028dfb6dce55168c99ec9fde08397f5ab0865ce (Status: affected)
**Gigabyte - GA-Z170X-Gaming GT**
Affected versions:
- 2d40ec6b83d08a885cb576844e609105e15fdc4e48181dbc861e2bce0b657b59 (Status: affected)
**Gigabyte - GA-Z170X-SOC FORCE**
Affected versions:
- 5c25f790a4eb79b4ad3c4ceae05329c0878337257a6e31c276ff7aa5c18accc4 (Status: affected)
**Gigabyte - GA-Z170X-UD3 (rev. 1.0)**
Affected versions:
- d6389e5f47ee85c43b2d9aebef2e0c8a9f06856fabb148496a8acf251cdb3c1c (Status: affected)
**Gigabyte - GA-Z170X-UD3 Ultra (rev. 1.0)**
Affected versions:
- a01bb5e701b3b847766d027e7b9bed8e7bb05403ca0160734bc73c93fb77b6fc (Status: affected)
**Gigabyte - GA-Z170X-UD5**
Affected versions:
- 260811f239a5a92f4a894f52c5b7218faa75c5765e3db17a4ee33530bbfc1295 (Status: affected)
**Gigabyte - GA-Z170X-UD5 TH (rev. 1.0)**
Affected versions:
- ad921f429c443cd2a73ba3373fb6407a81b4b8d53b3fd5cbea07ca847ddc75c9 (Status: affected)
**Gigabyte - GA-Z170X-Ultra Gaming (rev. 1.0)**
Affected versions:
- 464643065d45eeb1c2566dcce90bd868313319547c91d46e3cea78126109d374 (Status: affected)
**Gigabyte - GA-Z170XP-SLI**
Affected versions:
- 32d8482434dfaae6405eca2bf724939194c8740da638c9e3e8b760489b2a1128 (Status: affected)
**Gigabyte - GB-BXBT-1900**
Affected versions:
- 6b0b62e4ea23df186b7bbf0fff342ec107596e1fd249721eea75375982054535 (Status: affected)
**Gigabyte - GA-N3160N-D3V (rev. 1.0)**
Affected versions:
- e03efb41e61ac04cb14a63c5ee5a71d3deeddb29426e38eab1c68946d60e26a7 (Status: affected)
**Gigabyte - J4005N D2P**
Affected versions:
- bae6e219e1ed8e8164382c4f05db847386c5f2908fb2fa453066aed4531310b4 (Status: affected)
**Gigabyte - GB-BACE-3010 (rev. 1.0)**
Affected versions:
- aecee44ca1c8bd43d65abeafcd5f0085e1165d42baa953808d566005189746a9 (Status: affected)
**Gigabyte - GA-N3050M-D3P (rev. 1.0)**
Affected versions:
- 2d4c55cc53de9adaaacd9e70527becc4de1cb0b39a605791601fefcd0156ced4 (Status: affected)
**Gigabyte - GA-N3050N-D2P (rev. 1.0)**
Affected versions:
- c717a5d6b61b22bd458dbb497dc5abad9e30fedb668810e558a46f994a656435 (Status: affected)
**Gigabyte - GA-N3050N-D3H (rev. 1.0)**
Affected versions:
- 63cd7d4698c89b720c73125900f4cba4b8b1c2b962064280a93dc9ce2a0e9549 (Status: affected)
**Gigabyte - GA-N3150M-D3P**
Affected versions:
- 1c4cf96a2ce5bae121b0594c2b41664510cffcdfc4001072f2275964c20fe12e (Status: affected)
**Gigabyte - GA-N3150N-D2H (rev. 1.0)**
Affected versions:
- 4685e5a58d4cf84102460110a5fad72931b1b46eb9f71650811832f80580bc0c (Status: affected)
**Gigabyte - GA-N3150N-D3V (rev. 1.0)**
Affected versions:
- b0474259effceedf7aedde543afa096fdcca74d9865eac223b6a91b4ed922310 (Status: affected)
**Gigabyte - GA-N3160TN (rev. 1.0)**
Affected versions:
- 5f53230a65454b8805179f246ac3c8b36bd274ae0051d900cd04890e7b765555 (Status: affected)
**Gigabyte - GA-B150M-D3V DDR3**
Affected versions:
- 8ba0474e2bdeb945adf9a819854cde336f3cca848e1ac41e381aaf03d397c7d0 (Status: affected)
**Gigabyte - GA-X150-PRO ECC**
Affected versions:
- c6ed04464891a4cdc3a25ba34d3cd44599bd118ed953c68c8b63f11be2dc83d3 (Status: affected)
**Gigabyte - GA-X150M-PRO ECC (rev. 1.0)**
Affected versions:
- 764d56cd4e5b88fa97313d5eef173bb426aa27aef5d81794eaf5b9c1fdf38375 (Status: affected)
**Gigabyte - GA-X170-EXTREME ECC**
Affected versions:
- 35f6ab275afa77bb30a5672f32b196d8c76208e48500d7f381e05f8f12e400e6 (Status: affected)
**Gigabyte - GA-H170TN**
Affected versions:
- bbb58a67574c989b095f38c9fe031cadd5a709235d6e0bfc9a206f98fd5318f0 (Status: affected)
**Gigabyte - GA-9SISL (rev. 1.2)**
Affected versions:
- 493437a68a7a7b46b645d46660e17c3b6599eee86cd06f592683e56963cf9a8c (Status: affected)
**Gigabyte - GA-B75M-S (rev. 1.0)**
Affected versions:
- 554e7be483afb47c81760179da5199ebe2f59a97b7146e50ed42f35728df9c5f (Status: affected)
**Gigabyte - GA-Z68MX-UD2H-B3**
Affected versions:
- 5bbd2f88bf68b66e974356e0e49f63b83fdeea8d148da445e24073d8012c0c3a (Status: affected)
**Gigabyte - GA-Z68X-UD3P-B3**
Affected versions:
- b7981e34bc8994973c48a18ac01d6b075f092de47d35fc62fffdc503ecf081ed (Status: affected)
**Gigabyte - EL-30 (rev. 1.0)**
Affected versions:
- 485b963baebaf9e0d0d3f0438da8fc3a5e74cac6fc7781e732df5ad0a3be3eec (Status: affected)
**Gigabyte - GA-H61M-S2PV (rev. 2.3)**
Affected versions:
- 9e2baeb611484b3c3460fbabe2b48ad91111e9a0cd7d1f189ab2d0438a69b3dd (Status: affected)
**Gigabyte - GB-BXi7-4770R (rev. 1.0)**
Affected versions:
- 73f5c64009c9b8ce26c13399584a65b73b3b5201475b04dd9621f5433ef959da (Status: affected)
**Gigabyte - R130-134**
Affected versions:
- 923e61ed9ecf1c37848cbe56822ce753f455fddf25c1eca816f3ac04aa46daa4 (Status: affected)
**Gigabyte - R270-D70**
Affected versions:
- d5844b2dc05f8374705493e1d67700d0421f63c27ea10070c60f1871dcf540c6 (Status: affected)
**Gigabyte - P15F R5**
Affected versions:
- e112ae0d90739fa839e6e29687412b5669a2f23bbe2b418d96b65ead135ec349 (Status: affected)
**Gigabyte - EL-20-3060-32G (rev. 1.0)**
Affected versions:
- 8e0251d4518373ebab7aa1dc037d732b5c04e92306e16a8e8ca1479df0a9ae88 (Status: affected)
**Gigabyte - MP30-AR1 (rev. 1.1)**
Affected versions:
- 586ca26deb275734620c0b80c8d16dd86538bff6116f5d7db1fc10230d775eb0 (Status: affected)
**Gigabyte - GB-KMA1 (rev. 1.0)**
Affected versions:
- 5b5b834775e9fa3cb50db4d25d9df7849cf0f13011a209fc53c51245aa963856 (Status: affected)
**Gigabyte - GA-6LXGH (rev. 1.0)**
Affected versions:
- 984e1178ed45439578fc0b3cc2787cc8f972987c087fc5b4762ef5f421cf5782 (Status: affected)
**Gigabyte - GA-6LXGL (rev. 1.0)**
Affected versions:
- 240c0e6220a07f27d4debd867f2a1774a50be1b37c3f53a2dab272a71280af4e (Status: affected)
**Gigabyte - GB-BXi3-4010 (rev. 1.0)**
Affected versions:
- 10cef05010197e635c330548e99ad98827223f0c8eada8a6e5a95ac7dc2880fa (Status: affected)
**Gigabyte - GA-Z68X-UD3H-B3**
Affected versions:
- 9387c8f1b5d856bdf0ce43c88413c22f98214768708183bc610381363dd269d8 (Status: affected)
**Gigabyte - GB-BXBT-3825 (rev. 1.0)**
Affected versions:
- 6775386a28b32b93d1853880a8ccf1b916a3bedaf7ba4d34f2a64904de792417 (Status: affected)
**Gigabyte - GA-X99M-Gaming 5 (rev. 1.1)**
Affected versions:
- d11d8f85507e54952adcfbb82d5d58ecfeec7674b756ba62c8e1316d9a1500de (Status: affected)
**Gigabyte - G210-H4G (rev. 100)**
Affected versions:
- dd75c90a2a81a34fee2c17a6e72b8ec2c93120fbd98c437c4648ac5fd78b6af1 (Status: affected)
**Gigabyte - MSQ77DI (rev. 1.1)**
Affected versions:
- 030615cdc1d2e52fe185f8fa8e6e1c1028beca283a6be9215482a39df1418622 (Status: affected)
**Gigabyte - GB-KMA3 (rev. 1.0)**
Affected versions:
- dcac97ed60b61b1991fc9f499fb3bf0e8594d49d102e76a988ea8933d099d396 (Status: affected)
**Gigabyte - M9M3XAI (rev. 1.0)**
Affected versions:
- 1d3295cec309f0649ecec6952824abfad776ecc1f46199a080932b5e99ac206b (Status: affected)
**Gigabyte - GB-BXCE-3205**
Affected versions:
- a080c1d64fb844389bad75a733e3b4c5483b07623276b114575d5cba32170869 (Status: affected)
**Gigabyte - GB-BXi7-5500**
Affected versions:
- 14dca67fdba7b20c48d3c16446db2a648c79e5f94712afba6e720ecf04ba5223 (Status: affected)
**Gigabyte - GA-B85TN**
Affected versions:
- 2d817d05c86c92a00f00e286c6c26cc52e6a50019970a71d98aa07c53d9690c8 (Status: affected)
**Gigabyte - GA-H81TN**
Affected versions:
- 5ebbac1eb55e763bd4efa47f6232ecbcc62d73645c3291e00a3d5cd880898ebb (Status: affected)
**Gigabyte - GA-H87TN (rev. 1.0)**
Affected versions:
- e555305c3219cca7d7b8d5a667ae2ef454aca7eb84341f07e1fa8288cdb38359 (Status: affected)
**Gigabyte - GA-Q87TN (rev. 1.0)**
Affected versions:
- 5f237b90cd70e0f63c0414262a0af2fbf8456ea78252750ccc6ef7fe59cb8774 (Status: affected)
**Gigabyte - GB-BXi3-5010 (rev. 1.0)**
Affected versions:
- bc4bcea45075ba867a4aadd97494ddcbbe693b23131bb52703d3c42b41340719 (Status: affected)
**Gigabyte - GB-BXi5-5200**
Affected versions:
- 39b90d14141556595814f43afeb015cc34e75acc31d23b0c505ba00d1c4a6a7c (Status: affected)
**Gigabyte - MATMH81 (rev. 1.0)**
Affected versions:
- dea93336a790f6ce8a80f451d1dc454eaf29b034a38a802140937b3166c4d450 (Status: affected)
**Gigabyte - MZJ19AI (rev. 1.0)**
Affected versions:
- 51ebb3341dae5033164b3b45470115f49f327e5dae5ab111df2a59bc04afad8f (Status: affected)
**Gigabyte - GA-H97TN (rev. 1.0)**
Affected versions:
- 882fa77c019e12dc61165308318657941c1b15c1259213e78aa035017fd50445 (Status: affected)
**Gigabyte - U21M**
Affected versions:
- 6fb97ce4f81eb4d83364b9377cf654a6f0e8d9271bd8e1e9f45f78b07f838172 (Status: affected)
**Gigabyte - GB-BXPi3-4010 (rev. 1.0)**
Affected versions:
- 8a4342c4bacccf07bdaf52b9cfadc8789c37092ccc0c414e1848e4d0317d01b4 (Status: affected)
**Gigabyte - GB-SIOPS-J1900 (rev. 1.0)**
Affected versions:
- ddff03dbd491004d20587de561e976bc8b5b5366723b51d3f59dfd1892b9dc25 (Status: affected)
**Gigabyte - GB-TCV2A (rev. 1.0)**
Affected versions:
- 70c80b940abbafb0d631870322b5f7c8e306a2063097493ab471f0ba8ddd228b (Status: affected)
**Gigabyte - MQHUDVI (rev. 1.0)**
Affected versions:
- 092c46188af77b69b4c19e349712a23244ec7cdc885c2e0150a8209c1693c95a (Status: affected)
**Gigabyte - GB-SIOPS-4550U (rev. 1.0)**
Affected versions:
- d3d7862eb46bcec3f0eecb5ec94caa94456def40792a125cb9b7912625be5973 (Status: affected)
**Gigabyte - GB-BXCE-2955 (rev. 1.0)**
Affected versions:
- 161c97b5c0ce6cc90a70034d8de30b18d07c43e50d5566c1802dadc967cb05eb (Status: affected)
**Gigabyte - GB-BXi5-4200 (rev. 1.0)**
Affected versions:
- 05001b41f2adc9d6c008f12f9d1d9669225a2366c9a05f6bd19d420cd5b13fc3 (Status: affected)
**Gigabyte - GB-BXi7-4500 (rev. 1.0)**
Affected versions:
- 6f6b51ad77bb7963ec455923fa731323ceb72af167a0a40b8c2b91696301bae1 (Status: affected)
**Gigabyte - GA-H61M-S1**
Affected versions:
- 19e2a33d2a28a825fb89e7dfda9609776110876b204c5ff760edf716cc7c390b (Status: affected)
**Gigabyte - GB-BXi5G-760 (rev. 1.0)**
Affected versions:
- faa729af295c234dfcfc5ac4ab91c8c255c1b054c612b9cbda1fce33f88b4d51 (Status: affected)
**Gigabyte - GB-BXi5G3-760 (rev. 1.0)**
Affected versions:
- 718662066149651d1b7506c7582df2252c555428481b1821829b4db25e2a836e (Status: affected)
**Gigabyte - GB-BXi7G3-760**
Affected versions:
- 7452bdc99e762f3b54571e03c1b6ab0873529b798275149fe0a8bc057929f8c8 (Status: affected)
**Gigabyte - GA-6LXSL (rev. 1.0)**
Affected versions:
- 3448017b88b33e3949d6c18876be32e506d827f65de6c425ebf82f33a2c3f502 (Status: affected)
**Gigabyte - GA-6LXSG (rev. 1.0)**
Affected versions:
- eb08694cb68b19cc7bd0bc323a46e8ce6de5036078a61dc8827ee480269c88eb (Status: affected)
**Gigabyte - GA-6LASH (rev. 1.0)**
Affected versions:
- d7f1a6c78df7317f866866e74e881d91485ef816e492fdf2a6fa02b940629494 (Status: affected)
**Gigabyte - GA-Z77X-UP5 TH (rev. 1.0)**
Affected versions:
- f0e7e5b4689bf7e81db1b56185b2a1186d31a50f1cfd1c9863a0746f490ebf3f (Status: affected)
**Gigabyte - GA-6LXSV (rev. 1.2)**
Affected versions:
- cc9b6fc8540a6abe60b8966ae6c4217180cabbb3471d12f93e3c81dc206c8bd4 (Status: affected)
**Gigabyte - MSH87FI (rev. 1.0)**
Affected versions:
- c19f30c4c9a444922cb61cf136cd48d9674d2134b98e618f6e7ab9654eb7a7ef (Status: affected)
**Gigabyte - GA-B75M-D3V**
Affected versions:
- ac8e4d6a033b6a2d130404eb06e193b248a76308d4a82eeb5736d4f251af6826 (Status: affected)
**Gigabyte - MSH61DI (rev. 1.2)**
Affected versions:
- ccb5cecbe797ba2e130f297ec86bfbdc629ebaf919065e50d3f8911cc05b3a1d (Status: affected)
**Gigabyte - GB-XM12-3227 (rev. 1.0)**
Affected versions:
- c67607819bad2d7abfd1d47eebad947f9920352c33b96db61f9f25c05bddc7c5 (Status: affected)
**Gigabyte - GA-H77M-D3H (rev. 1.0)**
Affected versions:
- f5502f7f96b9ca121d3b52a1a804c877839e76e3dbb45beda100bea672067d26 (Status: affected)
**Gigabyte - GA-F2A85XM-D3H**
Affected versions:
- 104c3173aff7cbf07c72956516cdc7c34e6169604293aec90e86bcc4384a799a (Status: affected)
**Gigabyte - GA-H77-D3H**
Affected versions:
- d4c6ce9d730179b7a5cab37a8744a2ca588c9a2a8b8462b62d2c96757adaee61 (Status: affected)
**Gigabyte - GA-H77-D3H-MVP (rev. 1.0)**
Affected versions:
- 1ca64768668cac95b2c49594df5412492fd3e84a5ec279f5e5782d9d08d641e8 (Status: affected)
**Gigabyte - GA-Z77-D3H**
Affected versions:
- 0d28128151819a06848aeb241f3dc4737d3a9b3918b739f8c512085af375b368 (Status: affected)
**Gigabyte - GA-Z77MX-D3H**
Affected versions:
- 32b1eee6b2e1553ceb902d17d0ecf5534034685dc8c2863f9ec99d2dc587bb72 (Status: affected)
**Gigabyte - GA-Z77MX-D3H TH (rev. 1.0)**
Affected versions:
- 26778248ce3156bc2d3e70461f079d1292435aeca9ea2c6ef0e536c979845164 (Status: affected)
**Gigabyte - GA-Z77X-D3H (rev. 1.0)**
Affected versions:
- b51371864d4322ca5c584cded0f6bbad11dd01cf498b841b270ede1f03497137 (Status: affected)
**Gigabyte - GA-Z77X-UD3H**
Affected versions:
- c27a0ca23c6d3ee9eea18c0e700f33f13c568dc209341b8ab4b64148a235c70b (Status: affected)
**Gigabyte - GA-Z77X-UD3H (rev. 1.0)**
Affected versions:
- 023f4c9928786909d9fcb2143edcb1ce9a20d1b15cf281559996f21617503f91 (Status: affected)
**Gigabyte - GA-Z77M-D3H**
Affected versions:
- eeef50c6dbb27c9ae8bbca0e2be73384ba60469957414bc2943892ef28836b4f (Status: affected)
**Gigabyte - GA-Z77M-D3H-MVP (rev. 1.0)**
Affected versions:
- 3c50ff8443f151a8022b4934dc0e87cd74d500719b586c82bce2184bac3ec2d3 (Status: affected)
**Gigabyte - GA-B75M-D2V (rev. 1.0)**
Affected versions:
- cac095d827e58ed8992e3eb2bc4285823c8378247de15d7ddc3f97c79d275f8d (Status: affected)
**Gigabyte - GA-B75M-HD3 (rev. 1.0)**
Affected versions:
- c3d754d426defee4e705ab9b72862764a22a64f316a1f8a2563a72cae308c31f (Status: affected)
**Gigabyte - GA-B75N (rev. 1.0)**
Affected versions:
- 4a901cc6ab10bd1546d8453bd1bcf75379880ee549329c03ecfd4b445b52de99 (Status: affected)
**Gigabyte - GA-H77-DS3H (rev. 1.0)**
Affected versions:
- 58d19c2ca76b765809a99f0eb2227291f4f51860723d303f9ef0cb20d4d19dcc (Status: affected)
**Gigabyte - GA-Z77-DS3H (rev. 1.0)**
Affected versions:
- 98d605b3578ac3b7518f151c24c937455b204441ba806ea244f22e54c03af2be (Status: affected)
**Gigabyte - GA-B75-D3V (rev. 1.0)**
Affected versions:
- 8222535124cf1bf77c3af3e6ce3b3a942390794440b01f8d2fd44b4e416b049b (Status: affected)
**Gigabyte - GA-B75M-D3H (rev. 1.0)**
Affected versions:
- 33793d37f2415d724c58c993c2ad6cc67d661253b929165f6f0ab0c88c8325c4 (Status: affected)
**Gigabyte - GA-B75M-D3V (rev. 1.0)**
Affected versions:
- 235c6f47146d2bf5dd20ff3971421489c69517be3b467ec1a2b6f7dc0f2d8a94 (Status: affected)
**Gigabyte - GA-P75-D3 (rev. 1.0)**
Affected versions:
- 1859a1e462fbb1db039e99f7cfea16e6da59188ad37b313181211ab2c3d70150 (Status: affected)
**Gigabyte - GA-P75-D3P**
Affected versions:
- 901658f7361b4d15145d07de99b9d921d7293699a15479f086f4d1a00fedf089 (Status: affected)
**Gigabyte - GA-F2A55M-DS2 (rev. 1.0)**
Affected versions:
- 4be0b29ff5fd55d855e5529912b92acea24740eb7fa0250ba01a44824c4685b3 (Status: affected)
**Gigabyte - GA-E350N WIN8 (rev. 1.0)**
Affected versions:
- 4fd09df247091f6c6ead14d012325d14055ab38095f5c4d8c258352f48c2052f (Status: affected)
**Gigabyte - GA-H77N-WIFI**
Affected versions:
- 7e95d1a64976573e5ed1c8c3466e24037d33fcfbbd9f02d1ae69643fdaa44d7f (Status: affected)
**Gigabyte - GA-6UASV3 (rev. 1.0)**
Affected versions:
- 00d23573a79d5737cfc6a1094b12e22c8a8601618934193dba2242f0246af559 (Status: affected)
**Gigabyte - GA-H61TN (rev. 1.1)**
Affected versions:
- f19c7fe7e25a9a41b4065791fa390b8d79ceee0cc7fafae702a92a6ec0e86696 (Status: affected)
**Gigabyte - GA-B75TN**
Affected versions:
- 506f5abb01dade2137a4b8d3ea42d1127f24f59f96339e77c59883571ae63443 (Status: affected)
**Gigabyte - GA-H77TN**
Affected versions:
- 1ffb3921b21ffdb876b2cbc7b6ff939fb5168efdf5ceed571d2d220e195fb150 (Status: affected)
**Gigabyte - GA-Z77N-WIFI**
Affected versions:
- 25c38be153f85659377f63b4968f5425bf7e8d6c99fb695eeaaed973939bd943 (Status: affected)
**Gigabyte - G1.Sniper M3**
Affected versions:
- bcd286446cd358474b492a2c9a4d49eab652aeda52c0e69ef94b1cd12b7579b5 (Status: affected)
**Gigabyte - GA-H61M-S2P-R3 (rev. 3.0)**
Affected versions:
- 0e26169fbddeb0ca9b8283dba44d571b554487b5dd9348caf84fe9d7a6a20dcc (Status: affected)
**Gigabyte - GA-Z68X-UD3-B3**
Affected versions:
- c0adc82a52cbe367efed31279d6e1ea3ab98311db49a68ae149e4af9a70ab67a (Status: affected)
**Gigabyte - GA-P67-DS3-B3**
Affected versions:
- ff5f5836457aa7fd0f02d037d0dc23b5c5a49fef8f7360268d7276e577060256 (Status: affected)
**Gigabyte - GA-P67X-UD3-B3**
Affected versions:
- b8fb25742a7753c0f7ebac50e9e3d6186ea123dcd0e33eb0a64abc111eaa7728 (Status: affected)
**Gigabyte - GA-P67X-UD3R-B3 (rev. 1.0)**
Affected versions:
- 435e0ba0715afef2a466835c19105c6480a35f921af59b863f2c29ed2d1de0e6 (Status: affected)
**Gigabyte - GA-Z68MA-D2H-B3 (rev. 1.0)**
Affected versions:
- e8d1572bf6bb0b658f618c735322e6c1aa20d01b79c9100e3d177b6c27ced480 (Status: affected)
**Gigabyte - GA-P67A-D3-B3**
Affected versions:
- d36182899b2c912ba34f51b50bbf228e1ec367b0fc009d20d34e4f011f4e9fc1 (Status: affected)
**Gigabyte - GA-P67A-UD3-B3 (rev. 1.x)**
Affected versions:
- c46c76138b4cf0a3407c3fe2844c11fdd5c0c2c4d335ab58aa0b0617a6f13f33 (Status: affected)
**Gigabyte - GA-Z68X-UD3R-B3**
Affected versions:
- 50d3dc2e80333527177e5f5e1dbc06357ecaae3fa2dd1d51272a906ade3cd7e1 (Status: affected)
**Gigabyte - GA-Z68X-UD4-B3 (rev. 1.0)**
Affected versions:
- beedbc9f64d20973229b584d965bcaf2f8fdc4a88c4bc202eb5e9f5565c85fa4 (Status: affected)
**Gigabyte - GA-Z68XP-UD3-iSSD (rev. 1.0)**
Affected versions:
- f615668a861c9d430afe7b40f42f352881132d193d16426951563997fbdc81da (Status: affected)
**Gigabyte - GA-Z68XP-UD3P (rev. 1.0)**
Affected versions:
- 1d3552918dfc84151da3dabc0687a4513f1dea9d6879d53a8b8646398fc462e5 (Status: affected)
**Gigabyte - GA-Z68XP-UD3R (rev. 1.0)**
Affected versions:
- e4f33b57947d45b3e43bdd7bafd68d2f4c799fdf0b72a8a2ca61319ab760ae67 (Status: affected)
**Gigabyte - GA-Z68P-DS3 (rev. 2.0)**
Affected versions:
- 5823dc1fbc95d092e02519c069c4fd111783428757b969fd8b9dbac1009fe91e (Status: affected)
**Gigabyte - GA-Z68XP-D3 (rev. 1.0)**
Affected versions:
- 384d9e1e3cad82b7841f33115dbfdf38589420716c8c0aa5a190971a44aa39e9 (Status: affected)
**Gigabyte - GA-Z68A-D3-B3 (rev. 1.0)**
Affected versions:
- 2065b895916edbec17057603ba98779b4bd10cbfc3477a87c767a36fb027b76a (Status: affected)
**Gigabyte - GA-Z68A-D3H-B3 (rev. 1.0)**
Affected versions:
- d6c9d4c8caf3307da9b1d6543e00682a3cddf1dc06c41f0f973355cb9c8554bc (Status: affected)
**Gigabyte - GA-Z68AP-D3**
Affected versions:
- 7013aca3c062f040cf9d0448f7e2892101b30e5956915c8dc3a53c3c2aacd13d (Status: affected)
**Gigabyte - GA-Z68M-D2H**
Affected versions:
- d6d451499ebe6d8dd621f1c2ebb00b87dd01f7870b791e682b66d5f33eb01d8b (Status: affected)
**Gigabyte - GA-Z68XP-UD3**
Affected versions:
- c676efd7e6c8bf4a7d3da8aa51b2b564d77c67f6d2be68b25232326166e0c20b (Status: affected)
**Gigabyte - GA-Z68XP-UD4 (rev. 1.0)**
Affected versions:
- 4ae3a48e1a715461671107f9e8e790cfd1c4ee4d2b8ddaa50b140d67622b920f (Status: affected)
**Gigabyte - GA-C1007UN (rev. 1.0)**
Affected versions:
- 7b2aaaa9f92c0e6fa23a59bdda27d5cb26e8fdece26bc756893490d3ee657a4b (Status: affected)
**Gigabyte - GA-C1007UN-D (rev. 1.0)**
Affected versions:
- fcf7c3d07e1bf9f1347e48dd3ac6e45fc9492648985a06394ab6568a7a71e262 (Status: affected)
**Gigabyte - GA-H77M-HD3**
Affected versions:
- e3b619d396378c2e6bc2f550cf1c55cd17e7091fa4ab90761f32582eba28884d (Status: affected)
**Gigabyte - G1.Sniper 3 (rev. 1.0)**
Affected versions:
- cfa61511dad005aeb4ab01678f87169c7d509d59042b2fd33e8b58bdb34febe6 (Status: affected)
**Gigabyte - GA-6UASL3 (rev. 1.x/2.x)**
Affected versions:
- 7196b64c2f89763d2ea7f0f106d06352ae2c0e17a83fed2d10548e1aefa39245 (Status: affected)
**Gigabyte - GA-Z77X-UD4H**
Affected versions:
- 3ff3a0cad413c0b862ba515d60cac0e98e373e199f0d92c79a77ebe6fa6a2247 (Status: affected)
**Gigabyte - GA-Q77M-D2H (rev. 1.0)**
Affected versions:
- 43216a565586f1c49090c7982e6f3c1e41b179e430d7ac0c47c8ad07308a5bc3 (Status: affected)
**Gigabyte - GA-Z77-HD4**
Affected versions:
- f6cd8446d78da9720f06cd360a48e9b6bdae33e342e18cb05420adb78fe05858 (Status: affected)
**Gigabyte - GA-Z77-HD3**
Affected versions:
- c1209a2eb0b5eb9324e1a8ce11c77ca141023b94b988bd1df4db390dda4c275a (Status: affected)
**Gigabyte - GA-Z77P-D3**
Affected versions:
- 00fa676c6d12df8a48049f39b87e3343769356e880d2abcaf04ab1b679c450f9 (Status: affected)
**Gigabyte - GA-Z77X-UP4 TH (rev. 1.0)**
Affected versions:
- c5310894b9a2bb510f37c49852d743d64343a698436ca22d9b7a44bcf20e447a (Status: affected)
**Gigabyte - Q1742F**
Affected versions:
- 350cc51e5e7fa472e95460eed374eb1f9a43ea4e615e2654c26a9da4d83bf529 (Status: affected)
**Gigabyte - GA-6UASL1 (rev. 1.0)**
Affected versions:
- f86f7ad9ffbc7437bba6bcf99d08b8de38f945bedff00c2d35362387077eabea (Status: affected)
**Gigabyte - Q2542N**
Affected versions:
- 3d6faf2792722d1b9fbff087e4d85ddd2a4f9922a7848ed4db99284687df3b23 (Status: affected)
**HP - hp-proone-400-g1-19.5-inch-non-touch-all-in-one-pc**
Affected versions:
- 642290f1b37e616b64b3c6b60921e24ddad599a38e67cd46a281b24c1ab62bb3 (Status: affected)
**HP - hp-rp5-retail-system-model-5810**
Affected versions:
- 2a090cfc69ebd88dbe2e2e9c52a7f3a75b8b150478e30a752c5c0f09129f3bc9 (Status: affected)
**HP - hp-z1-all-in-one-g2-workstation**
Affected versions:
- d0a54ae69192d2d0289b2c9ae33a6ffd0a0db78189b41b032e18a3452c878eab (Status: affected)
**HP - hp-z228-microtower-workstation**
Affected versions:
- 5174331d57cf3392012b00a6de381ee7a873f7fbd217bfa3e744b7dd6136807b (Status: affected)
**HP - hp-z820-workstation**
Affected versions:
- b02cdd16e398c2f31e9641d27d99865c404357136f857a1e2dcf2f7479b9457d (Status: affected)
**HP - hp-z420-workstation**
Affected versions:
- 05e89382e73afb280f637acbfa1029e9107dd30c78df37b6a00f184657f5f2c3 (Status: affected)
**HP - hp-z1-all-in-one-workstation**
Affected versions:
- b6fd5cd3364bdfa459f040c1693b879bbcf508513124bb95b5f36743efd8e73c (Status: affected)
**HP - hp-z220-convertible-minitower-workstation**
Affected versions:
- cc5a9c2d4827e9b1501c2dc0a464f580d4a2d65e4ff83dbab548e51839339d06 (Status: affected)
**HP - hp-prodesk-400-g1-microtower-pc**
Affected versions:
- 289f0fa72150a52f2b71bc6bf23f343ad9c1c412aa5977e89ffde7474562cb18 (Status: affected)
**HP - hp-prodesk-600-g1-desktop-mini-pc**
Affected versions:
- a80a5c395fd3b28b0130d4579dd3e462f9e38bccb2a42cc5245cedd70b27ff0e (Status: affected)
**HP - hp-compaq-elite-8380-convertible-minitower-pc**
Affected versions:
- 455164a23e14f8cc9567b458dfb85106294f149f0e446d2d8b4036551f894cf5 (Status: affected)
**HP - hp-elitedesk-705-g1-desktop-mini-pc**
Affected versions:
- 1650cfd06bb698ad3cecd9e0c38b0de04d29f9c397492ba70b985b033e2458da (Status: affected)
**HP - hp-compaq-pro-6305-microtower-pc**
Affected versions:
- 44988d41019bf5c7989b71e966b97752f60c835ba2300c7d55323eded97c21e6 (Status: affected)
**HP - hp-elitedesk-800-g1-tower-pc**
Affected versions:
- 659078fcdff1dead57cd05eafa0af4de667b52e981d1b907f0d963b41902dc7a (Status: affected)
**Lenovo - lenovo-10w-type-82st-82su**
Affected versions:
- 69dae6e64125b37fa0ee09f5cd9bf3581b3244e99d9b4651395834f9eef021af (Status: affected)
**Lenovo - thinkcentre-edge-62z**
Affected versions:
- b04cc879ac09941e714a8ccce371111bcbbc8d7b1dd1ecdc823de09fd2dad7b3 (Status: affected)
**Lenovo - thinkcentre-m72z**
Affected versions:
- 4438137139edb1e04de7e265e94444e1c87316b0821178285d87763f00bcc5df (Status: affected)
**Lenovo - thinkcentre-edge-92z**
Affected versions:
- e37c7b66aef1c9702b08f3d08a41edf3e4617fc94a17f318297506868e1d254e (Status: affected)
**Lenovo - thinkcentre-m62z**
Affected versions:
- 76c5461e86a33095c4191aa02ccba85cdad5f24ac9c816fb8ab6f408cf32dcdf (Status: affected)
**Lenovo - lenovo-62-desktop**
Affected versions:
- 73a8fdf89ed1a2d0af45142f4b4498545ce4182ca704ad2b292490263480b1fd (Status: affected)
**Lenovo - aio-510-22asr**
Affected versions:
- 47affcc25ded66333920985902473398438b49dac28be82542062ddabffec3c8 (Status: affected)
**Lenovo - aio-300-22isu**
Affected versions:
- a6b6a2940a5f4c98e2f531624707fd8ab7dc61f4b3d3de0457fe00ba3cc5c135 (Status: affected)
**Lenovo - lenovo-c460-all-in-one**
Affected versions:
- 1235ca01cc48484db1157b312ec1632c45be511cfbff28d25404df0a3df47148 (Status: affected)
**Lenovo - lenovo-c365-all-in-one**
Affected versions:
- 7cf94927f6826886883baf229f3cc2f2545588a564ddb7583f2b52853aeb5b21 (Status: affected)
**Lenovo - lenovo-erazer-x700-desktop**
Affected versions:
- 8dbcebb69c00242f0a346c34776171061d606262f412e92f84be99301d413c21 (Status: affected)
**Lenovo - lenovo-h520e-desktop**
Affected versions:
- 0ee94a5c0d4b93a2a1618d144bb0a505865a5d308c484c80fcf26fe31f23617a (Status: affected)
**Supermicro - Multiple**
Affected versions:
- https://www.supermicro.com/en/support/security_PKFAIL_Jul_2024 (Status: affected)
**Fujitsu - Multiple**
Affected versions:
- https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf (Status: affected)
**Intel - Multiple**
Affected versions:
- https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html (Status: affected)
### References
1. [UEFI Forum Standards on SecureBoot and Driver Signing Advisory](https://uefi.org/specs/UEFI/2.9_A/32_Secure_Boot_and_Driver_Signing.html)
2. [Binarly Finder's Advisory](https://www.binarly.io/advisories/brly-2024-005)
3. [CERT/CC Advisory](https://kb.cert.org/vuls/id/455367)
4. [Binarly Technical Description](https://github.com/binarly-io/Vulnerability-REsearch/blob/main/PKfail/BRLY-2024-005.md)
5. [Supermicro Advisory](https://www.supermicro.com/en/support/security_PKFAIL_Jul_2024)
6. [Intel Advisory cum End-ofLife anouncement](https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html)
7. [Fujitsu Advisory](https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf)
8. [Gigabyte Advisory](https://www.gigabyte.com/us/Support/Security/2205)
### Credits
- Binarly Research team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13235, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13235
- **State**: PUBLISHED
- **Published Date**: August 27, 2019 at 11:06 UTC
- **Last Updated**: August 04, 2024 at 23:49 UTC
- **Reserved Date**: July 04, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/alkacon/apollo-template/commits/branch_10_5_x)
2. [](https://aetsu.github.io/OpenCms)
3. [](http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4682, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4682
- **State**: PUBLISHED
- **Published Date**: November 15, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 15:01 UTC
- **Reserved Date**: September 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CoreText in Apple Mac OS X 10.4 through 10.4.10 allows attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted text content that triggers an access of an uninitialized object pointer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1018950](http://securitytracker.com/id?1018950)
2. [VU#498105](http://www.kb.cert.org/vuls/id/498105)
3. [26444](http://www.securityfocus.com/bid/26444)
4. [APPLE-SA-2007-11-14](http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html)
5. [](http://docs.info.apple.com/article.html?artnum=307041)
6. [ADV-2007-3868](http://www.vupen.com/english/advisories/2007/3868)
7. [macosx-coretext-code-execution(38465)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38465)
8. [27643](http://secunia.com/advisories/27643)
9. [TA07-319A](http://www.us-cert.gov/cas/techalerts/TA07-319A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51515, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51515
- **State**: PUBLISHED
- **Published Date**: November 05, 2024 at 09:00 UTC
- **Last Updated**: November 05, 2024 at 14:53 UTC
- **Reserved Date**: October 29, 2024 at 01:43 UTC
- **Assigned By**: huawei
### Vulnerability Description
Race condition vulnerability in the kernel network module
Impact:Successful exploitation of this vulnerability may affect availability.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-362: Security Weakness
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 5.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/11/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18856, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18856 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18856
- **State**: PUBLISHED
- **Published Date**: April 29, 2020 at 13:43 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: April 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NETGEAR ReadyNAS devices before 6.6.1 are affected by command injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000044333/Security-Advisory-for-Operating-System-Command-Injection-on-ReadyNAS-OS-6-Storage-Systems-PSV-2017-2002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36719, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36719
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 21:55 UTC
- **Last Updated**: August 03, 2024 at 10:14 UTC
- **Reserved Date**: July 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the ok parameter at /admin/history.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/kingbhob02/library-management-system/SQLi-11.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3958, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3958
- **State**: PUBLISHED
- **Published Date**: January 13, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 06:45 UTC
- **Reserved Date**: November 16, 2009 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Multiple stack-based buffer overflows in the NOS Microsystems getPlus Helper ActiveX control before 1.6.2.49 in gp.ocx in the Download Manager in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow remote attackers to execute arbitrary code via unspecified initialization parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:8455](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8455)
2. [37759](http://www.securityfocus.com/bid/37759)
3. [](http://www.adobe.com/support/security/bulletins/apsb10-02.html)
4. [ADV-2010-0103](http://www.vupen.com/english/advisories/2010/0103)
5. [1023446](http://www.securitytracker.com/id?1023446)
6. [acrobat-reader-download-manager-bo(55556)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55556)
7. [VU#773545](http://www.kb.cert.org/vuls/id/773545)
8. [SUSE-SA:2010:008](http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html)
9. [TA10-013A](http://www.us-cert.gov/cas/techalerts/TA10-013A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2866
- **State**: PUBLISHED
- **Published Date**: February 08, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 23:40 UTC
- **Reserved Date**: March 09, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
An unspecified vulnerability in IBM Jazz Team Server may disclose some deployment information to an authenticated user.
### Affected Products
**IBM Corporation - Rational Collaborative Lifecycle Management**
Affected versions:
- 3.0.1 (Status: affected)
- 4.0 (Status: affected)
- 3.0.1.6 (Status: affected)
- 4.0.1 (Status: affected)
- 4.0.2 (Status: affected)
- 4.0.3 (Status: affected)
- 4.0.4 (Status: affected)
- 4.0.5 (Status: affected)
- 4.0.6 (Status: affected)
- 5.0 (Status: affected)
- 4.0.7 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg21997104) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6838
- **State**: PUBLISHED
- **Published Date**: June 27, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 11:42 UTC
- **Reserved Date**: June 27, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in search.php in Zoph 0.7.2.1 allows remote attackers to inject arbitrary web script or HTML via the _off parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [zoph-search-xss(43691)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43691)
2. [30116](http://www.securityfocus.com/bid/30116)
3. [](http://www.securityfocus.com/bid/30116/exploit) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3824
- **State**: REJECTED
- **Published Date**: February 15, 2021 at 21:41 UTC
- **Last Updated**: February 15, 2021 at 21:41 UTC
- **Reserved Date**: December 17, 2019 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7906
- **State**: PUBLISHED
- **Published Date**: June 06, 2018 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 01:31 UTC
- **Reserved Date**: April 18, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
In ABB IP GATEWAY 3.39 and prior, the web server does not sufficiently verify that a request was performed by the authenticated user, which may allow an attacker to launch a request impersonating that user.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**ICS-CERT - ABB IP GATEWAY**
Affected versions:
- All versions prior to version 3.39 (Status: affected)
### References
1. [104388](http://www.securityfocus.com/bid/104388)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-156-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21786, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21786
- **State**: PUBLISHED
- **Published Date**: July 07, 2021 at 16:49 UTC
- **Last Updated**: August 03, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A privilege escalation vulnerability exists in the IOCTL 0x9c406144 handling of IOBit Advanced SystemCare Ultimate 14.2.0.220. A specially crafted I/O request packet (IRP) can lead to increased privileges. An attacker can send a malicious IRP to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-782: OS Command Injection
### Affected Products
**n/a - Iobit**
Affected versions:
- IOBit Advanced SystemCare Ultimate 14.2.0.220 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1253) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52559
- **State**: PUBLISHED
- **Published Date**: March 02, 2024 at 21:59 UTC
- **Last Updated**: May 04, 2025 at 07:38 UTC
- **Reserved Date**: March 02, 2024 at 21:55 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Avoid memory allocation in iommu_suspend()
The iommu_suspend() syscore suspend callback is invoked with IRQ disabled.
Allocating memory with the GFP_KERNEL flag may re-enable IRQs during
the suspend callback, which can cause intermittent suspend/hibernation
problems with the following kernel traces:
Calling iommu_suspend+0x0/0x1d0
------------[ cut here ]------------
WARNING: CPU: 0 PID: 15 at kernel/time/timekeeping.c:868 ktime_get+0x9b/0xb0
...
CPU: 0 PID: 15 Comm: rcu_preempt Tainted: G U E 6.3-intel #r1
RIP: 0010:ktime_get+0x9b/0xb0
...
Call Trace:
<IRQ>
tick_sched_timer+0x22/0x90
? __pfx_tick_sched_timer+0x10/0x10
__hrtimer_run_queues+0x111/0x2b0
hrtimer_interrupt+0xfa/0x230
__sysvec_apic_timer_interrupt+0x63/0x140
sysvec_apic_timer_interrupt+0x7b/0xa0
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x1f/0x30
...
------------[ cut here ]------------
Interrupts enabled after iommu_suspend+0x0/0x1d0
WARNING: CPU: 0 PID: 27420 at drivers/base/syscore.c:68 syscore_suspend+0x147/0x270
CPU: 0 PID: 27420 Comm: rtcwake Tainted: G U W E 6.3-intel #r1
RIP: 0010:syscore_suspend+0x147/0x270
...
Call Trace:
<TASK>
hibernation_snapshot+0x25b/0x670
hibernate+0xcd/0x390
state_store+0xcf/0xe0
kobj_attr_store+0x13/0x30
sysfs_kf_write+0x3f/0x50
kernfs_fop_write_iter+0x128/0x200
vfs_write+0x1fd/0x3c0
ksys_write+0x6f/0xf0
__x64_sys_write+0x1d/0x30
do_syscall_64+0x3b/0x90
entry_SYSCALL_64_after_hwframe+0x72/0xdc
Given that only 4 words memory is needed, avoid the memory allocation in
iommu_suspend().
### Affected Products
**Linux - Linux**
Affected versions:
- 33e07157105e472b746b70b3ed4197c57c43ab68 (Status: affected)
- 33e07157105e472b746b70b3ed4197c57c43ab68 (Status: affected)
- 33e07157105e472b746b70b3ed4197c57c43ab68 (Status: affected)
- 33e07157105e472b746b70b3ed4197c57c43ab68 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.11 (Status: affected)
- 0 (Status: unaffected)
- 5.15.136 (Status: unaffected)
- 6.1.57 (Status: unaffected)
- 6.5.7 (Status: unaffected)
- 6.6 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/29298c85a81abdc512e87537515ed4b1a9601d0e)
2. [](https://git.kernel.org/stable/c/c12ef025add77ca3a0902e8719d552b6d47b4282)
3. [](https://git.kernel.org/stable/c/496c591f0b389eb782f36d9d4c2564b9a865eed0)
4. [](https://git.kernel.org/stable/c/59df44bfb0ca4c3ee1f1c3c5d0ee8e314844799e) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.