System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14320, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14320
- **State**: PUBLISHED
- **Published Date**: August 16, 2022 at 19:37 UTC
- **Last Updated**: August 04, 2024 at 12:39 UTC
- **Reserved Date**: June 17, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
In Moodle before 3.9.1, 3.8.4 and 3.7.7, the filter in the admin task log required extra sanitizing to prevent a reflected XSS risk.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - Moodle**
Affected versions:
- Moodle 3.9, 3.8 to 3.8.3 and 3.7 to 3.7.6 (Status: affected)
### References
1. [](https://moodle.org/mod/forum/discuss.php?d=407392) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34067
- **State**: PUBLISHED
- **Published Date**: July 26, 2022 at 12:57 UTC
- **Last Updated**: August 03, 2024 at 08:16 UTC
- **Reserved Date**: June 20, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Warehouse Management System v1.0 was discovered to contain a SQL injection vulnerability via the cari parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Warehouse-Management-System) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49557
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:14 UTC
- **Last Updated**: May 04, 2025 at 08:40 UTC
- **Reserved Date**: February 26, 2025 at 02:08 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
x86/fpu: KVM: Set the base guest FPU uABI size to sizeof(struct kvm_xsave)
Set the starting uABI size of KVM's guest FPU to 'struct kvm_xsave',
i.e. to KVM's historical uABI size. When saving FPU state for usersapce,
KVM (well, now the FPU) sets the FP+SSE bits in the XSAVE header even if
the host doesn't support XSAVE. Setting the XSAVE header allows the VM
to be migrated to a host that does support XSAVE without the new host
having to handle FPU state that may or may not be compatible with XSAVE.
Setting the uABI size to the host's default size results in out-of-bounds
writes (setting the FP+SSE bits) and data corruption (that is thankfully
caught by KASAN) when running on hosts without XSAVE, e.g. on Core2 CPUs.
WARN if the default size is larger than KVM's historical uABI size; all
features that can push the FPU size beyond the historical size must be
opt-in.
==================================================================
BUG: KASAN: slab-out-of-bounds in fpu_copy_uabi_to_guest_fpstate+0x86/0x130
Read of size 8 at addr ffff888011e33a00 by task qemu-build/681
CPU: 1 PID: 681 Comm: qemu-build Not tainted 5.18.0-rc5-KASAN-amd64 #1
Hardware name: /DG35EC, BIOS ECG3510M.86A.0118.2010.0113.1426 01/13/2010
Call Trace:
<TASK>
dump_stack_lvl+0x34/0x45
print_report.cold+0x45/0x575
kasan_report+0x9b/0xd0
fpu_copy_uabi_to_guest_fpstate+0x86/0x130
kvm_arch_vcpu_ioctl+0x72a/0x1c50 [kvm]
kvm_vcpu_ioctl+0x47f/0x7b0 [kvm]
__x64_sys_ioctl+0x5de/0xc90
do_syscall_64+0x31/0x50
entry_SYSCALL_64_after_hwframe+0x44/0xae
</TASK>
Allocated by task 0:
(stack is not available)
The buggy address belongs to the object at ffff888011e33800
which belongs to the cache kmalloc-512 of size 512
The buggy address is located 0 bytes to the right of
512-byte region [ffff888011e33800, ffff888011e33a00)
The buggy address belongs to the physical page:
page:0000000089cd4adb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11e30
head:0000000089cd4adb order:2 compound_mapcount:0 compound_pincount:0
flags: 0x4000000000010200(slab|head|zone=1)
raw: 4000000000010200 dead000000000100 dead000000000122 ffff888001041c80
raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
Memory state around the buggy address:
ffff888011e33900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff888011e33980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffff888011e33a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
^
ffff888011e33a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ffff888011e33b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
==================================================================
Disabling lock debugging due to kernel taint
### Affected Products
**Linux - Linux**
Affected versions:
- c60427dd50ba9b20063ccaed0e98d62e886d7a3b (Status: affected)
- c60427dd50ba9b20063ccaed0e98d62e886d7a3b (Status: affected)
- c60427dd50ba9b20063ccaed0e98d62e886d7a3b (Status: affected)
**Linux - Linux**
Affected versions:
- 5.17 (Status: affected)
- 0 (Status: unaffected)
- 5.17.13 (Status: unaffected)
- 5.18.2 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/9cf15ebb7dedfe2f27120743b8ea8441c99ac73c)
2. [](https://git.kernel.org/stable/c/c181acbd1a427859d5fda543b95fbae28f7f6068)
3. [](https://git.kernel.org/stable/c/d187ba5312307d51818beafaad87d28a7d939adf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3491, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3491
- **State**: PUBLISHED
- **Published Date**: July 16, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 16:14 UTC
- **Reserved Date**: May 07, 2013 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in the Sharebar plugin 1.2.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) add or (2) modify buttons, or (3) insert cross-site scripting (XSS) sequences.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [60956](http://www.securityfocus.com/bid/60956)
2. [52948](http://secunia.com/advisories/52948)
3. [sharebar-cve20133491-csrf(85438)](https://exchange.xforce.ibmcloud.com/vulnerabilities/85438) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26700
- **State**: PUBLISHED
- **Published Date**: February 25, 2021 at 23:02 UTC
- **Last Updated**: August 03, 2024 at 20:33 UTC
- **Reserved Date**: February 05, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Visual Studio Code npm-script Extension Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Visual Studio Code - npm-script Extension**
Affected versions:
- 0.1.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26700) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5054
- **State**: PUBLISHED
- **Published Date**: November 13, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 10:40 UTC
- **Reserved Date**: November 13, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Develop It Easy Membership System 1.3 allow remote attackers to execute arbitrary SQL commands via the (1) email and (2) password parameters to customer_login.php and the (3) user_name and (4) user_pass parameters to admin/index.php. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32147](http://www.securityfocus.com/bid/32147)
2. [7015](https://www.exploit-db.com/exploits/7015)
3. [32594](http://secunia.com/advisories/32594)
4. [membershipsystem-multiple-sql-injection(46396)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46396) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0048, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0048 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0048
- **State**: PUBLISHED
- **Published Date**: March 10, 2020 at 20:03 UTC
- **Last Updated**: August 04, 2024 at 05:47 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In onTransact of IAudioFlinger.cpp, there is a possible stack information leak due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-139417189
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2020-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1407
- **State**: PUBLISHED
- **Published Date**: October 20, 2007 at 10:00 UTC
- **Last Updated**: August 08, 2024 at 02:28 UTC
- **Reserved Date**: October 19, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in cmd.exe in Windows NT 4.0 may allow local users to execute arbitrary code via a long pathname argument to the cd command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20030211 SECURITY.NNOV: Windows NT 4.0/2000 cmd.exe long path buffer overflow/DoS](http://www.securityfocus.com/archive/1/311359)
2. [6829](http://www.securityfocus.com/bid/6829)
3. [win-cmd-cd-bo(11329)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11329)
4. [3251](http://securityreason.com/securityalert/3251) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0134, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0134
- **State**: PUBLISHED
- **Published Date**: January 16, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 04:24 UTC
- **Reserved Date**: January 16, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Insecure method vulnerability in the EasyGrid.SGCtrl.32 ActiveX control in EasyGrid.ocx 1.0.0.1 in AAA EasyGrid ActiveX 3.51 allows remote attackers to create and overwrite arbitrary files via the (1) DoSaveFile or (2) DoSaveHtmlFile method. NOTE: vector 1 could be leveraged for code execution by creating executable files in Startup folders or by accessing files using hcp:// URLs. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [easygrid-activex-dosavefile-file-overwrite(47946)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47946)
2. [33272](http://www.securityfocus.com/bid/33272)
3. [33537](http://secunia.com/advisories/33537)
4. [4913](http://securityreason.com/securityalert/4913)
5. [7779](https://www.exploit-db.com/exploits/7779) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2916, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2916
- **State**: PUBLISHED
- **Published Date**: May 30, 2007 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 13:57 UTC
- **Reserved Date**: May 29, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in showown.php in GMTT Music Distro 1.2 allows remote attackers to inject arbitrary web script or HTML via the st parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25385](http://secunia.com/advisories/25385)
2. [36571](http://osvdb.org/36571)
3. [20070522 GMTT Music Distro 1.2 XSS Exploit](http://www.securityfocus.com/archive/1/469269/100/0/threaded)
4. [2745](http://securityreason.com/securityalert/2745)
5. [ADV-2007-1938](http://www.vupen.com/english/advisories/2007/1938)
6. [24108](http://www.securityfocus.com/bid/24108)
7. [gmttmusicdistro-showown-xss(34440)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34440)
8. [20070522 GMTT Music Distro 1.2 Vulnerable to XSS](http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063515.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3828, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3828 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3828
- **State**: PUBLISHED
- **Published Date**: September 19, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 04:57 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: elastic
### Vulnerability Description
Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 contain an information exposure vulnerability. It was discovered that certain exception conditions would result in encryption keys, passwords, and other security sensitive headers being leaked to the allocator logs. An attacker with access to the logging cluster may obtain leaked credentials and perform authenticated actions using these credentials.
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**Elastic - Elastic Cloud Enterprise**
Affected versions:
- before 1.1.4 (Status: affected)
### References
1. [](https://www.elastic.co/community/security)
2. [](https://discuss.elastic.co/t/elastic-cloud-enterprise-1-1-4-security-update/135778) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1692, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1692 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1692
- **State**: PUBLISHED
- **Published Date**: February 07, 2018 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 01:22 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM AIX 5.3, 6.1, 7.1, and 7.2 contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges. IBM X-Force ID: 134067.
### Affected Products
**IBM - AIX**
Affected versions:
- 6.1 (Status: affected)
- 5.3 (Status: affected)
- 7.1 (Status: affected)
- 7.2 (Status: affected)
### References
1. [](http://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc)
2. [1040330](http://www.securitytracker.com/id/1040330)
3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/134067) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16225, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16225
- **State**: PUBLISHED
- **Published Date**: September 18, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 30, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The QBee MultiSensor Camera through 4.16.4 accepts unencrypted network traffic from clients (such as the QBee Cam application through 1.0.5 for Android and the Swisscom Home application up to 10.7.2 for Android), which results in an attacker being able to reuse cookies to bypass authentication and disable the camera.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20180916 [CVE-2018-16225] QBee MultiSensor Camera LAN Traffic Vulnerability](https://seclists.org/fulldisclosure/2018/Sep/21)
2. [](https://blog.francescoservida.ch/2018/09/16/cve-2018-16225-public-disclosure-qbee-camera-vulnerability/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37080, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37080 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37080
- **State**: PUBLISHED
- **Published Date**: June 18, 2024 at 05:43 UTC
- **Last Updated**: March 13, 2025 at 14:42 UTC
- **Reserved Date**: June 03, 2024 at 05:40 UTC
- **Assigned By**: vmware
### Vulnerability Description
vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**n/a - VMware vCenter Server**
Affected versions:
- 8.0 (Status: affected)
- 8.0 (Status: affected)
- 7.0 (Status: affected)
**n/a - VMware Cloud Foundation**
Affected versions:
- 5.x (Status: affected)
- 4.x (Status: affected)
### References
1. [](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2791
- **State**: PUBLISHED
- **Published Date**: June 20, 2008 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 09:14 UTC
- **Reserved Date**: June 19, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in product.detail.php in Kalptaru Infotech Comparison Engine Power Script 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5834](https://www.exploit-db.com/exploits/5834)
2. [engine-productdetail-sql-injection(43138)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43138)
3. [30729](http://secunia.com/advisories/30729)
4. [29768](http://www.securityfocus.com/bid/29768) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6157
- **State**: PUBLISHED
- **Published Date**: October 27, 2017 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 03:22 UTC
- **Reserved Date**: February 21, 2017 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and Websafe software version 12.0.0 to 12.1.1, 11.6.0 to 11.6.1, 11.5.0 - 11.5.4, virtual servers with a configuration using the HTTP Explicit Proxy functionality and/or SOCKS profile are vulnerable to an unauthenticated, remote attack that allows modification of BIG-IP system configuration, extraction of sensitive system files, and/or possible remote command execution on the BIG-IP system.
### Affected Products
**F5 Networks, Inc. - BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, Websafe**
Affected versions:
- 12.0.0 - 12.1.1 (Status: affected)
- 11.6.0 - 11.6.1 (Status: affected)
- 11.5.0 - 11.5.4 (Status: affected)
### References
1. [101634](http://www.securityfocus.com/bid/101634)
2. [1039672](http://www.securitytracker.com/id/1039672)
3. [](https://support.f5.com/csp/article/K02692210) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2075
- **State**: PUBLISHED
- **Published Date**: August 31, 2020 at 17:09 UTC
- **Last Updated**: August 04, 2024 at 06:54 UTC
- **Reserved Date**: December 04, 2019 at 00:00 UTC
- **Assigned By**: SICK AG
### Vulnerability Description
Platform mechanism AutoIP allows remote attackers to reboot the device via a crafted packet in SICK AG solutions Bulkscan LMS111, Bulkscan LMS511, CLV62x – CLV65x, ICR890-3, LMS10x, LMS11x, LMS15x, LMS12x, LMS13x, LMS14x, LMS5xx, LMS53x, MSC800, RFH.
### Weakness Classification (CWE)
- CWE-703: Security Weakness
### Affected Products
**n/a - Bulkscan LMS111; Bulkscan LMS511; CLV62x – CLV65x; ICR890-3; LMS10x, LMS11x, LMS15x; LMS12x, LMS13x, LMS14x; LMS5xx, LMS53x; MSC800; RFH**
Affected versions:
- All Versions < V1.04 (Status: affected)
- All Versions < V2.30 (Status: affected)
- All versions with Ethernet interface (Status: affected)
- All ICR890-3 and ICR890-3.5 devices all versions (Status: affected)
- All Versions < V2.0 (Status: affected)
- All Versions < V2.10 (Status: affected)
- All versions (Status: affected)
- All Versions < V4.10 (Status: affected)
### References
1. [](https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7069
- **State**: PUBLISHED
- **Published Date**: August 25, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 11:56 UTC
- **Reserved Date**: August 24, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
All Club CMS (ACCMS) 0.0.2 and earlier stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain database configuration information, including credentials, via a direct request to accms.dat.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [allclubcms-accms-info-disclosure(47121)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47121)
2. [7266](https://www.exploit-db.com/exploits/7266) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3037, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3037
- **State**: PUBLISHED
- **Published Date**: April 17, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 23:40 UTC
- **Reserved Date**: March 09, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cognos TM1 10.1 and 10.2 provides a service to return the victim's password with a valid session key. An authenticated attacker with user interaction could obtain this sensitive information. IBM X-Force ID: 114613.
### Affected Products
**IBM Corporation - Cognos TM1**
Affected versions:
- 10.1 (Status: affected)
- 10.1.1 (Status: affected)
- 10.2.0.2 (Status: affected)
- 10.2.2 (Status: affected)
- 10.1.1.2 (Status: affected)
- 10.2 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg21999649)
2. [97917](http://www.securityfocus.com/bid/97917) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2109
- **State**: PUBLISHED
- **Published Date**: June 18, 2009 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 05:36 UTC
- **Reserved Date**: June 18, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in FretsWeb 1.2 allow remote attackers to read arbitrary files via directory traversal sequences in the (1) language parameter to charts.php and the (2) fretsweb_language cookie parameter to unspecified vectors, possibly related to admin/common.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [55166](http://osvdb.org/55166)
2. [35492](http://secunia.com/advisories/35492)
3. [8979](https://www.exploit-db.com/exploits/8979)
4. [55196](http://osvdb.org/55196) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47213, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47213 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47213
- **State**: REJECTED
- **Published Date**: April 10, 2024 at 19:01 UTC
- **Last Updated**: April 15, 2024 at 08:15 UTC
- **Reserved Date**: April 10, 2024 at 18:59 UTC
- **Assigned By**: Linux
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32778, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32778 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32778
- **State**: PUBLISHED
- **Published Date**: June 09, 2024 at 13:08 UTC
- **Last Updated**: August 02, 2024 at 02:20 UTC
- **Reserved Date**: April 18, 2024 at 09:15 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Contest Gallery.This issue affects Contest Gallery: from n/a through 21.3.4.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Contest Gallery - Contest Gallery**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/contest-gallery/wordpress-contest-gallery-plugin-21-3-4-arbitrary-file-deletion-vulnerability?_s_id=cve)
### Credits
- CatFather (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1815, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1815
- **State**: PUBLISHED
- **Published Date**: December 13, 2018 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 20:07 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 for Enterprise Single-Sign On is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150019.
### Affected Products
**IBM - Security Access Manager Appliance**
Affected versions:
- 9.0.1.0 (Status: affected)
- 9.0.2.0 (Status: affected)
- 9.0.3.0 (Status: affected)
- 9.0.4.0 (Status: affected)
- 9.0.5.0 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=ibm10787785)
2. [ibm-sam-cve20181815-xss(150019)](https://exchange.xforce.ibmcloud.com/vulnerabilities/150019) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4975, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4975
- **State**: REJECTED
- **Published Date**: December 30, 2019 at 16:19 UTC
- **Last Updated**: December 30, 2019 at 16:19 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28044, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28044
- **State**: PUBLISHED
- **Published Date**: April 15, 2022 at 13:06 UTC
- **Last Updated**: August 03, 2024 at 05:41 UTC
- **Reserved Date**: March 28, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Irzip v0.640 was discovered to contain a heap memory corruption via the component lrzip.c:initialise_control.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ckolivas/lrzip/issues/216)
2. [](https://github.com/ckolivas/lrzip/commit/5faf80cd53ecfd16b636d653483144cd12004f46)
3. [[debian-lts-announce] 20220514 [SECURITY] [DLA 3005-1] lrzip security update](https://lists.debian.org/debian-lts-announce/2022/05/msg00016.html)
4. [DSA-5145](https://www.debian.org/security/2022/dsa-5145) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11437, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11437
- **State**: PUBLISHED
- **Published Date**: August 02, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 18:12 UTC
- **Reserved Date**: July 19, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GitLab Enterprise Edition (EE) before 8.17.7, 9.0.11, 9.1.8, 9.2.8, and 9.3.8 allows an authenticated user with the ability to create a project to use the mirroring feature to potentially read repositories belonging to other users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://about.gitlab.com/2017/07/19/gitlab-9-dot-3-dot-8-released/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23438, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23438
- **State**: PUBLISHED
- **Published Date**: January 16, 2025 at 20:06 UTC
- **Last Updated**: January 16, 2025 at 20:24 UTC
- **Reserved Date**: January 16, 2025 at 11:24 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MarvinLabs WP PT-Viewer allows Reflected XSS.This issue affects WP PT-Viewer: from n/a through 2.0.2.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**MarvinLabs - WP PT-Viewer**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-ptviewer/vulnerability/wordpress-wp-pt-viewer-plugin-2-0-2-reflected-xss-vulnerability?_s_id=cve)
### Credits
- Joshua Chan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42180, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42180
- **State**: PUBLISHED
- **Published Date**: January 12, 2025 at 21:53 UTC
- **Last Updated**: January 13, 2025 at 15:14 UTC
- **Reserved Date**: July 29, 2024 at 21:32 UTC
- **Assigned By**: HCL
### Vulnerability Description
HCL MyXalytics is affected by a malicious file upload vulnerability. The application accepts invalid file uploads, including incorrect content types, double extensions, null bytes, and special characters, allowing attackers to upload and execute malicious files.
### CVSS Metrics
- **CVSS Base Score**: 1.6/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**HCL Software - DRYiCE MyXalytics**
Affected versions:
- 6.3 (Status: affected)
### References
1. [](https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118149) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47678, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47678
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 11:53 UTC
- **Last Updated**: May 04, 2025 at 09:37 UTC
- **Reserved Date**: September 30, 2024 at 16:00 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
icmp: change the order of rate limits
ICMP messages are ratelimited :
After the blamed commits, the two rate limiters are applied in this order:
1) host wide ratelimit (icmp_global_allow())
2) Per destination ratelimit (inetpeer based)
In order to avoid side-channels attacks, we need to apply
the per destination check first.
This patch makes the following change :
1) icmp_global_allow() checks if the host wide limit is reached.
But credits are not yet consumed. This is deferred to 3)
2) The per destination limit is checked/updated.
This might add a new node in inetpeer tree.
3) icmp_global_consume() consumes tokens if prior operations succeeded.
This means that host wide ratelimit is still effective
in keeping inetpeer tree small even under DDOS.
As a bonus, I removed icmp_global.lock as the fast path
can use a lock-free operation.
### Affected Products
**Linux - Linux**
Affected versions:
- 4cdf507d54525842dfd9f6313fdafba039084046 (Status: affected)
- 4cdf507d54525842dfd9f6313fdafba039084046 (Status: affected)
- 4cdf507d54525842dfd9f6313fdafba039084046 (Status: affected)
- 4cdf507d54525842dfd9f6313fdafba039084046 (Status: affected)
- 4cdf507d54525842dfd9f6313fdafba039084046 (Status: affected)
**Linux - Linux**
Affected versions:
- 3.18 (Status: affected)
- 0 (Status: unaffected)
- 6.1.113 (Status: unaffected)
- 6.6.54 (Status: unaffected)
- 6.10.13 (Status: unaffected)
- 6.11.2 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/997ba8889611891f91e8ad83583466aeab6239a3)
2. [](https://git.kernel.org/stable/c/662ec52260cc07b9ae53ecd3925183c29d34288b)
3. [](https://git.kernel.org/stable/c/a7722921adb046e3836eb84372241f32584bdb07)
4. [](https://git.kernel.org/stable/c/483397b4ba280813e4a9c161a0a85172ddb43d19)
5. [](https://git.kernel.org/stable/c/8c2bd38b95f75f3d2a08c93e35303e26d480d24e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11018
- **State**: PUBLISHED
- **Published Date**: November 11, 2024 at 07:02 UTC
- **Last Updated**: November 11, 2024 at 16:02 UTC
- **Reserved Date**: November 08, 2024 at 05:54 UTC
- **Assigned By**: twcert
### Vulnerability Description
Webopac from Grand Vice info does not properly validate uploaded file types, allowing unauthenticated remote attackers to upload and execute webshells, which could lead to arbitrary code execution on the server.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Grand Vice info - Webopac**
Affected versions:
- 6 (Status: affected)
- 7 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-8213-3413b-1.html)
2. [](https://www.twcert.org.tw/en/cp-139-8214-64fa2-2.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9954, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9954
- **State**: PUBLISHED
- **Published Date**: October 15, 2024 at 20:14 UTC
- **Last Updated**: October 22, 2024 at 19:37 UTC
- **Reserved Date**: October 14, 2024 at 21:14 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in AI in Google Chrome prior to 130.0.6723.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 130.0.6723.58 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html)
2. [](https://issues.chromium.org/issues/367755363) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20474
- **State**: PUBLISHED
- **Published Date**: December 13, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 14:14 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In readLazyValue of Parcel.java, there is a possible loading of arbitrary code into the System Settings app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-240138294
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 Android-12 Android-12L Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2022-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0685
- **State**: PUBLISHED
- **Published Date**: February 20, 2022 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 23:40 UTC
- **Reserved Date**: February 19, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.
### Weakness Classification (CWE)
- CWE-823: Security Weakness
### Affected Products
**vim - vim/vim**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782)
2. [](https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87)
3. [FEDORA-2022-48bf3cb1c4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/)
4. [[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html)
5. [GLSA-202208-32](https://security.gentoo.org/glsa/202208-32)
6. [](https://support.apple.com/kb/HT213488)
7. [20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13](http://seclists.org/fulldisclosure/2022/Oct/41)
8. [20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13](http://seclists.org/fulldisclosure/2022/Oct/28)
9. [[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update](https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13025
- **State**: PUBLISHED
- **Published Date**: December 29, 2024 at 22:31 UTC
- **Last Updated**: December 30, 2024 at 17:12 UTC
- **Reserved Date**: December 28, 2024 at 19:20 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Codezips College Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /Front-end/faculty.php. The manipulation of the argument book_name/book_author leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**Codezips - College Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-289716 | Codezips College Management System faculty.php sql injection](https://vuldb.com/?id.289716)
2. [VDB-289716 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.289716)
3. [Submit #471108 | Codezips College Management System 1.0 SQL Injection](https://vuldb.com/?submit.471108)
4. [](https://github.com/shaturo1337/POCs/blob/main/SQL%20Injection%20in%20College%20Management%20System.md)
### Credits
- John Correche (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8478
- **State**: PUBLISHED
- **Published Date**: April 29, 2020 at 01:58 UTC
- **Last Updated**: August 04, 2024 at 10:03 UTC
- **Reserved Date**: January 30, 2020 at 00:00 UTC
- **Assigned By**: ABB
### Vulnerability Description
Insufficient protection of the inter-process communication functions in ABB System 800xA products OPC Server for AC 800M, MMS Server for AC 800M and Base Software for SoftControl (all published versions) enables an attacker authenticated on the local system to inject data, affecting the online view of runtime data shown in Control Builder.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**ABB - OPC Server for AC 800M**
Affected versions:
- all versions (Status: affected)
**ABB - MMS Server for AC 800M**
Affected versions:
- all versions (Status: affected)
**ABB - Base Software for SoftControl**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://search.abb.com/library/Download.aspx?DocumentID=2PAA121236&LanguageCode=en&DocumentPartId=&Action=Launch) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22449, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22449
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 21:26 UTC
- **Last Updated**: April 15, 2025 at 13:34 UTC
- **Reserved Date**: January 03, 2022 at 22:29 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Verify Governance, Identity Manager 10.01 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 224915.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-209: Improper Input Validation
### Affected Products
**IBM - Security Verify Governance, Identity Manager**
Affected versions:
- 10.0.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6849247)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/224915) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38375, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38375 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38375
- **State**: PUBLISHED
- **Published Date**: June 26, 2024 at 18:46 UTC
- **Last Updated**: August 02, 2024 at 04:04 UTC
- **Reserved Date**: June 14, 2024 at 14:16 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
@fastly/js-compute is a JavaScript SDK and runtime for building Fastly Compute applications. The implementation of several functions were determined to include a use-after-free bug. This bug could allow for unintended data loss if the result of the preceding functions were sent anywhere else, and often results in a guest trap causing services to return a 500. This bug has been fixed in version 3.16.0 of the `@fastly/js-compute` package.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**fastly - js-compute-runtime**
Affected versions:
- >= 3.0.0, < 3.16.0 (Status: affected)
### References
1. [https://github.com/fastly/js-compute-runtime/security/advisories/GHSA-mp3g-vpm9-9vqv](https://github.com/fastly/js-compute-runtime/security/advisories/GHSA-mp3g-vpm9-9vqv)
2. [https://github.com/fastly/js-compute-runtime/commit/4e16641ef4e159c4a11b500ac861b8fa8d9ff5d3](https://github.com/fastly/js-compute-runtime/commit/4e16641ef4e159c4a11b500ac861b8fa8d9ff5d3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3062, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3062 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3062
- **State**: PUBLISHED
- **Published Date**: May 13, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 05:32 UTC
- **Reserved Date**: April 09, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [74604](http://www.securityfocus.com/bid/74604)
2. [](https://helpx.adobe.com/security/products/reader/apsb15-10.html)
3. [](http://www.zerodayinitiative.com/advisories/ZDI-15-207)
4. [1032284](http://www.securitytracker.com/id/1032284) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6102, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6102 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6102
- **State**: PUBLISHED
- **Published Date**: February 17, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 12:03 UTC
- **Reserved Date**: September 02, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Maximo Asset Management 7.1 through 7.1.1.13 and 7.5.0 before 7.5.0.6 IFIX008, Maximo Asset Management 7.5.0 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk, and Maximo Asset Management 7.1 through 7.1.1.13 and 7.2 for Tivoli IT Asset Management for IT and certain other products do not properly handle logout actions, which allows remote attackers to bypass intended Cognos BI Direct Integration access restrictions by leveraging an unattended workstation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21695597)
2. [ibm-maximo-cve20146102-sec-bypass(96141)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96141) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2020
- **State**: PUBLISHED
- **Published Date**: April 18, 2023 at 11:09 UTC
- **Last Updated**: February 05, 2025 at 15:48 UTC
- **Reserved Date**: April 13, 2023 at 08:38 UTC
- **Assigned By**: Tribe29
### Vulnerability Description
Insufficient permission checks in the REST API in Tribe29 Checkmk <= 2.1.0p27 and <= 2.2.0b4 (beta) allow unauthorized users to schedule downtimes for any host.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-280: Security Weakness
### Affected Products
**Tribe29 - Checkmk**
Affected versions:
- 2.2.0 (Status: affected)
- 2.1.0 (Status: affected)
### References
1. [](https://checkmk.com/werk/13981) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21405, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21405 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21405
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 18:04 UTC
- **Last Updated**: April 02, 2025 at 13:23 UTC
- **Reserved Date**: December 11, 2024 at 00:29 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Visual Studio Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Microsoft - Microsoft Visual Studio 2022 version 17.12**
Affected versions:
- 17.0 (Status: affected)
### References
1. [Visual Studio Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21405) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46609, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46609
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 12:00 UTC
- **Last Updated**: January 03, 2025 at 19:05 UTC
- **Reserved Date**: October 24, 2023 at 13:09 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in FeedFocal FeedFocal allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FeedFocal: from n/a through 1.2.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**FeedFocal - FeedFocal**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/feedfocal/vulnerability/wordpress-feedfocal-plugin-1-2-1-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7888, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7888 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7888
- **State**: PUBLISHED
- **Published Date**: June 07, 2017 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 08:06 UTC
- **Reserved Date**: October 22, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the WifiHs20UtilityService on the Samsung S6 Edge LRX22G.G925VVRU1AOE2 allows remote attackers to overwrite or create arbitrary files as the system-level user via a .. (dot dot) in the name of a file, compressed into a zipped file named cred.zip, and downloaded to /sdcard/Download.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [77338](http://www.securityfocus.com/bid/77338)
2. [](http://packetstormsecurity.com/files/134104/Samsung-WifiHs20UtilityService-Path-Traversal.html)
3. [](https://bugs.chromium.org/p/project-zero/issues/detail?id=489&q=samsung&redir=1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44957
- **State**: PUBLISHED
- **Published Date**: September 04, 2024 at 18:35 UTC
- **Last Updated**: May 04, 2025 at 09:29 UTC
- **Reserved Date**: August 21, 2024 at 05:34 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
xen: privcmd: Switch from mutex to spinlock for irqfds
irqfd_wakeup() gets EPOLLHUP, when it is called by
eventfd_release() by way of wake_up_poll(&ctx->wqh, EPOLLHUP), which
gets called under spin_lock_irqsave(). We can't use a mutex here as it
will lead to a deadlock.
Fix it by switching over to a spin lock.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.6.46 (Status: unaffected)
- 6.10.5 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c2775ae4d9227729f8ca9ee2a068f62a00d5ea9c)
2. [](https://git.kernel.org/stable/c/49f2a5da6785b2dbde93e291cae037662440346e)
3. [](https://git.kernel.org/stable/c/1c682593096a487fd9aebc079a307ff7a6d054a3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23493, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23493
- **State**: PUBLISHED
- **Published Date**: February 29, 2024 at 08:02 UTC
- **Last Updated**: August 01, 2024 at 23:06 UTC
- **Reserved Date**: February 26, 2024 at 08:14 UTC
- **Assigned By**: Mattermost
### Vulnerability Description
Mattermost fails to properly authorize the requests fetching team associated AD/LDAP groups, allowing a user to fetch details of AD/LDAP groups of a team that they are not a member of.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Mattermost - Mattermost**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 9.5.0 (Status: unaffected)
- 9.4.2 (Status: unaffected)
- 9.3.1 (Status: unaffected)
- 9.2.5 (Status: unaffected)
- 8.1.9 (Status: unaffected)
### References
1. [](https://mattermost.com/security-updates)
### Credits
- vultza (vultza) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4599, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4599
- **State**: PUBLISHED
- **Published Date**: June 21, 2012 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 00:09 UTC
- **Reserved Date**: November 29, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Stack-based buffer overflow in the _canonicalize function in common/uloc.c in International Components for Unicode (ICU) before 49.1 allows remote attackers to execute arbitrary code via a crafted locale ID that is not properly handled during variant canonicalization.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [51006](http://www.securityfocus.com/bid/51006)
2. [47674](http://secunia.com/advisories/47674)
3. [47146](http://secunia.com/advisories/47146)
4. [47775](http://secunia.com/advisories/47775)
5. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html)
6. [](http://support.apple.com/kb/HT5503)
7. [icu-canonicalize-bo(71726)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71726)
8. [[oss-security] 20111209 Re: CVE Request: icu out of bounds access](http://www.openwall.com/lists/oss-security/2011/12/09/5)
9. [](http://code.google.com/p/chromium/issues/detail?id=106441)
10. [77698](http://www.osvdb.org/77698)
11. [](http://bugs.icu-project.org/trac/ticket/8984)
12. [USN-1348-1](http://ubuntu.com/usn/usn-1348-1)
13. [47227](http://secunia.com/advisories/47227)
14. [MDVSA-2011:194](http://www.mandriva.com/security/advisories?name=MDVSA-2011:194)
15. [openSUSE-SU-2012:0100](http://lists.opensuse.org/opensuse-updates/2012-01/msg00035.html)
16. [APPLE-SA-2012-09-19-2](http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html)
17. [](http://support.apple.com/kb/HT5501)
18. [[oss-security] 20111209 CVE Request: icu out of bounds access](http://www.openwall.com/lists/oss-security/2011/12/09/2)
19. [RHSA-2011:1815](http://rhn.redhat.com/errata/RHSA-2011-1815.html)
20. [DSA-2397](http://www.debian.org/security/2012/dsa-2397)
21. [47714](http://secunia.com/advisories/47714) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1261, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1261 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1261
- **State**: PUBLISHED
- **Published Date**: June 16, 2011 at 20:21 UTC
- **Last Updated**: August 06, 2024 at 22:21 UTC
- **Reserved Date**: March 04, 2011 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Selection Object Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS11-050](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-050)
2. [oval:org.mitre.oval:def:12755](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12755) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4301, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4301 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4301
- **State**: PUBLISHED
- **Published Date**: November 26, 2010 at 18:23 UTC
- **Last Updated**: August 07, 2024 at 03:43 UTC
- **Reserved Date**: November 22, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
epan/dissectors/packet-zbee-zcl.c in the ZigBee ZCL dissector in Wireshark 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted ZCL packet, related to Discover Attributes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SR:2011:001](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html)
2. [43068](http://secunia.com/advisories/43068)
3. [44986](http://www.securityfocus.com/bid/44986)
4. [42290](http://secunia.com/advisories/42290)
5. [oval:org.mitre.oval:def:14713](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14713)
6. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212)
7. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5303)
8. [](https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5315&action=edit)
9. [69355](http://osvdb.org/69355)
10. [42877](http://secunia.com/advisories/42877)
11. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html)
12. [](http://www.wireshark.org/security/wnpa-sec-2010-14.html)
13. [ADV-2011-0076](http://www.vupen.com/english/advisories/2011/0076)
14. [ADV-2010-3038](http://www.vupen.com/english/advisories/2010/3038)
15. [15973](http://www.exploit-db.com/exploits/15973) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41167
- **State**: PUBLISHED
- **Published Date**: October 11, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 12:35 UTC
- **Reserved Date**: September 21, 2022 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Due to lack of proper memory management, when a victim opens a manipulated AutoCAD (.dwg, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
- CWE-787: Out-of-bounds Write
### Affected Products
**SAP SE - SAP 3D Visual Enterprise Author**
Affected versions:
- 9 (Status: affected)
### References
1. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
2. [](https://launchpad.support.sap.com/#/notes/3245929) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45926
- **State**: REJECTED
- **Last Updated**: January 30, 2024 at 05:46 UTC
- **Reserved Date**: October 16, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1997
- **State**: PUBLISHED
- **Published Date**: June 06, 2022 at 10:10 UTC
- **Last Updated**: August 03, 2024 at 00:24 UTC
- **Reserved Date**: June 06, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 9.0.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**francoisjacquet - francoisjacquet/rosariosis**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/28861ae9-7b09-45b7-a003-eccf903db71d)
2. [](https://github.com/francoisjacquet/rosariosis/commit/6b22c0b5b40fad891c8cf9e7eeff3e42a35c0bf8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8337, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8337
- **State**: PUBLISHED
- **Published Date**: September 13, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 06:54 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A security feature bypass vulnerability exists when Windows Subsystem for Linux improperly handles case sensitivity, aka "Windows Subsystem for Linux Security Feature Bypass Vulnerability." This affects Windows 10, Windows 10 Servers.
### Affected Products
**Microsoft - Windows 10**
Affected versions:
- Version 1709 for 32-bit Systems (Status: affected)
- Version 1709 for x64-based Systems (Status: affected)
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1709 (Server Core Installation) (Status: affected)
### References
1. [105250](http://www.securityfocus.com/bid/105250)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8337) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8646
- **State**: PUBLISHED
- **Published Date**: September 11, 2024 at 13:26 UTC
- **Last Updated**: September 11, 2024 at 13:40 UTC
- **Reserved Date**: September 10, 2024 at 08:33 UTC
- **Assigned By**: eclipse
### Vulnerability Description
In Eclipse Glassfish versions prior to 7.0.10, a URL redirection vulnerability to untrusted sites existed.
This vulnerability is caused by the vulnerability (CVE-2023-41080) in the Apache code included in GlassFish.
This vulnerability only affects applications that are explicitly deployed to the root context ('/').
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**Eclipse Foundation - Eclipse Glassfish**
Affected versions:
- 5.1.0 (Status: affected)
### References
1. [](https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/163)
2. [](https://gitlab.eclipse.org/security/cve-assignement/-/issues/34)
3. [](https://github.com/eclipse-ee4j/glassfish/pull/24655)
4. [](https://glassfish.org/download) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20125, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20125
- **State**: PUBLISHED
- **Published Date**: November 15, 2024 at 14:58 UTC
- **Last Updated**: November 26, 2024 at 14:38 UTC
- **Reserved Date**: October 27, 2022 at 18:47 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the local interface of Cisco BroadWorks Network Server could allow an unauthenticated, remote attacker to exhaust system resources, causing a denial of service (DoS) condition.
This vulnerability exists because rate limiting does not occur for certain incoming TCP connections. An attacker could exploit this vulnerability by sending a high rate of TCP connections to the server. A successful exploit could allow the attacker to cause TCP connection resources to grow rapidly until the Cisco BroadWorks Network Server becomes unusable.
Note: To recover from this vulnerability, either Cisco BroadWorks Network Server software must be restarted or the Cisco BroadWorks Network Server node must be rebooted. For more information, see the section of this advisory.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Affected Products
**Cisco - Cisco BroadWorks**
Affected versions:
- 22.0 (Status: affected)
- 23.0 (Status: affected)
- RI.2021.02 (Status: affected)
- 23.0 ap380391 (Status: affected)
- 23.0 ap380396 (Status: affected)
- RI.2021.08 (Status: affected)
- RI.2021.09 (Status: affected)
- RI.2021.10 (Status: affected)
- RI.2021.11 (Status: affected)
- RI.2021.12 (Status: affected)
- 23.0 ap382281 (Status: affected)
- 22.0 ap382358 (Status: affected)
- 23.0 ap382358 (Status: affected)
- RI.2022.02 (Status: affected)
- RI.2022.03 (Status: affected)
- 23.0 ap373151 (Status: affected)
- 23.0 ap371527 (Status: affected)
- 22.0 ap353530 (Status: affected)
- 22.0 ap348633 (Status: affected)
- 22.0 ap347741 (Status: affected)
- 22.0 ap352375 (Status: affected)
- 22.0 ap353911 (Status: affected)
- 22.0 ap339206 (Status: affected)
- 22.0 ap351637 (Status: affected)
- 22.0 ap351160 (Status: affected)
- 22.0 ap339395 (Status: affected)
- 23.0 ap372548 (Status: affected)
- 23.0 ap373098 (Status: affected)
- 22.0 ap358889 (Status: affected)
- 22.0 ap359119 (Status: affected)
- 22.0 ap357087 (Status: affected)
- 22.0 ap357506 (Status: affected)
- 22.0 ap361590 (Status: affected)
- 22.0 ap356317 (Status: affected)
- 22.0 ap358076 (Status: affected)
- 22.0 ap355095 (Status: affected)
- 22.0 ap352969 (Status: affected)
- 22.0 ap356705 (Status: affected)
- 23.0 ap375383 (Status: affected)
- 23.0 ap375465 (Status: affected)
- 23.0 ap375435 (Status: affected)
- 22.0 ap375601 (Status: affected)
- 22.0 ap375345 (Status: affected)
- 22.0 ap349872 (Status: affected)
- 22.0 ap381419 (Status: affected)
- 23.0 ap380771 (Status: affected)
- 22.0 ap367805 (Status: affected)
- 22.0 ap365223 (Status: affected)
- 22.0 ap368419 (Status: affected)
- 22.0 ap360116 (Status: affected)
- 22.0 ap366298 (Status: affected)
- 22.0 ap368125 (Status: affected)
- 22.0 ap364925 (Status: affected)
- 22.0 ap368497 (Status: affected)
- 22.0 ap364168 (Status: affected)
- 22.0 ap367732 (Status: affected)
- 23.0 ap380041 (Status: affected)
- 22.0 ap382183 (Status: affected)
- 22.0 ap382057 (Status: affected)
- 23.0 ap381271 (Status: affected)
- 23.0 ap381243 (Status: affected)
- 23.0 ap380691 (Status: affected)
- 23.0 ap375345 (Status: affected)
- 23.0 ap375601 (Status: affected)
- 22.0 ap377577 (Status: affected)
- 23.0 ap379795 (Status: affected)
- 23.0 ap382195 (Status: affected)
- 23.0 ap376661 (Status: affected)
- RI.2022.06 (Status: affected)
- RI.2022.05 (Status: affected)
- RI.2022.04 (Status: affected)
- 23.0 ap376010 (Status: affected)
- 23.0 ap382487 (Status: affected)
- 23.0 ap383569 (Status: affected)
- 23.0 ap383519 (Status: affected)
- 23.0 ap383560 (Status: affected)
- 22.0 ap383754 (Status: affected)
- 23.0 ap383710 (Status: affected)
- RI.2022.08 (Status: affected)
- 22.0 ap366290 (Status: affected)
- 22.0 ap372504 (Status: affected)
- 22.0 ap366807 (Status: affected)
- 22.0 ap373151 (Status: affected)
- 22.0 ap366181 (Status: affected)
- 22.0 ap366207 (Status: affected)
- 22.0 ap371527 (Status: affected)
- 23.0 ap367434 (Status: affected)
- 22.0 ap365170 (Status: affected)
- 22.0 ap372620 (Status: affected)
- 22.0 ap354474 (Status: affected)
- 22.0 ap372243 (Status: affected)
- 22.0 ap366268 (Status: affected)
- 22.0 ap366373 (Status: affected)
- 22.0 ap379780 (Status: affected)
- 23.0 ap351263 (Status: affected)
- 22.0 ap364384 (Status: affected)
- 22.0 ap365775 (Status: affected)
- 22.0 ap361308 (Status: affected)
- 22.0 ap351263 (Status: affected)
- 22.0 ap364369 (Status: affected)
- 22.0 ap364879 (Status: affected)
- 22.0 ap365341 (Status: affected)
- 22.0 ap360568 (Status: affected)
- 22.0 ap366916 (Status: affected)
- 22.0 ap363363 (Status: affected)
- 22.0 ap363366 (Status: affected)
- 22.0 ap374507 (Status: affected)
- 22.0 ap374557 (Status: affected)
- 22.0 ap375533 (Status: affected)
- 22.0 ap373283 (Status: affected)
- 22.0 ap372845 (Status: affected)
- 22.0 ap373684 (Status: affected)
- 22.0 ap373817 (Status: affected)
- 22.0 ap367794 (Status: affected)
- 22.0 ap369778 (Status: affected)
- 22.0 ap368180 (Status: affected)
- 22.0 ap369774 (Status: affected)
- 22.0 ap366898 (Status: affected)
- 22.0 ap366882 (Status: affected)
- 22.0 ap359646 (Status: affected)
- 22.0 ap353184 (Status: affected)
- 22.0 ap358871 (Status: affected)
- 22.0 ap348431 (Status: affected)
- 22.0 ap358861 (Status: affected)
- 22.0 ap348100 (Status: affected)
- 22.0 ap359283 (Status: affected)
- 22.0 ap356817 (Status: affected)
- 22.0 ap356375 (Status: affected)
- 22.0 ap373015 (Status: affected)
- 22.0 ap374946 (Status: affected)
- 22.0 ap374269 (Status: affected)
- 22.0 ap373434 (Status: affected)
- 22.0 ap373003 (Status: affected)
- 22.0 ap372234 (Status: affected)
- 22.0 ap365239 (Status: affected)
- 22.0 ap369286 (Status: affected)
- 22.0 ap367782 (Status: affected)
- 22.0 ap359991 (Status: affected)
- 22.0 ap359729 (Status: affected)
- 22.0 ap358357 (Status: affected)
- 22.0 ap360306 (Status: affected)
- 22.0 ap359433 (Status: affected)
- 22.0 ap359972 (Status: affected)
- 22.0 ap365889 (Status: affected)
- 22.0 ap369931 (Status: affected)
- 22.0 ap353426 (Status: affected)
- 22.0 ap360244 (Status: affected)
- 22.0 ap360966 (Status: affected)
- 22.0 ap367874 (Status: affected)
- 22.0 ap376710 (Status: affected)
- 22.0 ap377079 (Status: affected)
- 22.0 ap356186 (Status: affected)
- 23.0 ap377147 (Status: affected)
- 22.0 ap380691 (Status: affected)
- 22.0 ap361695 (Status: affected)
- 23.0 ap383943 (Status: affected)
- 23.0 ap383955 (Status: affected)
- RI.2022.09 (Status: affected)
- 23.0 ap383838 (Status: affected)
- 23.0 ap384023 (Status: affected)
- 23.0 ap384025 (Status: affected)
- 23.0 ap383797 (Status: affected)
- 22.0 ap383797 (Status: affected)
- 23.0 ap384127 (Status: affected)
- 23.0 ap384015 (Status: affected)
- RI.2022.10 (Status: affected)
- 22.0 ap384211 (Status: affected)
- 23.0 ap384211 (Status: affected)
- 23.0 ap383717 (Status: affected)
- 23.0 ap384185 (Status: affected)
- 23.0 ap384173 (Status: affected)
- 23.0 ap383815 (Status: affected)
- 23.0 ap384245 (Status: affected)
- 22.0 ap383514 (Status: affected)
- 22.0 ap360201 (Status: affected)
- 22.0 ap353676 (Status: affected)
- 23.0 ap377120 (Status: affected)
- 22.0 ap374339 (Status: affected)
- 22.0 ap355070 (Status: affected)
- 22.0 ap374330 (Status: affected)
- 22.0 ap375089 (Status: affected)
- 23.0 ap368445 (Status: affected)
- 23.0 ap372994 (Status: affected)
- 23.0 ap369219 (Status: affected)
- 23.0 ap369693 (Status: affected)
- 22.0 ap369219 (Status: affected)
- 23.0 ap381725 (Status: affected)
- 22.0 ap370636 (Status: affected)
- 23.0 ap376521 (Status: affected)
- 22.0 ap371262 (Status: affected)
- 22.0 ap382434 (Status: affected)
- 22.0 ap355027 (Status: affected)
- 23.0 ap379049 (Status: affected)
- 22.0 ap361054 (Status: affected)
- 22.0 ap369738 (Status: affected)
- 23.0 ap375634 (Status: affected)
- 22.0 ap369433 (Status: affected)
- 22.0 ap377680 (Status: affected)
- 22.0 ap357047 (Status: affected)
- 22.0 ap377727 (Status: affected)
- 22.0 ap377147 (Status: affected)
- 22.0 ap377908 (Status: affected)
- 23.0 ap367874 (Status: affected)
- 22.0 ap366375 (Status: affected)
- 22.0 ap379847 (Status: affected)
- 22.0 ap358059 (Status: affected)
- 23.0 ap373924 (Status: affected)
- 23.0 ap383597 (Status: affected)
- 22.0 ap365727 (Status: affected)
- 22.0 ap374530 (Status: affected)
- 22.0 ap360912 (Status: affected)
- 23.0 ap373018 (Status: affected)
- 22.0 ap378509 (Status: affected)
- 23.0 ap376485 (Status: affected)
- 22.0 ap371043 (Status: affected)
- 22.0 ap378603 (Status: affected)
- 22.0 ap372657 (Status: affected)
- 22.0 ap363846 (Status: affected)
- 22.0 ap376041 (Status: affected)
- 22.0 ap372488 (Status: affected)
- 22.0 ap359145 (Status: affected)
- 23.0 ap368461 (Status: affected)
- 22.0 ap378966 (Status: affected)
- 23.0 ap376602 (Status: affected)
- 22.0 ap356603 (Status: affected)
- 23.0 ap373257 (Status: affected)
- 23.0 ap376668 (Status: affected)
- 22.0 ap381810 (Status: affected)
- 23.0 ap375533 (Status: affected)
- 22.0 ap364278 (Status: affected)
- 23.0 ap380817 (Status: affected)
- 23.0 ap374295 (Status: affected)
- 22.0 ap381725 (Status: affected)
- 23.0 ap380537 (Status: affected)
- 22.0 ap377398 (Status: affected)
- 22.0 ap370817 (Status: affected)
- 22.0 ap374818 (Status: affected)
- 23.0 ap380042 (Status: affected)
- 23.0 ap374475 (Status: affected)
- 22.0 ap373644 (Status: affected)
- 22.0 ap366330 (Status: affected)
- 22.0 ap361696 (Status: affected)
- 23.0 ap377755 (Status: affected)
- 22.0 ap373813 (Status: affected)
- 22.0 ap375343 (Status: affected)
- 22.0 ap379374 (Status: affected)
- 23.0 ap374031 (Status: affected)
- 22.0 ap377900 (Status: affected)
- 22.0 ap360931 (Status: affected)
- 22.0 ap362831 (Status: affected)
- 22.0 ap367461 (Status: affected)
- 22.0 ap354764 (Status: affected)
- 22.0 ap352325 (Status: affected)
- 23.0 ap372091 (Status: affected)
- 23.0 ap370911 (Status: affected)
- 22.0 ap363770 (Status: affected)
- 22.0 ap379487 (Status: affected)
- 23.0 ap380180 (Status: affected)
- 23.0 ap367969 (Status: affected)
- 23.0 ap380697 (Status: affected)
- 22.0 ap363372 (Status: affected)
- 22.0 ap353490 (Status: affected)
- 23.0 ap373271 (Status: affected)
- 22.0 ap356848 (Status: affected)
- 22.0 ap373918 (Status: affected)
- 22.0 ap382158 (Status: affected)
- 22.0 ap364598 (Status: affected)
- 23.0 ap381584 (Status: affected)
- 23.0 ap379888 (Status: affected)
- 22.0 ap356512 (Status: affected)
- 22.0 ap379098 (Status: affected)
- 22.0 ap376620 (Status: affected)
- 23.0 ap367998 (Status: affected)
- 23.0 ap366348 (Status: affected)
- 22.0 ap376614 (Status: affected)
- 23.0 ap382824 (Status: affected)
- 23.0 ap376984 (Status: affected)
- 23.0 ap366677 (Status: affected)
- 23.0 ap381523 (Status: affected)
- 22.0 ap383569 (Status: affected)
- 22.0 ap382524 (Status: affected)
- 22.0 ap379016 (Status: affected)
- 22.0 ap363584 (Status: affected)
- 22.0 ap358399 (Status: affected)
- 22.0 ap383335 (Status: affected)
- 23.0 ap374145 (Status: affected)
- 22.0 ap374295 (Status: affected)
- 23.0 ap376509 (Status: affected)
- 22.0 ap354785 (Status: affected)
- 23.0 ap381091 (Status: affected)
- 23.0 ap380512 (Status: affected)
- 22.0 ap355286 (Status: affected)
- 22.0 ap368887 (Status: affected)
- 22.0 ap383560 (Status: affected)
- 23.0 ap382977 (Status: affected)
- 23.0 ap368180 (Status: affected)
- 22.0 ap352516 (Status: affected)
- 22.0 ap350176 (Status: affected)
- 23.0 ap366373 (Status: affected)
- 23.0 ap375038 (Status: affected)
- 23.0 ap373102 (Status: affected)
- 23.0 ap378965 (Status: affected)
- 23.0 ap378080 (Status: affected)
- 22.0 ap377566 (Status: affected)
- 22.0 ap359589 (Status: affected)
- 23.0 ap380167 (Status: affected)
- 22.0 ap372338 (Status: affected)
- 22.0 ap361445 (Status: affected)
- 22.0 ap354784 (Status: affected)
- 22.0 ap356706 (Status: affected)
- 22.0 ap378140 (Status: affected)
- 23.0 ap378585 (Status: affected)
- 22.0 ap356458 (Status: affected)
- 22.0 ap368216 (Status: affected)
- 22.0 ap367675 (Status: affected)
- 22.0 ap368978 (Status: affected)
- 23.0 ap374330 (Status: affected)
- 22.0 ap355775 (Status: affected)
- 23.0 ap372338 (Status: affected)
- 22.0 ap380629 (Status: affected)
- 23.0 ap376087 (Status: affected)
- 22.0 ap367207 (Status: affected)
- 22.0 ap366346 (Status: affected)
- 22.0 ap376356 (Status: affected)
- 22.0 ap375383 (Status: affected)
- 22.0 ap373336 (Status: affected)
- 23.0 ap378863 (Status: affected)
- 22.0 ap352178 (Status: affected)
- 23.0 ap363366 (Status: affected)
- 22.0 ap351973 (Status: affected)
- 22.0 ap366261 (Status: affected)
- 22.0 ap354027 (Status: affected)
- 23.0 ap368706 (Status: affected)
- 22.0 ap364781 (Status: affected)
- 23.0 ap362771 (Status: affected)
- 23.0 ap360317 (Status: affected)
- 22.0 ap380282 (Status: affected)
- 22.0 ap356434 (Status: affected)
- 23.0 ap380239 (Status: affected)
- 22.0 ap365730 (Status: affected)
- 23.0 ap381270 (Status: affected)
- 22.0 ap355825 (Status: affected)
- 22.0 ap361974 (Status: affected)
- 22.0 ap371155 (Status: affected)
- 22.0 ap377757 (Status: affected)
- 22.0 ap361598 (Status: affected)
- 22.0 ap383168 (Status: affected)
- 23.0 ap377908 (Status: affected)
- 22.0 ap370103 (Status: affected)
- 22.0 ap381091 (Status: affected)
- 23.0 ap382945 (Status: affected)
- 23.0 ap377779 (Status: affected)
- 22.0 ap346307 (Status: affected)
- 23.0 ap365239 (Status: affected)
- 22.0 ap371313 (Status: affected)
- 23.0 ap371771 (Status: affected)
- 23.0 ap373452 (Status: affected)
- 23.0 ap375865 (Status: affected)
- 22.0 ap374714 (Status: affected)
- 22.0 ap376179 (Status: affected)
- 22.0 ap362001 (Status: affected)
- 22.0 ap378426 (Status: affected)
- 23.0 ap369748 (Status: affected)
- 23.0 ap383002 (Status: affected)
- 22.0 ap371030 (Status: affected)
- 22.0 ap370459 (Status: affected)
- 23.0 ap372708 (Status: affected)
- 22.0 ap382488 (Status: affected)
- 22.0 ap368326 (Status: affected)
- 23.0 ap370465 (Status: affected)
- 22.0 ap355000 (Status: affected)
- 22.0 ap355922 (Status: affected)
- 23.0 ap369454 (Status: affected)
- 22.0 ap364922 (Status: affected)
- 22.0 ap365167 (Status: affected)
- 22.0 ap374475 (Status: affected)
- 23.0 ap367675 (Status: affected)
- 22.0 ap379874 (Status: affected)
- 22.0 ap366677 (Status: affected)
- 22.0 ap366972 (Status: affected)
- 22.0 ap372100 (Status: affected)
- 23.0 ap373434 (Status: affected)
- 22.0 ap356164 (Status: affected)
- 23.0 ap372757 (Status: affected)
- 22.0 ap376531 (Status: affected)
- 23.0 ap377412 (Status: affected)
- 22.0 ap365232 (Status: affected)
- 22.0 ap348945 (Status: affected)
- 22.0 ap352703 (Status: affected)
- 22.0 ap364670 (Status: affected)
- 23.0 ap370103 (Status: affected)
- 23.0 ap370884 (Status: affected)
- 23.0 ap366261 (Status: affected)
- 22.0 ap367969 (Status: affected)
- 23.0 ap378865 (Status: affected)
- 22.0 ap371436 (Status: affected)
- 22.0 ap375685 (Status: affected)
- 23.0 ap380161 (Status: affected)
- 22.0 ap366490 (Status: affected)
- 23.0 ap380737 (Status: affected)
- 23.0 ap370952 (Status: affected)
- 22.0 ap374895 (Status: affected)
- 22.0 ap366656 (Status: affected)
- 22.0 ap379548 (Status: affected)
- 23.0 ap378471 (Status: affected)
- 23.0 ap379780 (Status: affected)
- 22.0 ap378865 (Status: affected)
- 22.0 ap354964 (Status: affected)
- 22.0 ap371656 (Status: affected)
- 22.0 ap381594 (Status: affected)
- 23.0 ap381118 (Status: affected)
- 22.0 ap368087 (Status: affected)
- 22.0 ap363234 (Status: affected)
- 22.0 ap362713 (Status: affected)
- 23.0 ap372163 (Status: affected)
- 23.0 ap379833 (Status: affected)
- 22.0 ap377494 (Status: affected)
- 23.0 ap367986 (Status: affected)
- 22.0 ap362610 (Status: affected)
- 22.0 ap378882 (Status: affected)
- 23.0 ap370544 (Status: affected)
- 22.0 ap379008 (Status: affected)
- 22.0 ap382945 (Status: affected)
- 22.0 ap362088 (Status: affected)
- 22.0 ap383002 (Status: affected)
- 23.0 ap370627 (Status: affected)
- 22.0 ap362150 (Status: affected)
- 22.0 ap371295 (Status: affected)
- 22.0 ap350179 (Status: affected)
- 22.0 ap371467 (Status: affected)
- 23.0 ap369150 (Status: affected)
- 22.0 ap365449 (Status: affected)
- 23.0 ap375264 (Status: affected)
- 23.0 ap379694 (Status: affected)
- 22.0 ap381609 (Status: affected)
- 22.0 ap353915 (Status: affected)
- 22.0 ap358234 (Status: affected)
- 22.0 ap363146 (Status: affected)
- 22.0 ap369934 (Status: affected)
- 23.0 ap366184 (Status: affected)
- 22.0 ap371516 (Status: affected)
- 22.0 ap365800 (Status: affected)
- 22.0 ap356960 (Status: affected)
- 22.0 ap343927 (Status: affected)
- 22.0 ap361999 (Status: affected)
- 22.0 ap373954 (Status: affected)
- 23.0 ap379852 (Status: affected)
- 22.0 ap375655 (Status: affected)
- 23.0 ap382857 (Status: affected)
- 22.0 ap380396 (Status: affected)
- 22.0 ap381569 (Status: affected)
- 22.0 ap369693 (Status: affected)
- 22.0 ap358971 (Status: affected)
- 23.0 ap366290 (Status: affected)
- 22.0 ap378258 (Status: affected)
- 22.0 ap380818 (Status: affected)
- 22.0 ap359227 (Status: affected)
- 22.0 ap358578 (Status: affected)
- 23.0 ap371050 (Status: affected)
- 23.0 ap383247 (Status: affected)
- 22.0 ap354413 (Status: affected)
- 22.0 ap382053 (Status: affected)
- 23.0 ap367513 (Status: affected)
- 22.0 ap374803 (Status: affected)
- 23.0 ap383536 (Status: affected)
- 22.0 ap360600 (Status: affected)
- 22.0 ap373046 (Status: affected)
- 23.0 ap372641 (Status: affected)
- 22.0 ap379396 (Status: affected)
- 22.0 ap377307 (Status: affected)
- 23.0 ap379438 (Status: affected)
- 23.0 ap379397 (Status: affected)
- 22.0 ap365372 (Status: affected)
- 22.0 ap364158 (Status: affected)
- 23.0 ap380751 (Status: affected)
- 22.0 ap361533 (Status: affected)
- 22.0 ap371049 (Status: affected)
- 22.0 ap352372 (Status: affected)
- 23.0 ap378258 (Status: affected)
- 23.0 ap383064 (Status: affected)
- 22.0 ap362619 (Status: affected)
- 23.0 ap379772 (Status: affected)
- 22.0 ap379934 (Status: affected)
- 23.0 ap365801 (Status: affected)
- 23.0 ap366701 (Status: affected)
- 22.0 ap381125 (Status: affected)
- 22.0 ap357471 (Status: affected)
- 22.0 ap362298 (Status: affected)
- 22.0 ap353839 (Status: affected)
- 22.0 ap383309 (Status: affected)
- 23.0 ap375133 (Status: affected)
- 22.0 ap353168 (Status: affected)
- 23.0 ap369132 (Status: affected)
- 23.0 ap371583 (Status: affected)
- 22.0 ap373564 (Status: affected)
- 23.0 ap366375 (Status: affected)
- 22.0 ap363815 (Status: affected)
- 23.0 ap365170 (Status: affected)
- 22.0 ap365400 (Status: affected)
- 22.0 ap371613 (Status: affected)
- 22.0 ap373950 (Status: affected)
- 23.0 ap352969 (Status: affected)
- 23.0 ap379046 (Status: affected)
- 22.0 ap380737 (Status: affected)
- 22.0 ap359029 (Status: affected)
- 23.0 ap367325 (Status: affected)
- 22.0 ap359765 (Status: affected)
- 23.0 ap378953 (Status: affected)
- 22.0 ap357632 (Status: affected)
- 22.0 ap361883 (Status: affected)
- 23.0 ap379191 (Status: affected)
- 22.0 ap364628 (Status: affected)
- 22.0 ap369667 (Status: affected)
- 22.0 ap352962 (Status: affected)
- 22.0 ap349384 (Status: affected)
- 22.0 ap367325 (Status: affected)
- 22.0 ap368604 (Status: affected)
- 22.0 ap370186 (Status: affected)
- 23.0 ap371030 (Status: affected)
- 23.0 ap376041 (Status: affected)
- 23.0 ap380841 (Status: affected)
- 22.0 ap372075 (Status: affected)
- 22.0 ap370138 (Status: affected)
- 22.0 ap371587 (Status: affected)
- 23.0 ap366298 (Status: affected)
- 22.0 ap380239 (Status: affected)
- 23.0 ap377566 (Status: affected)
- 22.0 ap380739 (Status: affected)
- 23.0 ap371961 (Status: affected)
- 22.0 ap367524 (Status: affected)
- 22.0 ap376416 (Status: affected)
- 22.0 ap378599 (Status: affected)
- 22.0 ap381732 (Status: affected)
- 22.0 ap354750 (Status: affected)
- 22.0 ap375060 (Status: affected)
- 23.0 ap383168 (Status: affected)
- 22.0 ap351855 (Status: affected)
- 22.0 ap382487 (Status: affected)
- 22.0 ap370801 (Status: affected)
- 23.0 ap379548 (Status: affected)
- 22.0 ap361534 (Status: affected)
- 22.0 ap352330 (Status: affected)
- 22.0 ap369132 (Status: affected)
- 22.0 ap375354 (Status: affected)
- 22.0 ap363144 (Status: affected)
- 22.0 ap361580 (Status: affected)
- 23.0 ap381348 (Status: affected)
- 22.0 ap383710 (Status: affected)
- 22.0 ap378924 (Status: affected)
- 23.0 ap363729 (Status: affected)
- 22.0 ap363430 (Status: affected)
- 22.0 ap375308 (Status: affected)
- 23.0 ap376704 (Status: affected)
- 23.0 ap374971 (Status: affected)
- 22.0 ap368510 (Status: affected)
- 23.0 ap364699 (Status: affected)
- 23.0 ap374557 (Status: affected)
- 23.0 ap372351 (Status: affected)
- 22.0 ap364651 (Status: affected)
- 22.0 ap373777 (Status: affected)
- 22.0 ap370680 (Status: affected)
- 22.0 ap380143 (Status: affected)
- 23.0 ap367396 (Status: affected)
- 22.0 ap364797 (Status: affected)
- 23.0 ap372100 (Status: affected)
- 23.0 ap367453 (Status: affected)
- 22.0 ap373664 (Status: affected)
- 22.0 ap373122 (Status: affected)
- 22.0 ap370911 (Status: affected)
- 22.0 ap354090 (Status: affected)
- 23.0 ap382039 (Status: affected)
- 22.0 ap372643 (Status: affected)
- 23.0 ap381072 (Status: affected)
- 22.0 ap358019 (Status: affected)
- 23.0 ap381410 (Status: affected)
- 22.0 ap378863 (Status: affected)
- 22.0 ap364898 (Status: affected)
- 22.0 ap353509 (Status: affected)
- 23.0 ap378153 (Status: affected)
- 23.0 ap383754 (Status: affected)
- 23.0 ap382158 (Status: affected)
- 22.0 ap374414 (Status: affected)
- 23.0 ap380936 (Status: affected)
- 22.0 ap377068 (Status: affected)
- 22.0 ap366013 (Status: affected)
- 22.0 ap357791 (Status: affected)
- 22.0 ap380167 (Status: affected)
- 22.0 ap379465 (Status: affected)
- 22.0 ap382386 (Status: affected)
- 22.0 ap369607 (Status: affected)
- 23.0 ap372845 (Status: affected)
- 22.0 ap373914 (Status: affected)
- 23.0 ap380783 (Status: affected)
- 22.0 ap378999 (Status: affected)
- 23.0 ap382386 (Status: affected)
- 23.0 ap369501 (Status: affected)
- 22.0 ap364199 (Status: affected)
- 22.0 ap370269 (Status: affected)
- 23.0 ap377496 (Status: affected)
- 23.0 ap368218 (Status: affected)
- 22.0 ap380180 (Status: affected)
- 22.0 ap372708 (Status: affected)
- 23.0 ap379934 (Status: affected)
- 23.0 ap376426 (Status: affected)
- 22.0 ap360325 (Status: affected)
- 22.0 ap363392 (Status: affected)
- 23.0 ap377523 (Status: affected)
- 22.0 ap380128 (Status: affected)
- 22.0 ap355343 (Status: affected)
- 22.0 ap381781 (Status: affected)
- 22.0 ap368695 (Status: affected)
- 23.0 ap378436 (Status: affected)
- 22.0 ap365632 (Status: affected)
- 23.0 ap382057 (Status: affected)
- 22.0 ap379524 (Status: affected)
- 23.0 ap372706 (Status: affected)
- 22.0 ap357775 (Status: affected)
- 23.0 ap364559 (Status: affected)
- 22.0 ap371583 (Status: affected)
- 23.0 ap376541 (Status: affected)
- 22.0 ap366184 (Status: affected)
- 22.0 ap363729 (Status: affected)
- 23.0 ap356141 (Status: affected)
- 22.0 ap358893 (Status: affected)
- 22.0 ap356538 (Status: affected)
- 22.0 ap356503 (Status: affected)
- 22.0 ap360904 (Status: affected)
- 22.0 ap374460 (Status: affected)
- 22.0 ap371437 (Status: affected)
- 23.0 ap370620 (Status: affected)
- 22.0 ap371050 (Status: affected)
- 22.0 ap366117 (Status: affected)
- 23.0 ap366117 (Status: affected)
- 22.0 ap375865 (Status: affected)
- 23.0 ap367340 (Status: affected)
- 23.0 ap378880 (Status: affected)
- 22.0 ap376523 (Status: affected)
- 22.0 ap380787 (Status: affected)
- 22.0 ap375509 (Status: affected)
- 22.0 ap350217 (Status: affected)
- 22.0 ap380854 (Status: affected)
- 23.0 ap376252 (Status: affected)
- 22.0 ap354180 (Status: affected)
- 22.0 ap342836 (Status: affected)
- 23.0 ap370361 (Status: affected)
- 22.0 ap363759 (Status: affected)
- 23.0 ap374506 (Status: affected)
- 23.0 ap377384 (Status: affected)
- 23.0 ap365775 (Status: affected)
- 23.0 ap373914 (Status: affected)
- 23.0 ap382192 (Status: affected)
- 23.0 ap383573 (Status: affected)
- 23.0 ap380045 (Status: affected)
- 22.0 ap366301 (Status: affected)
- 22.0 ap370615 (Status: affected)
- 22.0 ap355285 (Status: affected)
- 22.0 ap380626 (Status: affected)
- 23.0 ap380282 (Status: affected)
- 22.0 ap359911 (Status: affected)
- 22.0 ap377149 (Status: affected)
- 23.0 ap356256 (Status: affected)
- 22.0 ap358563 (Status: affected)
- 22.0 ap370177 (Status: affected)
- 23.0 ap363128 (Status: affected)
- 23.0 ap371295 (Status: affected)
- 22.0 ap355555 (Status: affected)
- 23.0 ap381961 (Status: affected)
- 22.0 ap370948 (Status: affected)
- 22.0 ap359470 (Status: affected)
- 23.0 ap373820 (Status: affected)
- 23.0 ap368419 (Status: affected)
- 22.0 ap371495 (Status: affected)
- 23.0 ap380854 (Status: affected)
- 23.0 ap378862 (Status: affected)
- 22.0 ap356390 (Status: affected)
- 22.0 ap363596 (Status: affected)
- 22.0 ap378970 (Status: affected)
- 23.0 ap378391 (Status: affected)
- 23.0 ap375343 (Status: affected)
- 23.0 ap369302 (Status: affected)
- 23.0 ap368632 (Status: affected)
- 22.0 ap366295 (Status: affected)
- 23.0 ap379847 (Status: affected)
- 23.0 ap374649 (Status: affected)
- 22.0 ap353903 (Status: affected)
- 22.0 ap371470 (Status: affected)
- 22.0 ap357859 (Status: affected)
- 22.0 ap374265 (Status: affected)
- 22.0 ap374649 (Status: affected)
- 22.0 ap350573 (Status: affected)
- 22.0 ap383519 (Status: affected)
- 22.0 ap380697 (Status: affected)
- 22.0 ap357718 (Status: affected)
- 22.0 ap367453 (Status: affected)
- 22.0 ap376429 (Status: affected)
- 22.0 ap355812 (Status: affected)
- 22.0 ap355699 (Status: affected)
- 23.0 ap349850 (Status: affected)
- 22.0 ap362378 (Status: affected)
- 22.0 ap370884 (Status: affected)
- 22.0 ap368603 (Status: affected)
- 22.0 ap370180 (Status: affected)
- 22.0 ap355905 (Status: affected)
- 23.0 ap368032 (Status: affected)
- 22.0 ap356584 (Status: affected)
- 23.0 ap364932 (Status: affected)
- 22.0 ap360228 (Status: affected)
- 23.0 ap378599 (Status: affected)
- 22.0 ap355443 (Status: affected)
- 23.0 ap370196 (Status: affected)
- 23.0 ap379012 (Status: affected)
- 23.0 ap367726 (Status: affected)
- 22.0 ap368706 (Status: affected)
- 22.0 ap381080 (Status: affected)
- 23.0 ap373817 (Status: affected)
- 23.0 ap377802 (Status: affected)
- 22.0 ap373018 (Status: affected)
- 22.0 ap376508 (Status: affected)
- 22.0 ap356330 (Status: affected)
- 22.0 ap381523 (Status: affected)
- 22.0 ap357768 (Status: affected)
- 23.0 ap375646 (Status: affected)
- 22.0 ap383367 (Status: affected)
- 22.0 ap351700 (Status: affected)
- 22.0 ap358132 (Status: affected)
- 22.0 ap374274 (Status: affected)
- 23.0 ap369434 (Status: affected)
- 22.0 ap380914 (Status: affected)
- 22.0 ap380535 (Status: affected)
- 22.0 ap355091 (Status: affected)
- 22.0 ap358345 (Status: affected)
- 23.0 ap368987 (Status: affected)
- 22.0 ap358442 (Status: affected)
- 22.0 ap362553 (Status: affected)
- 22.0 ap372354 (Status: affected)
- 23.0 ap366803 (Status: affected)
- 23.0 ap379874 (Status: affected)
- 22.0 ap355080 (Status: affected)
- 22.0 ap357395 (Status: affected)
- 23.0 ap367358 (Status: affected)
- 22.0 ap375936 (Status: affected)
- 22.0 ap372854 (Status: affected)
- 22.0 ap365659 (Status: affected)
- 22.0 ap352205 (Status: affected)
- 23.0 ap376523 (Status: affected)
- 22.0 ap359465 (Status: affected)
- 23.0 ap374414 (Status: affected)
- 22.0 ap383150 (Status: affected)
- 22.0 ap366649 (Status: affected)
- 22.0 ap369929 (Status: affected)
- 23.0 ap372016 (Status: affected)
- 22.0 ap376656 (Status: affected)
- 23.0 ap366827 (Status: affected)
- 22.0 ap370620 (Status: affected)
- 23.0 ap373303 (Status: affected)
- 23.0 ap375060 (Status: affected)
- 22.0 ap353358 (Status: affected)
- 22.0 ap360459 (Status: affected)
- 23.0 ap382709 (Status: affected)
- 23.0 ap374312 (Status: affected)
- 23.0 ap366181 (Status: affected)
- 22.0 ap369668 (Status: affected)
- 22.0 ap375924 (Status: affected)
- 23.0 ap369607 (Status: affected)
- 22.0 ap374230 (Status: affected)
- 22.0 ap378581 (Status: affected)
- 22.0 ap380841 (Status: affected)
- 23.0 ap375908 (Status: affected)
- 22.0 ap353360 (Status: affected)
- 22.0 ap362373 (Status: affected)
- 23.0 ap381548 (Status: affected)
- 22.0 ap364745 (Status: affected)
- 22.0 ap359049 (Status: affected)
- 23.0 ap367805 (Status: affected)
- 22.0 ap367291 (Status: affected)
- 22.0 ap365633 (Status: affected)
- 23.0 ap383170 (Status: affected)
- 22.0 ap383134 (Status: affected)
- 23.0 ap374946 (Status: affected)
- 23.0 ap377757 (Status: affected)
- 22.0 ap353372 (Status: affected)
- 23.0 ap379853 (Status: affected)
- 23.0 ap370817 (Status: affected)
- 22.0 ap352109 (Status: affected)
- 23.0 ap371821 (Status: affected)
- 22.0 ap378585 (Status: affected)
- 22.0 ap371911 (Status: affected)
- 22.0 ap372963 (Status: affected)
- 22.0 ap365146 (Status: affected)
- 23.0 ap378966 (Status: affected)
- 23.0 ap375069 (Status: affected)
- 22.0 ap373480 (Status: affected)
- 22.0 ap364500 (Status: affected)
- 22.0 ap361835 (Status: affected)
- 23.0 ap367678 (Status: affected)
- 22.0 ap354070 (Status: affected)
- 22.0 ap366306 (Status: affected)
- 22.0 ap353681 (Status: affected)
- 22.0 ap370828 (Status: affected)
- 22.0 ap354313 (Status: affected)
- 22.0 ap364471 (Status: affected)
- 22.0 ap379848 (Status: affected)
- 22.0 ap374428 (Status: affected)
- 22.0 ap368327 (Status: affected)
- 22.0 ap382432 (Status: affected)
- 22.0 ap360317 (Status: affected)
- 23.0 ap368327 (Status: affected)
- 22.0 ap356799 (Status: affected)
- 22.0 ap380532 (Status: affected)
- 22.0 ap377120 (Status: affected)
- 22.0 ap360740 (Status: affected)
- 22.0 ap370627 (Status: affected)
- 22.0 ap381518 (Status: affected)
- 22.0 ap382240 (Status: affected)
- 22.0 ap374995 (Status: affected)
- 23.0 ap376531 (Status: affected)
- 22.0 ap370659 (Status: affected)
- 23.0 ap365730 (Status: affected)
- 22.0 ap380099 (Status: affected)
- 23.0 ap381569 (Status: affected)
- 22.0 ap379972 (Status: affected)
- 23.0 ap375509 (Status: affected)
- 23.0 ap366747 (Status: affected)
- 22.0 ap352932 (Status: affected)
- 23.0 ap372177 (Status: affected)
- 22.0 ap365798 (Status: affected)
- 22.0 ap382192 (Status: affected)
- 22.0 ap359156 (Status: affected)
- 23.0 ap379008 (Status: affected)
- 23.0 ap369934 (Status: affected)
- 22.0 ap358995 (Status: affected)
- 23.0 ap382240 (Status: affected)
- 23.0 ap379972 (Status: affected)
- 22.0 ap359748 (Status: affected)
- 22.0 ap364621 (Status: affected)
- 23.0 ap380626 (Status: affected)
- 22.0 ap378153 (Status: affected)
- 23.0 ap373539 (Status: affected)
- 22.0 ap370696 (Status: affected)
- 23.0 ap370737 (Status: affected)
- 23.0 ap378401 (Status: affected)
- 22.0 ap376298 (Status: affected)
- 22.0 ap367109 (Status: affected)
- 23.0 ap382252 (Status: affected)
- 23.0 ap379389 (Status: affected)
- 22.0 ap357413 (Status: affected)
- 22.0 ap372371 (Status: affected)
- 22.0 ap374114 (Status: affected)
- 22.0 ap345032 (Status: affected)
- 22.0 ap355003 (Status: affected)
- 22.0 ap382095 (Status: affected)
- 22.0 ap365115 (Status: affected)
- 23.0 ap373046 (Status: affected)
- 23.0 ap367291 (Status: affected)
- 22.0 ap379772 (Status: affected)
- 23.0 ap382846 (Status: affected)
- 22.0 ap365970 (Status: affected)
- 22.0 ap363597 (Status: affected)
- 22.0 ap376286 (Status: affected)
- 22.0 ap362490 (Status: affected)
- 22.0 ap367367 (Status: affected)
- 22.0 ap372177 (Status: affected)
- 23.0 ap372246 (Status: affected)
- 22.0 ap372994 (Status: affected)
- 23.0 ap369788 (Status: affected)
- 22.0 ap377578 (Status: affected)
- 23.0 ap378425 (Status: affected)
- 22.0 ap371805 (Status: affected)
- 22.0 ap362637 (Status: affected)
- 22.0 ap368137 (Status: affected)
- 23.0 ap369863 (Status: affected)
- 22.0 ap372390 (Status: affected)
- 22.0 ap380771 (Status: affected)
- 22.0 ap368461 (Status: affected)
- 23.0 ap378545 (Status: affected)
- 23.0 ap378165 (Status: affected)
- 22.0 ap379191 (Status: affected)
- 22.0 ap364634 (Status: affected)
- 22.0 ap355916 (Status: affected)
- 22.0 ap370645 (Status: affected)
- 23.0 ap377644 (Status: affected)
- 22.0 ap377779 (Status: affected)
- 23.0 ap369926 (Status: affected)
- 23.0 ap381809 (Status: affected)
- 22.0 ap380401 (Status: affected)
- 23.0 ap375734 (Status: affected)
- 22.0 ap376661 (Status: affected)
- 22.0 ap382954 (Status: affected)
- 22.0 ap381029 (Status: affected)
- 23.0 ap361533 (Status: affected)
- 22.0 ap380117 (Status: affected)
- 22.0 ap378440 (Status: affected)
- 23.0 ap376298 (Status: affected)
- 23.0 ap364925 (Status: affected)
- 23.0 ap376671 (Status: affected)
- 22.0 ap374822 (Status: affected)
- 22.0 ap366221 (Status: affected)
- 22.0 ap370275 (Status: affected)
- 23.0 ap374230 (Status: affected)
- 23.0 ap380535 (Status: affected)
- 22.0 ap373098 (Status: affected)
- 23.0 ap373664 (Status: affected)
- 23.0 ap368153 (Status: affected)
- 22.0 ap354354 (Status: affected)
- 23.0 ap372380 (Status: affected)
- 23.0 ap366916 (Status: affected)
- 22.0 ap381410 (Status: affected)
- 23.0 ap382435 (Status: affected)
- 22.0 ap380486 (Status: affected)
- 22.0 ap361854 (Status: affected)
- 22.0 ap352928 (Status: affected)
- 22.0 ap382977 (Status: affected)
- 23.0 ap367207 (Status: affected)
- 23.0 ap367524 (Status: affected)
- 22.0 ap370389 (Status: affected)
- 23.0 ap368913 (Status: affected)
- 22.0 ap363332 (Status: affected)
- 23.0 ap374507 (Status: affected)
- 22.0 ap380936 (Status: affected)
- 23.0 ap369922 (Status: affected)
- 22.0 ap367338 (Status: affected)
- 22.0 ap377109 (Status: affected)
- 22.0 ap350405 (Status: affected)
- 23.0 ap376429 (Status: affected)
- 23.0 ap365223 (Status: affected)
- 22.0 ap365662 (Status: affected)
- 22.0 ap354927 (Status: affected)
- 23.0 ap373564 (Status: affected)
- 22.0 ap377802 (Status: affected)
- 22.0 ap360817 (Status: affected)
- 22.0 ap364256 (Status: affected)
- 23.0 ap371836 (Status: affected)
- 22.0 ap355365 (Status: affected)
- 22.0 ap368026 (Status: affected)
- 22.0 ap372956 (Status: affected)
- 22.0 ap381723 (Status: affected)
- 23.0 ap373336 (Status: affected)
- 22.0 ap370160 (Status: affected)
- 23.0 ap377329 (Status: affected)
- 22.0 ap372043 (Status: affected)
- 23.0 ap366972 (Status: affected)
- 22.0 ap358454 (Status: affected)
- 23.0 ap380998 (Status: affected)
- 22.0 ap376181 (Status: affected)
- 22.0 ap376685 (Status: affected)
- 23.0 ap374254 (Status: affected)
- 23.0 ap368087 (Status: affected)
- 22.0 ap375091 (Status: affected)
- 22.0 ap368660 (Status: affected)
- 23.0 ap366294 (Status: affected)
- 22.0 ap352493 (Status: affected)
- 22.0 ap380751 (Status: affected)
- 22.0 ap358582 (Status: affected)
- 23.0 ap378882 (Status: affected)
- 23.0 ap375036 (Status: affected)
- 22.0 ap363845 (Status: affected)
- 22.0 ap378400 (Status: affected)
- 22.0 ap362163 (Status: affected)
- 22.0 ap366646 (Status: affected)
- 22.0 ap352795 (Status: affected)
- 22.0 ap361456 (Status: affected)
- 23.0 ap378332 (Status: affected)
- 22.0 ap356978 (Status: affected)
- 22.0 ap367513 (Status: affected)
- 22.0 ap365920 (Status: affected)
- 23.0 ap371049 (Status: affected)
- 23.0 ap374356 (Status: affected)
- 22.0 ap372152 (Status: affected)
- 22.0 ap378405 (Status: affected)
- 22.0 ap369571 (Status: affected)
- 22.0 ap373257 (Status: affected)
- 23.0 ap366486 (Status: affected)
- 23.0 ap374895 (Status: affected)
- 23.0 ap382053 (Status: affected)
- 23.0 ap376179 (Status: affected)
- 23.0 ap366731 (Status: affected)
- 22.0 ap374356 (Status: affected)
- 23.0 ap372674 (Status: affected)
- 22.0 ap357083 (Status: affected)
- 22.0 ap365556 (Status: affected)
- 22.0 ap358887 (Status: affected)
- 23.0 ap371033 (Status: affected)
- 22.0 ap372024 (Status: affected)
- 22.0 ap381809 (Status: affected)
- 22.0 ap352383 (Status: affected)
- 22.0 ap368754 (Status: affected)
- 23.0 ap382412 (Status: affected)
- 22.0 ap365125 (Status: affected)
- 22.0 ap375465 (Status: affected)
- 23.0 ap372243 (Status: affected)
- 22.0 ap371871 (Status: affected)
- 23.0 ap345032 (Status: affected)
- 23.0 ap377109 (Status: affected)
- 22.0 ap360586 (Status: affected)
- 22.0 ap352728 (Status: affected)
- 22.0 ap357400 (Status: affected)
- 22.0 ap373102 (Status: affected)
- 22.0 ap376630 (Status: affected)
- 22.0 ap371966 (Status: affected)
- 22.0 ap354448 (Status: affected)
- 22.0 ap375634 (Status: affected)
- 23.0 ap376410 (Status: affected)
- 23.0 ap366170 (Status: affected)
- 22.0 ap377523 (Status: affected)
- 22.0 ap368015 (Status: affected)
- 22.0 ap359103 (Status: affected)
- 23.0 ap376218 (Status: affected)
- 23.0 ap375291 (Status: affected)
- 23.0 ap374956 (Status: affected)
- 23.0 ap366211 (Status: affected)
- 22.0 ap376485 (Status: affected)
- 22.0 ap380528 (Status: affected)
- 23.0 ap372974 (Status: affected)
- 23.0 ap369929 (Status: affected)
- 23.0 ap369738 (Status: affected)
- 23.0 ap374995 (Status: affected)
- 22.0 ap357161 (Status: affected)
- 22.0 ap362771 (Status: affected)
- 22.0 ap372690 (Status: affected)
- 22.0 ap375038 (Status: affected)
- 23.0 ap368695 (Status: affected)
- 22.0 ap359112 (Status: affected)
- 23.0 ap359103 (Status: affected)
- 22.0 ap379853 (Status: affected)
- 23.0 ap375688 (Status: affected)
- 22.0 ap365815 (Status: affected)
- 23.0 ap378924 (Status: affected)
- 22.0 ap348078 (Status: affected)
- 22.0 ap371999 (Status: affected)
- 23.0 ap373644 (Status: affected)
- 22.0 ap354557 (Status: affected)
- 22.0 ap366118 (Status: affected)
- 22.0 ap367434 (Status: affected)
- 22.0 ap352402 (Status: affected)
- 23.0 ap375254 (Status: affected)
- 23.0 ap368216 (Status: affected)
- 22.0 ap372757 (Status: affected)
- 22.0 ap380817 (Status: affected)
- 23.0 ap363392 (Status: affected)
- 22.0 ap376010 (Status: affected)
- 22.0 ap373722 (Status: affected)
- 22.0 ap368422 (Status: affected)
- 23.0 ap366330 (Status: affected)
- 23.0 ap354354 (Status: affected)
- 23.0 ap351530 (Status: affected)
- 23.0 ap378134 (Status: affected)
- 23.0 ap381732 (Status: affected)
- 23.0 ap383706 (Status: affected)
- 22.0 ap381072 (Status: affected)
- 22.0 ap356474 (Status: affected)
- 23.0 ap374530 (Status: affected)
- 22.0 ap375734 (Status: affected)
- 22.0 ap361833 (Status: affected)
- 22.0 ap363867 (Status: affected)
- 22.0 ap358092 (Status: affected)
- 22.0 ap374145 (Status: affected)
- 22.0 ap362247 (Status: affected)
- 22.0 ap374838 (Status: affected)
- 22.0 ap373622 (Status: affected)
- 22.0 ap375435 (Status: affected)
- 22.0 ap353499 (Status: affected)
- 23.0 ap376670 (Status: affected)
- 23.0 ap371760 (Status: affected)
- 23.0 ap376656 (Status: affected)
- 22.0 ap371895 (Status: affected)
- 23.0 ap369106 (Status: affected)
- 23.0 ap370926 (Status: affected)
- 22.0 ap382412 (Status: affected)
- 23.0 ap381367 (Status: affected)
- 22.0 ap382195 (Status: affected)
- 22.0 ap373899 (Status: affected)
- 22.0 ap353549 (Status: affected)
- 22.0 ap377755 (Status: affected)
- 22.0 ap360362 (Status: affected)
- 23.0 ap380739 (Status: affected)
- 22.0 ap356000 (Status: affected)
- 22.0 ap370217 (Status: affected)
- 23.0 ap381526 (Status: affected)
- 23.0 ap379531 (Status: affected)
- 22.0 ap370952 (Status: affected)
- 23.0 ap378400 (Status: affected)
- 22.0 ap369106 (Status: affected)
- 22.0 ap378401 (Status: affected)
- 22.0 ap369724 (Status: affected)
- 22.0 ap367396 (Status: affected)
- 23.0 ap376736 (Status: affected)
- 22.0 ap377107 (Status: affected)
- 22.0 ap358493 (Status: affected)
- 22.0 ap363705 (Status: affected)
- 23.0 ap375936 (Status: affected)
- 22.0 ap352766 (Status: affected)
- 22.0 ap355616 (Status: affected)
- 22.0 ap361520 (Status: affected)
- 22.0 ap356140 (Status: affected)
- 23.0 ap374274 (Status: affected)
- 22.0 ap358246 (Status: affected)
- 22.0 ap360495 (Status: affected)
- 22.0 ap362328 (Status: affected)
- 22.0 ap364473 (Status: affected)
- 22.0 ap370737 (Status: affected)
- 22.0 ap381584 (Status: affected)
- 22.0 ap362848 (Status: affected)
- 23.0 ap367794 (Status: affected)
- 23.0 ap372043 (Status: affected)
- 22.0 ap354355 (Status: affected)
- 22.0 ap370667 (Status: affected)
- 22.0 ap353418 (Status: affected)
- 23.0 ap380128 (Status: affected)
- 23.0 ap368137 (Status: affected)
- 22.0 ap371361 (Status: affected)
- 23.0 ap379565 (Status: affected)
- 22.0 ap367517 (Status: affected)
- 23.0 ap365995 (Status: affected)
- 23.0 ap383309 (Status: affected)
- 22.0 ap382824 (Status: affected)
- 22.0 ap380391 (Status: affected)
- 23.0 ap372854 (Status: affected)
- 23.0 ap369724 (Status: affected)
- 23.0 ap365798 (Status: affected)
- 22.0 ap365639 (Status: affected)
- 22.0 ap357571 (Status: affected)
- 22.0 ap370675 (Status: affected)
- 23.0 ap370828 (Status: affected)
- 22.0 ap359106 (Status: affected)
- 22.0 ap356141 (Status: affected)
- 23.0 ap369257 (Status: affected)
- 23.0 ap366744 (Status: affected)
- 23.0 ap367646 (Status: affected)
- 22.0 ap353975 (Status: affected)
- 23.0 ap380528 (Status: affected)
- 23.0 ap363265 (Status: affected)
- 23.0 ap381498 (Status: affected)
- 22.0 ap370349 (Status: affected)
- 22.0 ap363265 (Status: affected)
- 22.0 ap352421 (Status: affected)
- 22.0 ap372016 (Status: affected)
- 23.0 ap381322 (Status: affected)
- 22.0 ap375688 (Status: affected)
- 22.0 ap369454 (Status: affected)
- 23.0 ap370680 (Status: affected)
- 22.0 ap362182 (Status: affected)
- 22.0 ap365801 (Status: affected)
- 23.0 ap378999 (Status: affected)
- 23.0 ap375685 (Status: affected)
- 22.0 ap353577 (Status: affected)
- 22.0 ap359649 (Status: affected)
- 22.0 ap352972 (Status: affected)
- 22.0 ap373117 (Status: affected)
- 22.0 ap381270 (Status: affected)
- 22.0 ap355385 (Status: affected)
- 22.0 ap375254 (Status: affected)
- 22.0 ap352320 (Status: affected)
- 22.0 ap372706 (Status: affected)
- 23.0 ap375003 (Status: affected)
- 23.0 ap373899 (Status: affected)
- 23.0 ap379016 (Status: affected)
- 23.0 ap382717 (Status: affected)
- 22.0 ap357378 (Status: affected)
- 22.0 ap349850 (Status: affected)
- 22.0 ap353162 (Status: affected)
- 22.0 ap360265 (Status: affected)
- 22.0 ap363831 (Status: affected)
- 22.0 ap359851 (Status: affected)
- 22.0 ap357645 (Status: affected)
- 23.0 ap377079 (Status: affected)
- 23.0 ap382095 (Status: affected)
- 22.0 ap379833 (Status: affected)
- 23.0 ap379085 (Status: affected)
- 23.0 ap376416 (Status: affected)
- 23.0 ap372643 (Status: affected)
- 22.0 ap359829 (Status: affected)
- 22.0 ap361820 (Status: affected)
- 22.0 ap372072 (Status: affected)
- 22.0 ap370113 (Status: affected)
- 22.0 ap355894 (Status: affected)
- 22.0 ap378332 (Status: affected)
- 22.0 ap355638 (Status: affected)
- 22.0 ap379597 (Status: affected)
- 22.0 ap382435 (Status: affected)
- 23.0 ap373918 (Status: affected)
- 22.0 ap378436 (Status: affected)
- 22.0 ap366731 (Status: affected)
- 22.0 ap353520 (Status: affected)
- 23.0 ap377581 (Status: affected)
- 22.0 ap383372 (Status: affected)
- 22.0 ap353384 (Status: affected)
- 23.0 ap378140 (Status: affected)
- 22.0 ap372932 (Status: affected)
- 23.0 ap374822 (Status: affected)
- 22.0 ap381367 (Status: affected)
- 22.0 ap380371 (Status: affected)
- 23.0 ap374265 (Status: affected)
- 23.0 ap375018 (Status: affected)
- 22.0 ap361834 (Status: affected)
- 23.0 ap378068 (Status: affected)
- 22.0 ap377329 (Status: affected)
- 22.0 ap383170 (Status: affected)
- 23.0 ap373950 (Status: affected)
- 22.0 ap364020 (Status: affected)
- 22.0 ap363218 (Status: affected)
- 23.0 ap365390 (Status: affected)
- 22.0 ap376668 (Status: affected)
- 22.0 ap363145 (Status: affected)
- 23.0 ap374324 (Status: affected)
- 23.0 ap382198 (Status: affected)
- 23.0 ap366882 (Status: affected)
- 22.0 ap370545 (Status: affected)
- 23.0 ap382463 (Status: affected)
- 23.0 ap370801 (Status: affected)
- 23.0 ap368604 (Status: affected)
- 23.0 ap378603 (Status: affected)
- 23.0 ap373777 (Status: affected)
- 22.0 ap359111 (Status: affected)
- 23.0 ap382434 (Status: affected)
- 23.0 ap371436 (Status: affected)
- 22.0 ap378953 (Status: affected)
- 22.0 ap357769 (Status: affected)
- 22.0 ap359525 (Status: affected)
- 22.0 ap372750 (Status: affected)
- 23.0 ap364667 (Status: affected)
- 22.0 ap366171 (Status: affected)
- 22.0 ap377126 (Status: affected)
- 22.0 ap364805 (Status: affected)
- 22.0 ap380608 (Status: affected)
- 22.0 ap373111 (Status: affected)
- 22.0 ap379389 (Status: affected)
- 23.0 ap371516 (Status: affected)
- 23.0 ap378259 (Status: affected)
- 23.0 ap369674 (Status: affected)
- 23.0 ap374803 (Status: affected)
- 22.0 ap355673 (Status: affected)
- 22.0 ap377412 (Status: affected)
- 22.0 ap375266 (Status: affected)
- 22.0 ap374971 (Status: affected)
- 22.0 ap376670 (Status: affected)
- 22.0 ap362799 (Status: affected)
- 23.0 ap372152 (Status: affected)
- 22.0 ap374144 (Status: affected)
- 22.0 ap358137 (Status: affected)
- 22.0 ap383562 (Status: affected)
- 22.0 ap379852 (Status: affected)
- 22.0 ap365685 (Status: affected)
- 22.0 ap369788 (Status: affected)
- 23.0 ap375304 (Status: affected)
- 22.0 ap374031 (Status: affected)
- 23.0 ap364295 (Status: affected)
- 23.0 ap378440 (Status: affected)
- 22.0 ap353841 (Status: affected)
- 22.0 ap365379 (Status: affected)
- 23.0 ap368510 (Status: affected)
- 22.0 ap375321 (Status: affected)
- 22.0 ap376602 (Status: affected)
- 22.0 ap380537 (Status: affected)
- 22.0 ap358707 (Status: affected)
- 23.0 ap369931 (Status: affected)
- 22.0 ap361153 (Status: affected)
- 22.0 ap365173 (Status: affected)
- 22.0 ap364667 (Status: affected)
- 22.0 ap370358 (Status: affected)
- 22.0 ap354098 (Status: affected)
- 22.0 ap372974 (Status: affected)
- 23.0 ap365115 (Status: affected)
- 22.0 ap362548 (Status: affected)
- 22.0 ap376410 (Status: affected)
- 23.0 ap366346 (Status: affected)
- 22.0 ap355774 (Status: affected)
- 23.0 ap383365 (Status: affected)
- 23.0 ap382300 (Status: affected)
- 23.0 ap374838 (Status: affected)
- 22.0 ap354769 (Status: affected)
- 23.0 ap383547 (Status: affected)
- 22.0 ap361560 (Status: affected)
- 23.0 ap373647 (Status: affected)
- 23.0 ap369206 (Status: affected)
- 22.0 ap354793 (Status: affected)
- 22.0 ap374334 (Status: affected)
- 23.0 ap371495 (Status: affected)
- 22.0 ap371771 (Status: affected)
- 22.0 ap362825 (Status: affected)
- 22.0 ap376984 (Status: affected)
- 23.0 ap372033 (Status: affected)
- 22.0 ap356328 (Status: affected)
- 22.0 ap379531 (Status: affected)
- 22.0 ap374092 (Status: affected)
- 23.0 ap365889 (Status: affected)
- 22.0 ap354936 (Status: affected)
- 22.0 ap355672 (Status: affected)
- 22.0 ap361666 (Status: affected)
- 23.0 ap380187 (Status: affected)
- 22.0 ap348472 (Status: affected)
- 22.0 ap370654 (Status: affected)
- 23.0 ap373283 (Status: affected)
- 23.0 ap380371 (Status: affected)
- 22.0 ap375036 (Status: affected)
- 22.0 ap379694 (Status: affected)
- 23.0 ap360007 (Status: affected)
- 22.0 ap377480 (Status: affected)
- 23.0 ap369227 (Status: affected)
- 22.0 ap379795 (Status: affected)
- 23.0 ap371775 (Status: affected)
- 23.0 ap373954 (Status: affected)
- 23.0 ap371437 (Status: affected)
- 23.0 ap382954 (Status: affected)
- 22.0 ap343616 (Status: affected)
- 23.0 ap381609 (Status: affected)
- 22.0 ap378823 (Status: affected)
- 22.0 ap355674 (Status: affected)
- 22.0 ap365545 (Status: affected)
- 23.0 ap366807 (Status: affected)
- 22.0 ap375018 (Status: affected)
- 23.0 ap374339 (Status: affected)
- 22.0 ap381418 (Status: affected)
- 23.0 ap378218 (Status: affected)
- 23.0 ap379080 (Status: affected)
- 22.0 ap375743 (Status: affected)
- 22.0 ap369501 (Status: affected)
- 22.0 ap356271 (Status: affected)
- 22.0 ap366348 (Status: affected)
- 22.0 ap370544 (Status: affected)
- 22.0 ap380512 (Status: affected)
- 23.0 ap379848 (Status: affected)
- 22.0 ap365995 (Status: affected)
- 22.0 ap361101 (Status: affected)
- 23.0 ap381418 (Status: affected)
- 22.0 ap378471 (Status: affected)
- 22.0 ap371775 (Status: affected)
- 22.0 ap356256 (Status: affected)
- 22.0 ap380161 (Status: affected)
- 23.0 ap352962 (Status: affected)
- 22.0 ap364860 (Status: affected)
- 22.0 ap382252 (Status: affected)
- 23.0 ap374588 (Status: affected)
- 23.0 ap372504 (Status: affected)
- 23.0 ap377494 (Status: affected)
- 22.0 ap365390 (Status: affected)
- 23.0 ap366880 (Status: affected)
- 22.0 ap357670 (Status: affected)
- 22.0 ap359974 (Status: affected)
- 23.0 ap367109 (Status: affected)
- 22.0 ap365601 (Status: affected)
- 22.0 ap359644 (Status: affected)
- 22.0 ap356161 (Status: affected)
- 23.0 ap379487 (Status: affected)
- 22.0 ap364291 (Status: affected)
- 22.0 ap371804 (Status: affected)
- 23.0 ap376614 (Status: affected)
- 23.0 ap374093 (Status: affected)
- 22.0 ap376513 (Status: affected)
- 23.0 ap371043 (Status: affected)
- 23.0 ap375655 (Status: affected)
- 23.0 ap381419 (Status: affected)
- 22.0 ap377496 (Status: affected)
- 22.0 ap381498 (Status: affected)
- 23.0 ap367367 (Status: affected)
- 22.0 ap367340 (Status: affected)
- 22.0 ap353357 (Status: affected)
- 22.0 ap379165 (Status: affected)
- 22.0 ap376426 (Status: affected)
- 22.0 ap378259 (Status: affected)
- 22.0 ap364761 (Status: affected)
- 22.0 ap378880 (Status: affected)
- 22.0 ap370258 (Status: affected)
- 22.0 ap359252 (Status: affected)
- 22.0 ap376218 (Status: affected)
- 22.0 ap364223 (Status: affected)
- 22.0 ap351250 (Status: affected)
- 22.0 ap383706 (Status: affected)
- 23.0 ap380143 (Status: affected)
- 23.0 ap366221 (Status: affected)
- 22.0 ap371821 (Status: affected)
- 22.0 ap373820 (Status: affected)
- 22.0 ap354921 (Status: affected)
- 23.0 ap377149 (Status: affected)
- 22.0 ap360960 (Status: affected)
- 22.0 ap380041 (Status: affected)
- 22.0 ap365597 (Status: affected)
- 22.0 ap376373 (Status: affected)
- 23.0 ap375321 (Status: affected)
- 23.0 ap377799 (Status: affected)
- 23.0 ap375743 (Status: affected)
- 22.0 ap382198 (Status: affected)
- 22.0 ap375646 (Status: affected)
- 23.0 ap377578 (Status: affected)
- 22.0 ap353701 (Status: affected)
- 22.0 ap376147 (Status: affected)
- 23.0 ap379098 (Status: affected)
- 22.0 ap382849 (Status: affected)
- 23.0 ap373212 (Status: affected)
- 23.0 ap370193 (Status: affected)
- 23.0 ap380099 (Status: affected)
- 23.0 ap366306 (Status: affected)
- 22.0 ap381118 (Status: affected)
- 23.0 ap383515 (Status: affected)
- 23.0 ap376620 (Status: affected)
- 22.0 ap354646 (Status: affected)
- 22.0 ap352896 (Status: affected)
- 22.0 ap358034 (Status: affected)
- 23.0 ap373111 (Status: affected)
- 23.0 ap370075 (Status: affected)
- 23.0 ap379396 (Status: affected)
- 22.0 ap363213 (Status: affected)
- 22.0 ap352515 (Status: affected)
- 22.0 ap365584 (Status: affected)
- 22.0 ap363521 (Status: affected)
- 23.0 ap373684 (Status: affected)
- 22.0 ap380187 (Status: affected)
- 22.0 ap369173 (Status: affected)
- 23.0 ap372932 (Status: affected)
- 22.0 ap364699 (Status: affected)
- 22.0 ap371836 (Status: affected)
- 22.0 ap373303 (Status: affected)
- 23.0 ap378164 (Status: affected)
- 23.0 ap364634 (Status: affected)
- 22.0 ap366803 (Status: affected)
- 23.0 ap366653 (Status: affected)
- 23.0 ap377126 (Status: affected)
- 22.0 ap355083 (Status: affected)
- 22.0 ap378164 (Status: affected)
- 23.0 ap376701 (Status: affected)
- 22.0 ap372674 (Status: affected)
- 23.0 ap372160 (Status: affected)
- 23.0 ap366207 (Status: affected)
- 22.0 ap366747 (Status: affected)
- 23.0 ap374144 (Status: affected)
- 23.0 ap366171 (Status: affected)
- 22.0 ap374956 (Status: affected)
- 22.0 ap376704 (Status: affected)
- 22.0 ap381729 (Status: affected)
- 22.0 ap359959 (Status: affected)
- 22.0 ap373452 (Status: affected)
- 23.0 ap371155 (Status: affected)
- 23.0 ap375097 (Status: affected)
- 23.0 ap375266 (Status: affected)
- 22.0 ap359429 (Status: affected)
- 23.0 ap381729 (Status: affected)
- 22.0 ap361559 (Status: affected)
- 22.0 ap353699 (Status: affected)
- 23.0 ap373480 (Status: affected)
- 22.0 ap364932 (Status: affected)
- 22.0 ap360007 (Status: affected)
- 22.0 ap371033 (Status: affected)
- 22.0 ap367986 (Status: affected)
- 23.0 ap373562 (Status: affected)
- 22.0 ap378391 (Status: affected)
- 22.0 ap379085 (Status: affected)
- 22.0 ap374312 (Status: affected)
- 23.0 ap382849 (Status: affected)
- 22.0 ap362710 (Status: affected)
- 23.0 ap377068 (Status: affected)
- 23.0 ap371300 (Status: affected)
- 22.0 ap376736 (Status: affected)
- 22.0 ap362532 (Status: affected)
- 22.0 ap365905 (Status: affected)
- 22.0 ap362143 (Status: affected)
- 22.0 ap354519 (Status: affected)
- 22.0 ap370193 (Status: affected)
- 22.0 ap382717 (Status: affected)
- 23.0 ap378509 (Status: affected)
- 23.0 ap367732 (Status: affected)
- 23.0 ap378970 (Status: affected)
- 22.0 ap381136 (Status: affected)
- 22.0 ap370590 (Status: affected)
- 23.0 ap373015 (Status: affected)
- 23.0 ap379167 (Status: affected)
- 22.0 ap373539 (Status: affected)
- 23.0 ap368167 (Status: affected)
- 22.0 ap359127 (Status: affected)
- 22.0 ap371455 (Status: affected)
- 22.0 ap372163 (Status: affected)
- 22.0 ap375291 (Status: affected)
- 22.0 ap354069 (Status: affected)
- 22.0 ap377384 (Status: affected)
- 22.0 ap365779 (Status: affected)
- 22.0 ap378862 (Status: affected)
- 22.0 ap381243 (Status: affected)
- 22.0 ap380473 (Status: affected)
- 22.0 ap369227 (Status: affected)
- 22.0 ap368913 (Status: affected)
- 22.0 ap372517 (Status: affected)
- 22.0 ap375069 (Status: affected)
- 22.0 ap366486 (Status: affected)
- 22.0 ap376402 (Status: affected)
- 23.0 ap381594 (Status: affected)
- 23.0 ap376356 (Status: affected)
- 23.0 ap382253 (Status: affected)
- 22.0 ap365186 (Status: affected)
- 23.0 ap371587 (Status: affected)
- 22.0 ap373302 (Status: affected)
- 22.0 ap376541 (Status: affected)
- 23.0 ap380473 (Status: affected)
- 23.0 ap376181 (Status: affected)
- 22.0 ap371024 (Status: affected)
- 22.0 ap374254 (Status: affected)
- 23.0 ap380486 (Status: affected)
- 23.0 ap372286 (Status: affected)
- 23.0 ap371804 (Status: affected)
- 22.0 ap366211 (Status: affected)
- 22.0 ap373562 (Status: affected)
- 22.0 ap369478 (Status: affected)
- 22.0 ap377963 (Status: affected)
- 22.0 ap358453 (Status: affected)
- 22.0 ap379080 (Status: affected)
- 22.0 ap352726 (Status: affected)
- 22.0 ap360184 (Status: affected)
- 22.0 ap361863 (Status: affected)
- 23.0 ap377727 (Status: affected)
- 22.0 ap370465 (Status: affected)
- 22.0 ap353458 (Status: affected)
- 22.0 ap369863 (Status: affected)
- 22.0 ap356432 (Status: affected)
- 23.0 ap366898 (Status: affected)
- 23.0 ap366118 (Status: affected)
- 22.0 ap370179 (Status: affected)
- 22.0 ap370579 (Status: affected)
- 22.0 ap364003 (Status: affected)
- 22.0 ap375908 (Status: affected)
- 23.0 ap374428 (Status: affected)
- 22.0 ap366174 (Status: affected)
- 22.0 ap382300 (Status: affected)
- 22.0 ap377581 (Status: affected)
- 23.0 ap372337 (Status: affected)
- 22.0 ap373647 (Status: affected)
- 22.0 ap376860 (Status: affected)
- 22.0 ap372351 (Status: affected)
- 23.0 ap377508 (Status: affected)
- 23.0 ap367782 (Status: affected)
- 22.0 ap369674 (Status: affected)
- 22.0 ap370075 (Status: affected)
- 23.0 ap378823 (Status: affected)
- 22.0 ap366701 (Status: affected)
- 22.0 ap355757 (Status: affected)
- 22.0 ap358469 (Status: affected)
- 22.0 ap366653 (Status: affected)
- 22.0 ap370196 (Status: affected)
- 23.0 ap369286 (Status: affected)
- 23.0 ap376860 (Status: affected)
- 22.0 ap368987 (Status: affected)
- 22.0 ap369922 (Status: affected)
- 23.0 ap367517 (Status: affected)
- 22.0 ap357607 (Status: affected)
- 23.0 ap375545 (Status: affected)
- 23.0 ap366295 (Status: affected)
- 22.0 ap358942 (Status: affected)
- 23.0 ap370590 (Status: affected)
- 22.0 ap376701 (Status: affected)
- 22.0 ap358515 (Status: affected)
- 22.0 ap378218 (Status: affected)
- 23.0 ap363363 (Status: affected)
- 23.0 ap382183 (Status: affected)
- 22.0 ap375090 (Status: affected)
- 23.0 ap362378 (Status: affected)
- 22.0 ap366744 (Status: affected)
- 23.0 ap376710 (Status: affected)
- 22.0 ap351721 (Status: affected)
- 23.0 ap370138 (Status: affected)
- 22.0 ap372286 (Status: affected)
- 22.0 ap374596 (Status: affected)
- 23.0 ap372517 (Status: affected)
- 22.0 ap378425 (Status: affected)
- 23.0 ap378581 (Status: affected)
- 23.0 ap372657 (Status: affected)
- 22.0 ap354374 (Status: affected)
- 22.0 ap369748 (Status: affected)
- 22.0 ap371961 (Status: affected)
- 23.0 ap384441 (Status: affected)
- 23.0 ap383514 (Status: affected)
- 23.0 ap384431 (Status: affected)
- 23.0 ap384650 (Status: affected)
- 23.0 ap384622 (Status: affected)
- 23.0 ap384639 (Status: affected)
- RI.2022.12 (Status: affected)
- 23.0 ap384745 (Status: affected)
- RI.2023.01 (Status: affected)
- 23.0 ap384591 (Status: affected)
- 23.0 ap384901 (Status: affected)
- 23.0 ap384931 (Status: affected)
- 23.0 ap384930 (Status: affected)
- 23.0 ap384876 (Status: affected)
- 23.0 ap385048 (Status: affected)
### References
1. [cisco-sa-bw-tcp-dos-KEdJCxLs](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-tcp-dos-KEdJCxLs) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26691, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26691 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26691
- **State**: PUBLISHED
- **Published Date**: April 03, 2024 at 14:54 UTC
- **Last Updated**: May 04, 2025 at 08:54 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: Fix circular locking dependency
The rule inside kvm enforces that the vcpu->mutex is taken *inside*
kvm->lock. The rule is violated by the pkvm_create_hyp_vm() which acquires
the kvm->lock while already holding the vcpu->mutex lock from
kvm_vcpu_ioctl(). Avoid the circular locking dependency altogether by
protecting the hyp vm handle with the config_lock, much like we already
do for other forms of VM-scoped data.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.6.18 (Status: unaffected)
- 6.7.6 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/3d16cebf01127f459dcfeb79ed77bd68b124c228)
2. [](https://git.kernel.org/stable/c/3ab1c40a1e915e350d9181a4603af393141970cc)
3. [](https://git.kernel.org/stable/c/10c02aad111df02088d1a81792a709f6a7eca6cc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1396, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1396 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1396
- **State**: PUBLISHED
- **Published Date**: February 12, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:53 UTC
- **Reserved Date**: February 12, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Winamp 5.07 and possibly other versions, allows remote attackers to cause a denial of service (application crash or CPU consumption) via (1) an mp4 or m4a playlist file that contains invalid tag data or (2) an invalid .nsv or .nsa file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [11909](http://www.securityfocus.com/bid/11909)
2. [VU#372968](http://www.kb.cert.org/vuls/id/372968)
3. [winamp-nsa-nsv-dos(18467)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18467)
4. [winamp-mp4-m4a-dos(18466)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18466)
5. [1012525](http://securitytracker.com/alerts/2004/Dec/1012525.html)
6. [](http://forums.winamp.com/showthread.php?s=&threadid=202007)
7. [20041213 Winamp 5.07 (latest version) Remote Crash + other](http://marc.info/?l=full-disclosure&m=110303988101973&w=2)
8. [20041213 Winamp 5.07 (latest version) Remote Crash + other stupid shizle](http://marc.info/?l=bugtraq&m=110297310503541&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26959, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26959
- **State**: PUBLISHED
- **Published Date**: September 16, 2022 at 01:51 UTC
- **Last Updated**: August 03, 2024 at 05:18 UTC
- **Reserved Date**: March 12, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There are two full (read/write) Blind/Time-based SQL injection vulnerabilities in the Northstar Club Management version 6.3 application. The vulnerabilities exist in the userName parameter of the processlogin.jsp page in the /northstar/Portal/ directory and the userID parameter of the login.jsp page in the /northstar/iphone/ directory. Exploitation of the SQL injection vulnerabilities allows full access to the database which contains critical data for organization’s that make full use of the software suite.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.assurainc.com/services/advisory-services/threat-vuln-assessment/)
2. [](https://assura.atlassian.net/wiki/spaces/VULNS/pages/1842675717/CVE-2022-26959+Northstar+Club+Management+software+version+6.3+-+Full+Blind+Time-based+SQL+Injection) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19481
- **State**: PUBLISHED
- **Published Date**: December 01, 2019 at 22:37 UTC
- **Last Updated**: August 05, 2024 at 02:16 UTC
- **Reserved Date**: December 01, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-cac1.c mishandles buffer limits for CAC certificates.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/OpenSC/OpenSC/commit/b75c002cfb1fd61cd20ec938ff4937d7b1a94278)
2. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18618)
3. [[oss-security] 20191229 OpenSC 0.20.0 released](http://www.openwall.com/lists/oss-security/2019/12/29/1)
4. [FEDORA-2020-3c93790abe](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDSQLMZZYBHO5X3BK7D6E7E6NZIMZDI5/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44365
- **State**: PUBLISHED
- **Published Date**: December 02, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 15:05 UTC
- **Reserved Date**: October 30, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda i21 V1.0.0.14(4656) has a stack overflow vulnerability via /goform/setSysPwd.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSysPwd/readme.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1103, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1103
- **State**: PUBLISHED
- **Published Date**: March 24, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 01:14 UTC
- **Reserved Date**: March 24, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in Stainless allows remote attackers to bypass intended port restrictions on outbound TCP connections via a port number outside the range of the unsigned short data type, as demonstrated by a value of 65561 for TCP port 25.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [stainless-tcp-security-bypass(57237)](https://exchange.xforce.ibmcloud.com/vulnerabilities/57237)
2. [20100323 Safari browser port blocking bypassed by integer overflow](http://www.securityfocus.com/archive/1/510283/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4063
- **State**: PUBLISHED
- **Published Date**: October 21, 2011 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 23:53 UTC
- **Reserved Date**: October 15, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.7.1 and 10.x before 10.0.0-rc1 does not properly initialize variables during request parsing, which allows remote authenticated users to cause a denial of service (daemon crash) via a malformed request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1026191](http://www.securitytracker.com/id?1026191)
2. [8478](http://securityreason.com/securityalert/8478)
3. [46420](http://secunia.com/advisories/46420)
4. [20111017 AST-2011-012: Remote crash vulnerability in SIP channel driver](http://www.securityfocus.com/archive/1/520141/100/0/threaded)
5. [50177](http://www.securityfocus.com/bid/50177)
6. [asterisk-sip-channel-driver-dos(70706)](https://exchange.xforce.ibmcloud.com/vulnerabilities/70706)
7. [](http://downloads.digium.com/pub/security/AST-2011-012.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23169
- **State**: PUBLISHED
- **Published Date**: November 15, 2024 at 00:00 UTC
- **Last Updated**: November 15, 2024 at 18:54 UTC
- **Reserved Date**: January 12, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The web interface in RSA NetWitness 11.7.2.0 allows Cross-Site Scripting (XSS) via the Where textbox on the Reports screen during new rule creation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://community.netwitness.com/t5/netwitness-platform-online/tkb-p/netwitness-online-documentation)
2. [](https://community.netwitness.com/t5/netwitness-platform-product/nw-2024-05-netwitness-platform-cross-site-scripting-xss/ta-p/719453) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35187
- **State**: PUBLISHED
- **Published Date**: December 17, 2020 at 00:58 UTC
- **Last Updated**: August 04, 2024 at 17:02 UTC
- **Reserved Date**: December 12, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The official telegraf docker images before 1.9.4-alpine (Alpine specific) contain a blank password for a root user. System using the telegraf docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/koharin/koharin2/blob/main/CVE-2020-35187) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46358
- **State**: PUBLISHED
- **Published Date**: January 27, 2023 at 23:21 UTC
- **Last Updated**: March 28, 2025 at 15:51 UTC
- **Reserved Date**: November 30, 2022 at 17:48 UTC
- **Assigned By**: hp
### Vulnerability Description
Potential vulnerabilities have been identified in HP Security Manager which may allow escalation of privilege, arbitrary code execution, and information disclosure.
### Affected Products
**HP Inc. - HP Security Manager**
Affected versions:
- See HP Security Bulletin reference for affected versions. (Status: affected)
### References
1. [](https://support.hp.com/us-en/document/ish_7334353-7334378-16) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0822, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0822 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0822
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: November 22, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FPF kernel module 1.0 allows a remote attacker to cause a denial of service via fragmented packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2816](http://www.securityfocus.com/bid/2816)
2. [20010602 fpf module and packet fragmentation:local/remote DoS.](http://marc.info/?l=bugtraq&m=99167206319643&w=2)
3. [](http://www.pkcrew.org/news.php)
4. [linux-fpf-kernel-dos(6659)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6659) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3533, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3533
- **State**: PUBLISHED
- **Published Date**: December 11, 2005 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 16, 2005 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Buffer overflow in OSH before 1.7-15 allows local users to execute arbitrary code via a long current working directory and filename.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17967](http://secunia.com/advisories/17967)
2. [DSA-918](http://www.debian.org/security/2005/dsa-918)
3. [ADV-2005-2812](http://www.vupen.com/english/advisories/2005/2812)
4. [12455](http://www.securityfocus.com/bid/12455)
5. [21576](http://www.osvdb.org/21576) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21154
- **State**: PUBLISHED
- **Published Date**: July 16, 2024 at 22:40 UTC
- **Last Updated**: November 05, 2024 at 15:30 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the PeopleSoft Enterprise HCM Human Resources product of Oracle PeopleSoft (component: Human Resources). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise HCM Human Resources accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - PeopleSoft Enterprise HCM Human Resources**
Affected versions:
- 9.2 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujul2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22118
- **State**: PUBLISHED
- **Published Date**: October 17, 2023 at 21:03 UTC
- **Last Updated**: September 13, 2024 at 15:55 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.3, 12.4, 14.0-14.3 and 14.5-14.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.1 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L).
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Affected Products
**Oracle Corporation - FLEXCUBE Universal Banking**
Affected versions:
- 12.3 (Status: affected)
- 12.4 (Status: affected)
- 14.0 (Status: affected)
- 14.5 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2023.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8055, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8055 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8055
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 20:05 UTC
- **Last Updated**: August 04, 2024 at 21:10 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-41.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47382
- **State**: PUBLISHED
- **Published Date**: October 05, 2024 at 14:56 UTC
- **Last Updated**: October 07, 2024 at 14:12 UTC
- **Reserved Date**: September 24, 2024 at 13:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Webvitaly Page-list allows Stored XSS.This issue affects Page-list: from n/a through 5.6.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Webvitaly - Page-list**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/page-list/wordpress-page-list-plugin-5-6-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- kslatz (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41436
- **State**: PUBLISHED
- **Published Date**: September 15, 2023 at 00:00 UTC
- **Last Updated**: September 25, 2024 at 15:31 UTC
- **Reserved Date**: August 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability in CSZCMS v.1.3.0 allows a local attacker to execute arbitrary code via a crafted script to the Additional Meta Tag parameter in the Pages Content Menu component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sromanhu/CSZ-CMS-Stored-XSS---Pages-Content/blob/main/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14635, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14635
- **State**: PUBLISHED
- **Published Date**: September 21, 2017 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 19:34 UTC
- **Reserved Date**: September 21, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Open Ticket Request System (OTRS) 3.3.x before 3.3.18, 4.x before 4.0.25, and 5.x before 5.0.23, remote authenticated users can leverage statistics-write permissions to gain privileges via code injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-4021](https://www.debian.org/security/2017/dsa-4021)
2. [](https://www.otrs.com/security-advisory-2017-04-security-update-otrs-versions/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25676
- **State**: PUBLISHED
- **Published Date**: November 15, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 15:50 UTC
- **Reserved Date**: February 22, 2022 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Information disclosure in video due to buffer over-read while parsing avi files in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables**
Affected versions:
- AQT1000 (Status: affected)
- QAM8295P (Status: affected)
- QCA6390 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6436 (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCC5100 (Status: affected)
- QCM2290 (Status: affected)
- QCM4290 (Status: affected)
- QCM6125 (Status: affected)
- QCM6490 (Status: affected)
- QCN7606 (Status: affected)
- QCS2290 (Status: affected)
- QCS410 (Status: affected)
- QCS4290 (Status: affected)
- QCS610 (Status: affected)
- QCS6125 (Status: affected)
- QCS6490 (Status: affected)
- SA4150P (Status: affected)
- SA4155P (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8295P (Status: affected)
- SD 675 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD439 (Status: affected)
- SD460 (Status: affected)
- SD480 (Status: affected)
- SD625 (Status: affected)
- SD626 (Status: affected)
- SD660 (Status: affected)
- SD662 (Status: affected)
- SD665 (Status: affected)
- SD675 (Status: affected)
- SD678 (Status: affected)
- SD680 (Status: affected)
- SD690 5G (Status: affected)
- SD695 (Status: affected)
- SD720G (Status: affected)
- SD730 (Status: affected)
- SD750G (Status: affected)
- SD765 (Status: affected)
- SD765G (Status: affected)
- SD768G (Status: affected)
- SD778G (Status: affected)
- SD780G (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD870 (Status: affected)
- SD888 (Status: affected)
- SD888 5G (Status: affected)
- SDA429W (Status: affected)
- SDX50M (Status: affected)
- SDX55 (Status: affected)
- SDX55M (Status: affected)
- SDXR2 5G (Status: affected)
- SM4125 (Status: affected)
- SM4375 (Status: affected)
- SM6250 (Status: affected)
- SM7250P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- SXR2150P (Status: affected)
- WCD9326 (Status: affected)
- WCD9335 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3610 (Status: affected)
- WCN3615 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680B (Status: affected)
- WCN3910 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN3991 (Status: affected)
- WCN3998 (Status: affected)
- WCN6740 (Status: affected)
- WCN6750 (Status: affected)
- WCN6850 (Status: affected)
- WCN6851 (Status: affected)
- WCN6855 (Status: affected)
- WCN6856 (Status: affected)
- WCN7850 (Status: affected)
- WCN7851 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37111, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37111
- **State**: PUBLISHED
- **Published Date**: January 03, 2022 at 21:07 UTC
- **Last Updated**: August 04, 2024 at 01:09 UTC
- **Reserved Date**: July 20, 2021 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion.
### Affected Products
**Huawei - EMUI**
Affected versions:
- 11.0.1 (Status: affected)
- 10.1.1 (Status: affected)
- 10.1.0 (Status: affected)
**Huawei - Magic UI**
Affected versions:
- 3.1.1 (Status: affected)
- 3.1.0 (Status: affected)
**Huawei - Harmony OS**
Affected versions:
- 2.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2021/10/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9758, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9758 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9758
- **State**: PUBLISHED
- **Published Date**: November 09, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 17:18 UTC
- **Reserved Date**: June 19, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Savitech driver packages for Windows silently install a self-signed certificate into the Trusted Root Certification Authorities store, aka "Inaudible Subversion."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://zeroday.hitcon.org/vulnerability/ZD-2017-00386)
2. [VU#446847](https://www.kb.cert.org/vuls/id/446847)
3. [](https://community.rsa.com/community/products/netwitness/blog/2017/10/27/inaudible-subversion-did-your-hi-fi-just-subvert-your-pc)
4. [101700](http://www.securityfocus.com/bid/101700) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27983, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27983 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27983
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 01:06 UTC
- **Last Updated**: April 30, 2025 at 22:25 UTC
- **Reserved Date**: February 29, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.
### Affected Products
**NodeJS - Node**
Affected versions:
- 4.0 (Status: affected)
- 5.0 (Status: affected)
- 6.0 (Status: affected)
- 7.0 (Status: affected)
- 8.0 (Status: affected)
- 9.0 (Status: affected)
- 10.0 (Status: affected)
- 11.0 (Status: affected)
- 12.0 (Status: affected)
- 13.0 (Status: affected)
- 14.0 (Status: affected)
- 15.0 (Status: affected)
- 16.0 (Status: affected)
- 17.0 (Status: affected)
- 18.0 (Status: affected)
- 19.0 (Status: affected)
- 20.0 (Status: affected)
- 21.0 (Status: affected)
### References
1. [](https://hackerone.com/reports/2319584)
2. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDECX4BYZLMM4S4LALN4DPZ2HUTTPLKE/)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDVFUH7ACZPYB3BS4SVILNOY7NQU73VW/)
4. [](http://www.openwall.com/lists/oss-security/2024/04/03/16)
5. [](https://security.netapp.com/advisory/ntap-20240510-0002/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0889, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0889
- **State**: PUBLISHED
- **Published Date**: March 16, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 22:05 UTC
- **Reserved Date**: February 04, 2011 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP Client Automation Enterprise (aka HPCA or Radia Notify) 5.11, 7.2, 7.5, 7.8, and 7.9 allows remote attackers to execute arbitrary code via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43766](http://secunia.com/advisories/43766)
2. [ADV-2011-0651](http://www.vupen.com/english/advisories/2011/0651)
3. [46862](http://www.securityfocus.com/bid/46862)
4. [HPSBMA02644](http://seclists.org/bugtraq/2011/Mar/132)
5. [1025205](http://securitytracker.com/id?1025205)
6. [SSRT100284](http://seclists.org/bugtraq/2011/Mar/132)
7. [hpca-unspec-code-exec(66082)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66082)
8. [71179](http://osvdb.org/71179) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38947
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 00:00 UTC
- **Last Updated**: December 11, 2024 at 15:58 UTC
- **Reserved Date**: August 29, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection vulnerability in Flipkart-Clone-PHP version 1.0 in entry.php in product_title parameter, allows attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Cosemz/CVE/blob/main/Flipkart-Clone-PHP/Flipkart-Clone-PHP.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8182
- **State**: PUBLISHED
- **Published Date**: October 05, 2020 at 13:17 UTC
- **Last Updated**: August 04, 2024 at 09:56 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Improper access control in Nextcloud Deck 0.8.0 allowed an attacker to reshare boards shared with them with more permissions than they had themselves.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**n/a - Nextcloud Deck**
Affected versions:
- Fixed in 0.8.1 (Status: affected)
### References
1. [](https://hackerone.com/reports/827816)
2. [](https://nextcloud.com/security/advisory/?id=NC-SA-2020-025) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3300, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3300 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3300
- **State**: PUBLISHED
- **Published Date**: July 07, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:35 UTC
- **Reserved Date**: May 07, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager (CDM) in Unified CDM Application Software before 10 does not properly implement access control, which allows remote attackers to modify user information via a crafted URL, aka Bug ID CSCum77041.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1030515](http://www.securitytracker.com/id/1030515)
2. [20140702 Multiple Vulnerabilities in Cisco Unified Communications Domain Manager](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140702-cucdm)
3. [20140702 Identifying and Mitigating Exploitation of the Multiple Vulnerabilities in Cisco Unified Communications Domain Manager](http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=34689)
4. [59556](http://secunia.com/advisories/59556)
5. [68331](http://www.securityfocus.com/bid/68331) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16608
- **State**: PUBLISHED
- **Published Date**: January 23, 2018 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 20:27 UTC
- **Reserved Date**: November 06, 2017 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within exec.jsp. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of the current user. Was ZDI-CAN-4749.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**NetGain Systems - NetGain Systems Enterprise Manager**
Affected versions:
- v7.2.586 build 877 (Status: affected)
### References
1. [](https://zerodayinitiative.com/advisories/ZDI-17-950)
2. [](https://www.tenable.com/security/research/tra-2018-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7222, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7222
- **State**: PUBLISHED
- **Published Date**: January 09, 2024 at 15:31 UTC
- **Last Updated**: November 14, 2024 at 15:10 UTC
- **Reserved Date**: January 07, 2024 at 08:50 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Totolink X2000R 1.0.0-B20221212.1452. It has been declared as critical. This vulnerability affects the function formTmultiAP of the file /bin/boa of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249856. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Totolink - X2000R**
Affected versions:
- 1.0.0-B20221212.1452 (Status: affected)
### References
1. [](https://vuldb.com/?id.249856)
2. [](https://vuldb.com/?ctiid.249856)
3. [](https://github.com/jylsec/vuldb/blob/main/TOTOLINK/X2000R/formTmultiAP/README.md)
### Credits
- jylsec (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24607, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24607 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24607
- **State**: PUBLISHED
- **Published Date**: February 14, 2025 at 12:44 UTC
- **Last Updated**: February 14, 2025 at 14:30 UTC
- **Reserved Date**: January 23, 2025 at 14:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Northern Beaches Websites IdeaPush allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects IdeaPush: from n/a through 8.71.
### CVSS Metrics
- **CVSS Base Score**: 5.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Northern Beaches Websites - IdeaPush**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/ideapush/vulnerability/wordpress-ideapush-plugin-8-71-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Trương Hữu Phúc (truonghuuphuc) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6260
- **State**: PUBLISHED
- **Published Date**: March 03, 2016 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 07:15 UTC
- **Reserved Date**: August 17, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco NX-OS 7.1(1)N1(1) on Nexus 5500, 5600, and 6000 devices does not properly validate PDUs in SNMP packets, which allows remote attackers to cause a denial of service (SNMP application restart) via a crafted packet, aka Bug ID CSCut84645.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1035158](http://www.securitytracker.com/id/1035158)
2. [20160302 Cisco NX-OS Software SNMP Packet Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n5ksnmp) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2342, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2342 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2342
- **State**: PUBLISHED
- **Published Date**: July 07, 2022 at 10:10 UTC
- **Last Updated**: August 03, 2024 at 00:32 UTC
- **Reserved Date**: July 07, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to v0.64.4.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**outline - outline/outline**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/b2caceaa-5b28-40ba-9980-70144159efba)
2. [](https://github.com/outline/outline/commit/85657b7340cdeaa696034f294489df8d6a4914d3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52883, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52883 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52883
- **State**: PUBLISHED
- **Published Date**: February 07, 2025 at 00:00 UTC
- **Last Updated**: February 10, 2025 at 16:57 UTC
- **Reserved Date**: November 17, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in AudioCodes One Voice Operations Center (OVOC) before 8.4.582. Due to a path traversal vulnerability, sensitive data can be read without any authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.audiocodes.com/solutions-products/products/management-products-solutions/one-voice-operations-center)
2. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-075.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000605
- **State**: PUBLISHED
- **Published Date**: June 26, 2018 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 16:13 UTC
- **Reserved Date**: June 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A man in the middle vulnerability exists in Jenkins CollabNet Plugin 2.0.4 and earlier in CollabNetApp.java, CollabNetPlugin.java, CNFormFieldValidator.java that allows attackers to impersonate any service that Jenkins connects to.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2018-06-25/#SECURITY-941) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4208, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4208
- **State**: PUBLISHED
- **Published Date**: July 13, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:25 UTC
- **Reserved Date**: April 27, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [91716](http://www.securityfocus.com/bid/91716)
2. [1036281](http://www.securitytracker.com/id/1036281)
3. [40098](https://www.exploit-db.com/exploits/40098/)
4. [](https://helpx.adobe.com/security/products/acrobat/apsb16-26.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-21594, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-21594 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-21594
- **State**: PUBLISHED
- **Published Date**: September 16, 2021 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 14:30 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libde265 v1.0.4 contains a heap buffer overflow in the put_epel_hv_fallback function, which can be exploited via a crafted a file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/strukturag/libde265/issues/233)
2. [DSA-5346](https://www.debian.org/security/2023/dsa-5346) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1368, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1368 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1368
- **State**: PUBLISHED
- **Published Date**: August 06, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 00:51 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 126861.
### Affected Products
**IBM - Security Identity Governance and Intelligence**
Affected versions:
- 5.2 (Status: affected)
- 5.2.1 (Status: affected)
- 5.2.2 (Status: affected)
- 5.2.2.1 (Status: affected)
- 5.2.3 (Status: affected)
- 5.2.3.1 (Status: affected)
- 5.2.3.2 (Status: affected)
### References
1. [ibm-sig-cve20171368-info-disc(126861)](https://exchange.xforce.ibmcloud.com/vulnerabilities/126861)
2. [](http://www.ibm.com/support/docview.wss?uid=swg22016869) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1765, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1765
- **State**: PUBLISHED
- **Published Date**: June 21, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:34 UTC
- **Reserved Date**: June 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Evolution 1.0.3 and 1.0.4 allows remote attackers to cause a denial of service (memory consumption and crash) via an email with a malformed MIME header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [CLA-2002:486](http://online.securityfocus.com/advisories/4117)
2. [[gnome-announce] 20020503 Patch for serious bug in 1.0.3](http://mail.gnome.org/archives/gnome-announce-list/2002-May/msg00020.html)
3. [evolution-mime-header-dos(9059)](https://exchange.xforce.ibmcloud.com/vulnerabilities/9059)
4. [4715](http://www.securityfocus.com/bid/4715)
5. [RHBA-2002:080](http://rhn.redhat.com/errata/RHBA-2002-080.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0256, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0256 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0256
- **State**: PUBLISHED
- **Published Date**: January 15, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 07:39 UTC
- **Reserved Date**: January 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Matteo Binda ASP Photo Gallery 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to (a) Imgbig.asp, (b) thumb.asp, and (c) thumbricerca.asp and the (2) ricerca parameter to (d) thumbricerca.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28447](http://secunia.com/advisories/28447)
2. [4900](https://www.exploit-db.com/exploits/4900)
3. [27262](http://www.securityfocus.com/bid/27262)
4. [aspphotogallery-multiple-sql-injection(39646)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39646) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4490
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49006
- **State**: PUBLISHED
- **Published Date**: December 19, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:46 UTC
- **Reserved Date**: November 20, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Request Forgery (CSRF) vulnerability in Phpsysinfo version 3.4.3 allows a remote attacker to obtain sensitive information via a crafted page in the XML.php file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://huntr.com/bounties/ca6d669f-fd82-4188-aae2-69e08740d982/)
2. [](https://github.com/phpsysinfo/phpsysinfo/commit/4f2cee505e4f2e9b369a321063ff2c5e0c34ba45)
3. [](https://github.com/Hebing123/cve/issues/5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26251, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26251 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26251
- **State**: PUBLISHED
- **Published Date**: December 18, 2020 at 17:20 UTC
- **Last Updated**: August 04, 2024 at 15:56 UTC
- **Reserved Date**: October 01, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Open Zaak is a modern, open-source data- and services-layer to enable zaakgericht werken, a Dutch approach to case management. In Open Zaak before version 1.3.3 the Cross-Origin-Resource-Sharing policy in Open Zaak is currently wide open - every client is allowed. This allows evil.com to run scripts that perform AJAX calls to known Open Zaak installations, and the browser will not block these. This was intended to only apply to development machines running on localhost/127.0.0.1. Open Zaak 1.3.3 disables CORS by default, while it can be opted-in through environment variables. The vulnerability does not actually seem exploitable because: a) The session cookie has a `Same-Site: Lax` policy which prevents it from being sent along in Cross-Origin requests. b) All pages that give access to (production) data are login-protected c) `Access-Control-Allow-Credentials` is set to `false` d) CSRF checks probably block the remote origin, since they're not explicitly added to the trusted allowlist.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-346: Security Weakness
### Affected Products
**open-zaak - open-zaak**
Affected versions:
- < 1.3.3 (Status: affected)
### References
1. [](https://github.com/open-zaak/open-zaak/security/advisories/GHSA-chhr-gxrg-64x7)
2. [](https://github.com/open-zaak/open-zaak/commit/952269269f1b629fce9c94485f83ac13f31d6c46)
3. [](https://github.com/open-zaak/open-zaak/blob/master/CHANGELOG.rst#133-2020-12-17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32282
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 02:06 UTC
- **Reserved Date**: April 12, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda FH1202 v1.2.0.14(408) firmware contains a command injection vulnerablility in the formexeCommand function via the cmdinput parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formexecommand_cmdi.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000197
- **State**: PUBLISHED
- **Published Date**: November 17, 2017 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 23:31 UTC
- **Reserved Date**: November 16, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
October CMS build 412 is vulnerable to file path modification in asset move functionality resulting in creating creating malicious files on the server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/octobercms/october/compare/v1.0.412...v1.0.413#diff-eef90a4e3585febf6489916dc242d0ceR241) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9195
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 02:46 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9625, MDM9635M, MDM9650, MDM9655, SD 400, SD 410/12, SD 615/16/SD 415, SD 617, SD 650/52, SD 808, SD 810, and SDX20, in a QTEE syscall handler, HLOS can cause a buffer overflow to occur.
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile**
Affected versions:
- MDM9625, MDM9635M, MDM9650, MDM9655, SD 400, SD 410/12, SD 615/16/SD 415, SD 617, SD 650/52, SD 808, SD 810, SDX20 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42011
- **State**: PUBLISHED
- **Published Date**: October 21, 2021 at 07:46 UTC
- **Last Updated**: August 04, 2024 at 03:22 UTC
- **Reserved Date**: October 05, 2021 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to load a DLL with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
### Affected Products
**Trend Micro - Trend Micro Apex One**
Affected versions:
- 2019, SaaS (Status: affected)
### References
1. [](https://success.trendmicro.com/solution/000289229)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1220/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6235, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6235
- **State**: PUBLISHED
- **Published Date**: February 02, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: July 17, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The setup_imginfo_jpg function in lepton/jpgcoder.cc in Dropbox lepton 1.0 allows remote attackers to cause a denial of service (segmentation fault) via a crafted jpeg file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dropbox/lepton/issues/26)
2. [[oss-security] 20160717 Re: multiple memory corruption issues in lepton](http://www.openwall.com/lists/oss-security/2016/07/17/6) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.