System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5393
- **State**: PUBLISHED
- **Published Date**: October 18, 2006 at 19:00 UTC
- **Last Updated**: April 03, 2025 at 15:41 UTC
- **Reserved Date**: October 18, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cisco Secure Desktop (CSD) does not require that the ClearPageFileAtShutdown (aka CCE-Winv2.0-407) registry value equals 1, which might allow local users to read certain memory pages that were written during another user's SSL VPN session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20061009 Limitations in Cisco Secure Desktop](http://www.cisco.com/en/US/products/products_security_advisory09186a0080754f34.shtml)
2. [20410](http://www.securityfocus.com/bid/20410)
3. [1017018](http://securitytracker.com/id?1017018) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32368, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32368 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32368
- **State**: PUBLISHED
- **Published Date**: June 15, 2022 at 19:47 UTC
- **Last Updated**: August 03, 2024 at 07:39 UTC
- **Reserved Date**: June 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_grade.php?id=.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/itsourcecode.com/advanced-school-management-system/SQLi-3.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0804, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0804 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0804
- **State**: PUBLISHED
- **Published Date**: January 23, 2024 at 23:53 UTC
- **Last Updated**: May 22, 2025 at 17:33 UTC
- **Reserved Date**: January 23, 2024 at 00:47 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient policy enforcement in iOS Security UI in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- 121.0.6167.85 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html)
2. [](https://crbug.com/1515137)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4926
- **State**: PUBLISHED
- **Published Date**: July 29, 2013 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 16:59 UTC
- **Reserved Date**: July 26, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly determine whether there is remaining packet data to process, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828)
2. [](http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50478&r2=50477&pathrev=50478)
3. [54425](http://secunia.com/advisories/54425)
4. [](http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html)
5. [GLSA-201308-05](http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml)
6. [](https://www.wireshark.org/security/wnpa-sec-2013-44.html)
7. [oval:org.mitre.oval:def:17547](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17547)
8. [54296](http://secunia.com/advisories/54296)
9. [](http://anonsvn.wireshark.org/viewvc?view=revision&revision=50478) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29524, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29524
- **State**: PUBLISHED
- **Published Date**: June 14, 2022 at 07:05 UTC
- **Last Updated**: August 03, 2024 at 06:26 UTC
- **Reserved Date**: May 23, 2022 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Out-of-bounds write vulnerability exists in V-Server v4.0.11.0 and earlier and V-Server Lite v4.0.13.0 and earlier, which may allow an attacker to obtain information and/or execute arbitrary code by having a user to open a specially crafted image file.
### Affected Products
**FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. - V-Server and V-Server Lite**
Affected versions:
- V-Server v4.0.11.0 and earlier, and V-Server Lite v4.0.13.0 and earlier (Status: affected)
### References
1. [](https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php)
2. [](https://monitouch.fujielectric.com/site/download-eu/03tellus_inf/index.php)
3. [](https://jvn.jp/en/vu/JVNVU93134398/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52868, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52868 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52868
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 15:31 UTC
- **Last Updated**: May 04, 2025 at 07:44 UTC
- **Reserved Date**: May 21, 2024 at 15:19 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
thermal: core: prevent potential string overflow
The dev->id value comes from ida_alloc() so it's a number between zero
and INT_MAX. If it's too high then these sprintf()s will overflow.
### Affected Products
**Linux - Linux**
Affected versions:
- 203d3d4aa482339b4816f131f713e1b8ee37f6dd (Status: affected)
- 203d3d4aa482339b4816f131f713e1b8ee37f6dd (Status: affected)
- 203d3d4aa482339b4816f131f713e1b8ee37f6dd (Status: affected)
- 203d3d4aa482339b4816f131f713e1b8ee37f6dd (Status: affected)
- 203d3d4aa482339b4816f131f713e1b8ee37f6dd (Status: affected)
- 203d3d4aa482339b4816f131f713e1b8ee37f6dd (Status: affected)
- 203d3d4aa482339b4816f131f713e1b8ee37f6dd (Status: affected)
- 203d3d4aa482339b4816f131f713e1b8ee37f6dd (Status: affected)
- 203d3d4aa482339b4816f131f713e1b8ee37f6dd (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.25 (Status: affected)
- 0 (Status: unaffected)
- 4.14.330 (Status: unaffected)
- 4.19.299 (Status: unaffected)
- 5.4.261 (Status: unaffected)
- 5.10.201 (Status: unaffected)
- 5.15.139 (Status: unaffected)
- 6.1.63 (Status: unaffected)
- 6.5.12 (Status: unaffected)
- 6.6.2 (Status: unaffected)
- 6.7 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/b55f0a9f865be75ca1019aad331f3225f7b50ce8)
2. [](https://git.kernel.org/stable/c/6ad1bf47fbe5750c4d5d8e41337665e193e2c521)
3. [](https://git.kernel.org/stable/c/3091ab943dfc7b2578599b0fe203350286fab5bb)
4. [](https://git.kernel.org/stable/c/3f795fb35c2d8a637efe76b4518216c9319b998c)
5. [](https://git.kernel.org/stable/c/3a8f4e58e1ee707b4f46a1000b40b86ea3dd509c)
6. [](https://git.kernel.org/stable/c/77ff34a56b695e228e6daf30ee30be747973d6e8)
7. [](https://git.kernel.org/stable/c/0f6b3be28c4d62ef6498133959c72266629bea97)
8. [](https://git.kernel.org/stable/c/edbd6bbe40ac524a8f2273ffacc53edf14f3c686)
9. [](https://git.kernel.org/stable/c/c99626092efca3061b387043d4a7399bf75fbdd5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46773, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46773
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 19:01 UTC
- **Last Updated**: January 28, 2025 at 15:37 UTC
- **Reserved Date**: March 31, 2022 at 16:50 UTC
- **Assigned By**: AMD
### Vulnerability Description
Insufficient input validation in ABL may enable
a privileged attacker to corrupt ASP memory, potentially resulting in a loss of
integrity or code execution.
### Affected Products
**AMD - Ryzen™ 2000 series Desktop Processors “Raven Ridge” AM4**
Affected versions:
- various (Status: affected)
**AMD - Ryzen™ 2000 Series Desktop Processors “Pinnacle Ridge”**
Affected versions:
- various (Status: affected)
**AMD - Ryzen™ 3000 Series Desktop Processors “Matisse” AM4**
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM4**
Affected versions:
- various (Status: affected)
**AMD - Ryzen™ 5000 Series Desktop processor with Radeon™ Graphics “Cezanne” AM4**
Affected versions:
- Various (Status: affected)
**AMD - 3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDT**
Affected versions:
- various (Status: affected)
**AMD - Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS**
Affected versions:
- various (Status: affected)
**AMD - Ryzen™ Threadripper™ PRO Processors “Chagall” WS**
Affected versions:
- various (Status: affected)
**AMD - Ryzen™ 2000 Series Mobile Processors “Raven Ridge” FP5**
Affected versions:
- various (Status: affected)
**AMD - Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Renoir” **
Affected versions:
- various (Status: affected)
**AMD - Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”**
Affected versions:
- various (Status: affected)
**AMD - Ryzen™ 5000 Series Mobile processors with Radeon™ Graphics “Cezanne”**
Affected versions:
- various (Status: affected)
### References
1. [](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33218
- **State**: PUBLISHED
- **Published Date**: May 22, 2024 at 15:00 UTC
- **Last Updated**: February 13, 2025 at 15:52 UTC
- **Reserved Date**: April 23, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the component AsUpIO64.sys of ASUSTeK Computer Inc ASUS USB 3.0 Boost Storage Driver 5.30.20.0 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33218) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1846, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1846 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1846
- **State**: PUBLISHED
- **Published Date**: March 22, 2012 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 19:08 UTC
- **Reserved Date**: March 22, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Google Chrome 17.0.963.66 and earlier allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a sandboxed process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012. NOTE: the primary affected product may be clarified later; it was not identified by the researcher, who reportedly stated "it really doesn't matter if it's third-party code."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://pwn2own.zerodayinitiative.com/status.html)
2. [](http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees/)
3. [](http://www.zdnet.com/blog/security/pwn2own-2012-google-chrome-browser-sandbox-first-to-fall/10588)
4. [](http://twitter.com/vupen/statuses/177576000761237505)
5. [oval:org.mitre.oval:def:14940](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14940)
6. [chrome-sandbox-security-bypass(74324)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74324) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2557
- **State**: PUBLISHED
- **Published Date**: April 12, 2016 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: February 24, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Escape interface in the Kernel Mode Driver layer in the NVIDIA GPU graphics driver R340 before 341.95 and R352 before 354.74 on Windows allows local users to obtain sensitive information from kernel memory, cause a denial of service (crash), or possibly gain privileges via unspecified vectors, which trigger uninitialized or out-of-bounds memory access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4060)
2. [](https://support.lenovo.com/us/en/product_security/len_5551) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3469, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3469 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3469
- **State**: PUBLISHED
- **Published Date**: September 29, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 06:31 UTC
- **Reserved Date**: September 29, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in profiles/html/simpleSearch.do in IBM Lotus Connections 2.0.1 allows remote attackers to inject arbitrary web script or HTML via the name parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [58320](http://osvdb.org/58320)
2. [36513](http://www.securityfocus.com/bid/36513)
3. [LO44244](http://www-1.ibm.com/support/docview.wss?uid=swg1LO44244)
4. [36849](http://secunia.com/advisories/36849)
5. [lotus-connections-simplesearch-xss(53460)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53460)
6. [ADV-2009-2760](http://www.vupen.com/english/advisories/2009/2760)
7. [1022945](http://www.securitytracker.com/id?1022945)
8. [](http://www-01.ibm.com/support/docview.wss?uid=swg24024414) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7437, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7437
- **State**: PUBLISHED
- **Published Date**: March 05, 2018 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 22:01 UTC
- **Reserved Date**: April 05, 2017 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
NetIQ Privileged Account Manager before 3.1 Patch Update 3 allowed cross site scripting attacks via the "type" and "account" parameters of json requests.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NetIQ - Privileged Account Manager**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=1001069)
2. [](https://www.netiq.com/documentation/privileged-account-manager-3/npam3103-release-notes/data/npam3103-release-notes.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3515, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3515
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 18:35 UTC
- **Last Updated**: November 13, 2024 at 17:49 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Cisco - Cisco Firepower Management Center**
Affected versions:
- n/a (Status: affected)
### References
1. [20201021 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6509, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6509 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6509
- **State**: PUBLISHED
- **Published Date**: March 23, 2009 at 19:26 UTC
- **Last Updated**: August 07, 2024 at 11:34 UTC
- **Reserved Date**: March 23, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in CallLogDAO in SIP Plugin in Openfire 3.6.0a and earlier allows remote attackers to execute arbitrary SQL commands via the type parameter to sipark-log-summary.jsp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7075](https://www.exploit-db.com/exploits/7075)
2. [](http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt)
3. [](http://www.igniterealtime.org/issues/browse/JM-1488)
4. [openfire-siparklogsummary-sql-injection(46487)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46487)
5. [32478](http://secunia.com/advisories/32478)
6. [](http://www.andreas-kurtz.de/archives/63)
7. [32189](http://www.securityfocus.com/bid/32189)
8. [20081108 [AK-ADV2008-001] Openfire Jabber-Server: Multiple Vulnerabilities (Authentication Bypass, SQL injection, ...)](http://www.securityfocus.com/archive/1/498162/100/0/threaded)
9. [51912](http://osvdb.org/51912)
10. [ADV-2008-3061](http://www.vupen.com/english/advisories/2008/3061) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10080, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10080 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10080
- **State**: PUBLISHED
- **Published Date**: April 13, 2018 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 23:40 UTC
- **Reserved Date**: April 12, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Secutech RiS-11, RiS-22, and RiS-33 devices with firmware V5.07.52_es_FRI01 allow DNS settings changes via a goform/AdvSetDns?GO=wan_dns.asp request in conjunction with a crafted admin cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44393](https://www.exploit-db.com/exploits/44393/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15778, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15778 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15778
- **State**: PUBLISHED
- **Published Date**: February 04, 2019 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 02:00 UTC
- **Reserved Date**: August 23, 2018 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell OS10 versions prior to 10.4.2.1 contain a vulnerability caused by lack of proper input validation on the command-line interface (CLI).
### Affected Products
**Dell - Dell Networking OS10**
Affected versions:
- 10.4.2.1 (Status: affected)
### References
1. [](https://www.dell.com/support/article/sln316095/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-22533, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-22533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-22533
- **State**: PUBLISHED
- **Published Date**: April 04, 2023 at 00:00 UTC
- **Last Updated**: February 13, 2025 at 16:30 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability found in Zentao allows a remote attacker to execute arbitrary code via the lang parameter
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/liuyusjs/zentao/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18567
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 21:28 UTC
- **Reserved Date**: August 20, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The wp-all-import plugin before 3.4.6 for WordPress has XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/wp-all-import/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51824
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 16:31 UTC
- **Last Updated**: November 20, 2024 at 14:38 UTC
- **Reserved Date**: November 04, 2024 at 09:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sony7596, mrseankumar25, miraclewebssoft Advanced Video Player with Analytics allows DOM-Based XSS.This issue affects Advanced Video Player with Analytics: from n/a through 1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**sony7596, mrseankumar25, miraclewebssoft - Advanced Video Player with Analytics**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/advanced-video-player-with-analytics/wordpress-advanced-video-player-with-analytics-plugin-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5292, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5292
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 00:53 UTC
- **Reserved Date**: June 03, 2016 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
During URL parsing, a maliciously crafted URL can cause a potentially exploitable crash. This vulnerability affects Firefox < 50.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [94337](http://www.securityfocus.com/bid/94337)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1288482)
3. [1037298](http://www.securitytracker.com/id/1037298)
4. [](https://www.mozilla.org/security/advisories/mfsa2016-89/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32269, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32269
- **State**: PUBLISHED
- **Published Date**: May 05, 2023 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 15:57 UTC
- **Reserved Date**: May 05, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/torvalds/linux/commit/611792920925fb088ddccbe2783c7f92fdfb6b64)
2. [](https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53819
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 12:26 UTC
- **Last Updated**: December 09, 2024 at 16:58 UTC
- **Reserved Date**: November 22, 2024 at 13:53 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Sprout Invoices Client Invoicing by Sprout Invoices.This issue affects Client Invoicing by Sprout Invoices: from n/a through 20.8.0.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Sprout Invoices - Client Invoicing by Sprout Invoices**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/sprout-invoices/vulnerability/wordpress-client-invoicing-by-sprout-invoices-plugin-20-8-0-insecure-direct-object-references-idor-vulnerability?_s_id=cve)
### Credits
- Manab Jyoti Dowarah (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2839, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2839
- **State**: PUBLISHED
- **Published Date**: April 02, 2024 at 06:47 UTC
- **Last Updated**: August 01, 2024 at 19:25 UTC
- **Reserved Date**: March 22, 2024 at 19:16 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'colibri_post_title' shortcode in all versions up to, and including, 1.0.263 due to insufficient input sanitization and output escaping on user supplied attributes such as 'heading_type'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**extendthemes - Colibri Page Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c9466e5f-d8eb-4de4-a1d2-e5ef15bf1e4e?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3061940/colibri-page-builder/trunk/extend-builder/shortcodes/blog/post-item.php)
### Credits
- Ngô Thiên An
- Dau Hoang Tai |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50855, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50855
- **State**: PUBLISHED
- **Published Date**: December 28, 2023 at 11:19 UTC
- **Last Updated**: August 02, 2024 at 22:23 UTC
- **Reserved Date**: December 14, 2023 at 17:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sam Perrow Pre* Party Resource Hints.This issue affects Pre* Party Resource Hints: from n/a through 1.8.18.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Sam Perrow - Pre* Party Resource Hints**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/pre-party-browser-hints/wordpress-pre-party-resource-hints-plugin-1-8-18-sql-injection-vulnerability?_s_id=cve)
### Credits
- Muhammad Daffa (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31225, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31225
- **State**: PUBLISHED
- **Published Date**: May 01, 2024 at 06:13 UTC
- **Last Updated**: February 13, 2025 at 17:47 UTC
- **Reserved Date**: March 29, 2024 at 14:16 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
RIOT is a real-time multi-threading operating system that supports a range of devices that are typically 8-bit, 16-bit and 32-bit microcontrollers. The `_on_rd_init()` function does not implement a size check before copying data to the `_result_buf` static buffer. If an attacker can craft a long enough payload, they could cause a buffer overflow. If the unchecked input above is attacker-controlled and crosses a security boundary, the impact of the buffer overflow vulnerability could range from denial of service to arbitrary code execution. This issue has yet to be patched. Users are advised to add manual bounds checking.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**RIOT-OS - RIOT**
Affected versions:
- <= 2023.10 (Status: affected)
### References
1. [https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-2572-7q7c-3965](https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-2572-7q7c-3965)
2. [https://github.com/RIOT-OS/RIOT/blob/master/sys/net/application_layer/cord/lc/cord_lc.c#L218](https://github.com/RIOT-OS/RIOT/blob/master/sys/net/application_layer/cord/lc/cord_lc.c#L218)
3. [](http://www.openwall.com/lists/oss-security/2024/05/07/3)
4. [](http://seclists.org/fulldisclosure/2024/May/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0167
- **State**: PUBLISHED
- **Published Date**: March 29, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 01:43 UTC
- **Reserved Date**: March 27, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple off-by-one buffer overflows in the IMAP capability for Mutt 1.3.28 and earlier, and Balsa 1.2.4 and earlier, allow a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a specially crafted mail folder, a different vulnerability than CVE-2003-0140.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7229](http://www.securityfocus.com/bid/7229)
2. [DSA-274](http://www.debian.org/security/2003/dsa-274)
3. [DSA-300](http://www.debian.org/security/2003/dsa-300) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1454, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1454
- **State**: PUBLISHED
- **Published Date**: April 28, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 05:13 UTC
- **Reserved Date**: April 28, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in tasks.php in WebCollab before 2.50 (aka Billy Goat) allows remote attackers to inject arbitrary web script or HTML via the selection parameter in a todo action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [webcollab-tasks-xss(49939)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49939)
2. [34568](http://secunia.com/advisories/34568)
3. [53780](http://www.osvdb.org/53780)
4. [](http://holisticinfosec.org/content/view/108/45/)
5. [](http://sourceforge.net/project/shownotes.php?release_id=676245&group_id=75945)
6. [34576](http://www.securityfocus.com/bid/34576) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4448
- **State**: PUBLISHED
- **Published Date**: October 16, 2024 at 06:43 UTC
- **Last Updated**: October 16, 2024 at 18:06 UTC
- **Reserved Date**: October 15, 2024 at 18:33 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Kaswara Modern VC Addons plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 3.0.1 due to insufficient capability checking on various AJAX actions. This makes it possible for unauthenticated attackers to perform a wide variety of unauthorized actions such as importing data, uploading arbitrary files, deleting arbitrary files, and more.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**SayenThemes - Kaswara Modern VC Addons**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3bf76527-9a11-4755-992c-02fbc1a79bae?source=cve)
2. [](https://codecanyon.net/item/kaswara-modern-visual-composer-addons/19341477)
### Credits
- Ramuel Gall
- Chloe Chamberland |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4534
- **State**: PUBLISHED
- **Published Date**: October 10, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 10:17 UTC
- **Reserved Date**: October 10, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in EC-CUBE Ver2 2.1.2a and earlier, and Ver2 RC 2.3.0-rc1 and earlier, allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31509](http://www.securityfocus.com/bid/31509)
2. [JVN#81111541](http://jvn.jp/en/jp/JVN81111541/index.html)
3. [eccube-unspecified-sql-injection(45593)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45593)
4. [JVNDB-2008-000065](http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000065.html)
5. [32065](http://secunia.com/advisories/32065)
6. [](http://www.ec-cube.net/info/080829) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1528, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1528
- **State**: PUBLISHED
- **Published Date**: August 17, 2020 at 19:13 UTC
- **Last Updated**: August 04, 2024 at 06:39 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when the Windows Radio Manager API improperly handles memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how the Windows Radio Manager API handles memory.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1528) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27260
- **State**: PUBLISHED
- **Published Date**: April 14, 2021 at 15:46 UTC
- **Last Updated**: August 03, 2024 at 20:48 UTC
- **Reserved Date**: February 16, 2021 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-12068.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Parallels - Desktop**
Affected versions:
- 16.0.1-48919 (Status: affected)
### References
1. [](https://kb.parallels.com/en/125013)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-213/)
### Credits
- Reno Robert of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16857, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16857 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16857
- **State**: PUBLISHED
- **Published Date**: November 28, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 10:32 UTC
- **Reserved Date**: September 11, 2018 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation's password policies apply as expected may not have been re-done after the upgrade.
### Weakness Classification (CWE)
- CWE-358: Security Weakness
### Affected Products
**[UNKNOWN] - samba**
Affected versions:
- 4.9.3 (Status: affected)
### References
1. [](https://security.netapp.com/advisory/ntap-20181127-0001/)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857)
3. [106024](http://www.securityfocus.com/bid/106024)
4. [](https://www.samba.org/samba/security/CVE-2018-16857.html)
5. [GLSA-202003-52](https://security.gentoo.org/glsa/202003-52) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35507
- **State**: PUBLISHED
- **Published Date**: December 04, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 15:23 UTC
- **Reserved Date**: July 11, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A response-header CRLF injection vulnerability in the Proxmox Virtual Environment (PVE) and Proxmox Mail Gateway (PMG) web interface allows a remote attacker to set cookies for a victim's browser that are longer than the server expects, causing a client-side DoS. This affects Chromium-based browsers because they allow injection of response headers with %0d. This is fixed in pve-http-server 4.1-3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.proxmox.com/?p=pve-http-server.git%3Ba=commitdiff%3Bh=936007ae0241811093155000486da171379c23c2)
2. [](https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15640, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15640
- **State**: PUBLISHED
- **Published Date**: August 25, 2020 at 20:21 UTC
- **Last Updated**: August 04, 2024 at 13:22 UTC
- **Reserved Date**: July 07, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole 5.5.0.64. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getFileUploadBytes method of the FlashValidatorServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-10497.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Marvell - QConvergeConsole**
Affected versions:
- 5.5.0.64 (Status: affected)
### References
1. [](https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-968/)
### Credits
- rgod |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2769
- **State**: PUBLISHED
- **Published Date**: August 15, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 19:42 UTC
- **Reserved Date**: May 18, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the topic administration page in the Extension::MobileUI extension before 1.02 for Best Practical Solutions RT 3.8.x and in Best Practical Solutions RT before 4.0.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [54684](http://www.securityfocus.com/bid/54684)
2. [[rt-announce] 20120725 Security vulnerabilities in three commonly deployed RT extensions](http://lists.bestpractical.com/pipermail/rt-announce/2012-July/000208.html)
3. [extensionmobileui-unspec-xs(77211)](https://exchange.xforce.ibmcloud.com/vulnerabilities/77211)
4. [50010](http://secunia.com/advisories/50010) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2364, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2364 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2364
- **State**: PUBLISHED
- **Published Date**: April 30, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 13:33 UTC
- **Reserved Date**: April 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in burnCMS 0.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the root parameter to (1) mysql.class.php or (2) postgres.class.php in lib/db/; or (3) authuser.php, (4) misc.php, or (5) connect.php in lib/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3809](https://www.exploit-db.com/exploits/3809)
2. [35617](http://osvdb.org/35617)
3. [23691](http://www.securityfocus.com/bid/23691)
4. [ADV-2007-1557](http://www.vupen.com/english/advisories/2007/1557)
5. [burncms-multiple-script-file-include(33938)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33938) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51747
- **State**: PUBLISHED
- **Published Date**: February 27, 2024 at 13:08 UTC
- **Last Updated**: February 13, 2025 at 17:19 UTC
- **Reserved Date**: December 22, 2023 at 16:12 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling.
A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks.
The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction.
We recommend James users to upgrade to non vulnerable versions.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Apache Software Foundation - Apache James server**
Affected versions:
- 0 (Status: affected)
- 3.8 (Status: affected)
### References
1. [](https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/)
2. [](https://postfix.org/smtp-smuggling.html)
3. [](https://lists.apache.org/thread/rxkwbkh9vgbl9rzx1fkllyk3krhgydko)
4. [](http://www.openwall.com/lists/oss-security/2024/02/27/4)
### Credits
- Benoit TELLIER |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-7204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-7204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-7204
- **State**: PUBLISHED
- **Published Date**: May 22, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 20:57 UTC
- **Reserved Date**: May 22, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The imap_body function in PHP before 4.4.4 does not implement safemode or open_basedir checks, which allows local users to read arbitrary files or list arbitrary directory contents.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28005](http://www.osvdb.org/28005)
2. [21546](http://secunia.com/advisories/21546)
3. [](http://us2.php.net/ChangeLog-4.php#4.4.4)
4. [](http://bugs.php.net/bug.php?id=37265) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20436
- **State**: PUBLISHED
- **Published Date**: December 24, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 11:58 UTC
- **Reserved Date**: December 24, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The "secret chat" feature in Telegram 4.9.1 for Android has a "side channel" in which Telegram servers send GET requests for URLs typed while composing a chat message, before that chat message is sent. There are also GET requests to other URLs on the same web server. This also affects one or more other Telegram products, such as Telegram Web-version 0.7.0. In addition, it can be interpreted as an SSRF issue. NOTE: a third party has reported that potentially unwanted behavior is caused by misconfiguration of the "Secret chats > Preview links" setting
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://misteralfa-hack.blogspot.com/2018/12/abusando-de-telegram-para-conseguir-una.html)
2. [](https://misteralfa-hack.blogspot.com/2018/12/telegram-siempre-in-middle.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0754, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0754
- **State**: PUBLISHED
- **Published Date**: February 16, 2012 at 19:00 UTC
- **Last Updated**: February 10, 2025 at 21:14 UTC
- **Reserved Date**: January 18, 2012 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:15973](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15973)
2. [openSUSE-SU-2012:0265](http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00014.html)
3. [GLSA-201204-07](http://security.gentoo.org/glsa/glsa-201204-07.xml)
4. [48265](http://secunia.com/advisories/48265)
5. [oval:org.mitre.oval:def:15030](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15030)
6. [](http://www.adobe.com/support/security/bulletins/apsb12-03.html)
7. [RHSA-2012:0144](http://rhn.redhat.com/errata/RHSA-2012-0144.html)
8. [48819](http://secunia.com/advisories/48819) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1267
- **State**: PUBLISHED
- **Published Date**: March 27, 2018 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 02:11 UTC
- **Reserved Date**: December 06, 2017 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Cloud Foundry Silk CNI plugin, versions prior to 0.2.0, contains an improper access control vulnerability. If the platform is configured with an application security group (ASG) that overlaps with the Silk overlay network, any applications can reach any other application on the network regardless of the configured routing policies.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.cloudfoundry.org/blog/cve-2018-1267/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0359, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0359
- **State**: PUBLISHED
- **Published Date**: January 19, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 12:19 UTC
- **Reserved Date**: January 18, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in frontpage.php in Uberghey CMS 0.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the setup_folder parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22098](http://www.securityfocus.com/bid/22098)
2. [ADV-2007-0230](http://www.vupen.com/english/advisories/2007/0230)
3. [uberghey-frontpage-file-include(31553)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31553)
4. [20070118 source verify: Uberghey CMS 0.3.1 RFI](http://www.attrition.org/pipermail/vim/2007-January/001247.html)
5. [3147](https://www.exploit-db.com/exploits/3147) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5634
- **State**: PUBLISHED
- **Published Date**: September 25, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 17:15 UTC
- **Reserved Date**: August 26, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
arch/arm/kvm/arm.c in the Linux kernel before 3.10 on the ARM platform, when KVM is used, allows host OS users to cause a denial of service (NULL pointer dereference, OOPS, and host OS crash) or possibly have unspecified other impact by omitting vCPU initialization before a KVM_GET_REG_LIST ioctl call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [61995](http://www.securityfocus.com/bid/61995)
2. [](https://github.com/torvalds/linux/commit/e8180dcaa8470ceca21109f143876fdcd9fe050a)
3. [[oss-security] 20130826 Re: CVE request: Linux Kernel: ARM: KVM: NULL pointer dereferences](http://www.openwall.com/lists/oss-security/2013/08/26/4)
4. [](https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.10.bz2)
5. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e8180dcaa8470ceca21109f143876fdcd9fe050a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4307, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4307 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4307
- **State**: PUBLISHED
- **Published Date**: October 28, 2019 at 23:36 UTC
- **Last Updated**: September 16, 2024 at 19:05 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 160987.
### Affected Products
**IBM - Security Guardium Big Data Intelligence**
Affected versions:
- 4 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/1096288)
2. [ibm-guardium-cve20194307-info-disc (160987)](https://exchange.xforce.ibmcloud.com/vulnerabilities/160987) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1716, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1716
- **State**: PUBLISHED
- **Published Date**: May 02, 2024 at 16:52 UTC
- **Last Updated**: August 01, 2024 at 18:48 UTC
- **Reserved Date**: February 21, 2024 at 17:20 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Admin Bar Remover plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_form() function in all versions up to, and including, 1.0.2.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to enable or disable the admin bar on the front-end of the site.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Affected Products
**litonice13 - Admin Bar Editor – Hide Toolbar by User Roles**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/dfbf2556-0509-4d8a-8949-494c6bc82ea1?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/admin-bar/trunk/Inc/Classes/AdminBarRemover.php#L81)
3. [](https://plugins.trac.wordpress.org/changeset/2955636/admin-bar/trunk)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9885, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9885 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9885
- **State**: PUBLISHED
- **Published Date**: August 06, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 14:02 UTC
- **Reserved Date**: June 24, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
Format string vulnerability in drivers/thermal/qpnp-adc-tm.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 devices allows attackers to gain privileges via a crafted application that provides format string specifiers in a name, aka Android internal bug 28769959 and Qualcomm internal bug CR562261.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-08-01.html)
2. [92219](http://www.securityfocus.com/bid/92219)
3. [](https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=a1d5a4cbd5aa8656bc23b40c7cc43941e10f89c3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5239, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5239
- **State**: PUBLISHED
- **Published Date**: October 12, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 19:41 UTC
- **Reserved Date**: October 11, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in eXpBlog 0.3.5 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the query string (PHP_SELF) in kalender.php or (2) the captcha_session_code parameter in pre_details.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1017028](http://securitytracker.com/id?1017028)
2. [22328](http://secunia.com/advisories/22328)
3. [20061009 eXpBlog <= 0.3.5 Cross Site Scripting Vulnerabilities](http://www.securityfocus.com/archive/1/448102/100/0/threaded)
4. [expblog-multiple-xss(29409)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29409)
5. [](http://www.expblog.de/board/viewtopic.php?t=317)
6. [ADV-2006-3973](http://www.vupen.com/english/advisories/2006/3973)
7. [20061009 eXpBlog <= 0.3.5 Cross Site Scripting](http://marc.info/?l=full-disclosure&m=116042862409660&w=2)
8. [20420](http://www.securityfocus.com/bid/20420) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12016
- **State**: REJECTED
- **Published Date**: June 01, 2020 at 14:55 UTC
- **Last Updated**: June 01, 2020 at 14:55 UTC
- **Reserved Date**: May 13, 2019 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32961, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32961 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32961
- **State**: PUBLISHED
- **Published Date**: April 01, 2022 at 22:17 UTC
- **Last Updated**: April 16, 2025 at 16:34 UTC
- **Reserved Date**: May 13, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
A getfile function in MDT AutoSave versions prior to v6.02.06 enables a user to supply an optional parameter, resulting in the processing of a request in a special manner. This can result in the execution of an unzip command and place a malicious .exe file in one of the locations the function looks for and get execution capabilities.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**MDT Software - MDT AutoSave**
Affected versions:
- unspecified (Status: affected)
**MDT Software - MDT AutoSave**
Affected versions:
- 7.00 (Status: affected)
**MDT Software - AutoSave for System Platform (A4SP)**
Affected versions:
- unspecified (Status: affected)
**MDT Software - A4SP**
Affected versions:
- 5.00 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-189-02)
### Credits
- Amir Preminger of Claroty Research reported these vulnerabilities to MDT Software. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28195
- **State**: PUBLISHED
- **Published Date**: April 06, 2021 at 05:02 UTC
- **Last Updated**: September 16, 2024 at 20:21 UTC
- **Reserved Date**: March 12, 2021 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
The Radius configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**ASUS - BMC firmware for ASMB9-iKVM**
Affected versions:
- 1.11.12 (Status: affected)
**ASUS - BMC firmware for RS720A-E9-RS24-E**
Affected versions:
- 1.10.3 (Status: affected)
**ASUS - BMC firmware for RS700A-E9-RS4**
Affected versions:
- 1.10.0 (Status: affected)
**ASUS - BMC firmware for RS700-E9-RS4**
Affected versions:
- 1.09 (Status: affected)
**ASUS - BMC firmware for ESC4000 G4X**
Affected versions:
- 1.11.6 (Status: affected)
**ASUS - BMC firmware for RS700-E9-RS12**
Affected versions:
- 1.11.5 (Status: affected)
**ASUS - BMC firmware for RS100-E10-PI2**
Affected versions:
- 1.13.6 (Status: affected)
**ASUS - BMC firmware for RS300-E10-PS4**
Affected versions:
- 1.13.6 (Status: affected)
**ASUS - BMC firmware for RS300-E10-RS4**
Affected versions:
- 1.13.6 (Status: affected)
**ASUS - BMC firmware for RS500A-E9-PS4**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for RS500A-E9-RS4**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for RS500A-E9 RS4**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for E700 G4**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for WS C422 PRO/SE**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for WS X299 PRO/SE**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for Z11PA-U12**
Affected versions:
- 1.15.1 (Status: affected)
**ASUS - BMC firmware for Z11PA-U12/10G-2S**
Affected versions:
- 1.15.1 (Status: affected)
**ASUS - BMC firmware for KNPA-U16**
Affected versions:
- 1.13.4 (Status: affected)
**ASUS - BMC firmware for ESC4000 DHD G4**
Affected versions:
- 1.13.7 (Status: affected)
**ASUS - BMC firmware for ESC4000 G4**
Affected versions:
- 1.15.2 (Status: affected)
**ASUS - BMC firmware for RS720Q-E9-RS24-S**
Affected versions:
- 1.15.0 (Status: affected)
**ASUS - BMC firmware for RS720Q-E9-RS8**
Affected versions:
- 1.15.0 (Status: affected)
**ASUS - BMC firmware for RS720Q-E9-RS8-S**
Affected versions:
- 1.15.0 (Status: affected)
**ASUS - BMC firmware for Z11PA-D8**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for Z11PA-D8C**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for RS720-E9-RS24-U**
Affected versions:
- 1.14.3 (Status: affected)
**ASUS - BMC firmware for RS720-E9-RS8-G**
Affected versions:
- 1.15.2 (Status: affected)
**ASUS - BMC firmware for RS500-E9-PS4**
Affected versions:
- 1.15.4 (Status: affected)
**ASUS - BMC firmware for Pro E800 G4**
Affected versions:
- 1.14.2 (Status: affected)
**ASUS - BMC firmware for RS500-E9-RS4**
Affected versions:
- 1.15.4 (Status: affected)
**ASUS - BMC firmware for RS500-E9-RS4-U**
Affected versions:
- 1.15.4 (Status: affected)
**ASUS - BMC firmware for RS520-E9-RS12-E**
Affected versions:
- 1.15.3 (Status: affected)
**ASUS - BMC firmware for RS520-E9-RS8**
Affected versions:
- 1.15.3 (Status: affected)
**ASUS - BMC firmware for ESC8000 G4**
Affected versions:
- 1.15.4 (Status: affected)
**ASUS - BMC firmware for ESC8000 G4/10G**
Affected versions:
- 1.15.4 (Status: affected)
**ASUS - BMC firmware for RS720-E9-RS12-E**
Affected versions:
- 1.15.2 (Status: affected)
**ASUS - BMC firmware for WS C621E SAGE**
Affected versions:
- 1.15.1 (Status: affected)
**ASUS - BMC firmware for RS500A-E10-PS4**
Affected versions:
- 1.15.2 (Status: affected)
**ASUS - BMC firmware for RS500A-E10-RS4**
Affected versions:
- 1.15.2 (Status: affected)
**ASUS - BMC firmware for RS700A-E9-RS12V2**
Affected versions:
- 1.15.1 (Status: affected)
**ASUS - BMC firmware for RS700A-E9-RS4V2**
Affected versions:
- 1.15.1 (Status: affected)
**ASUS - BMC firmware for RS720A-E9-RS12V2**
Affected versions:
- 1.15.2 (Status: affected)
**ASUS - BMC firmware for RS720A-E9-RS24V2**
Affected versions:
- 1.15.1 (Status: affected)
**ASUS - BMC firmware for Z11PR-D16**
Affected versions:
- 1.15.3 (Status: affected)
### References
1. [](https://www.asus.com/content/ASUS-Product-Security-Advisory/)
2. [](https://www.asus.com/tw/support/callus/)
3. [](https://www.twcert.org.tw/tw/cp-132-4565-59c97-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9326, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9326 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9326
- **State**: PUBLISHED
- **Published Date**: September 29, 2024 at 08:00 UTC
- **Last Updated**: September 30, 2024 at 19:38 UTC
- **Reserved Date**: September 28, 2024 at 13:34 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in PHPGurukul Online Shopping Portal 2.0. This vulnerability affects unknown code of the file /shopping/admin/index.php of the component Admin Panel. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**PHPGurukul - Online Shopping Portal**
Affected versions:
- 2.0 (Status: affected)
### References
1. [VDB-278830 | PHPGurukul Online Shopping Portal Admin Panel index.php sql injection](https://vuldb.com/?id.278830)
2. [VDB-278830 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.278830)
3. [Submit #414058 | PHPGurukul Online Shopping Portal Project 2.0 SQL Injection](https://vuldb.com/?submit.414058)
4. [](https://hackmd.io/@SeaWind/ryBv7CGCR)
5. [](https://phpgurukul.com/)
### Credits
- SeaWind (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39976
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 00:00 UTC
- **Last Updated**: October 15, 2024 at 17:56 UTC
- **Reserved Date**: August 08, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
log_blackbox.c in libqb before 2.0.8 allows a buffer overflow via long log messages because the header size is not considered.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ClusterLabs/libqb/pull/490)
2. [](https://github.com/ClusterLabs/libqb/commit/1bbaa929b77113532785c408dd1b41cd0521ffc8)
3. [](https://github.com/ClusterLabs/libqb/compare/v2.0.7...v2.0.8)
4. [FEDORA-2023-5a717dd33d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KECNF7LFBPE57XSBT6EM7ACVMIBP63WH/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25636, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25636 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25636
- **State**: PUBLISHED
- **Published Date**: February 19, 2024 at 19:42 UTC
- **Last Updated**: August 15, 2024 at 18:36 UTC
- **Reserved Date**: February 08, 2024 at 22:26 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Misskey is an open source, decentralized social media platform with ActivityPub support. Prior to version 2024.2.0, when fetching remote Activity Streams objects, Misskey doesn't check that the response from the remote server has a `Content-Type` header value of the Activity Streams media type, which allows a threat actor to upload a crafted Activity Streams document to a remote server and make a Misskey instance fetch it, if the remote server accepts arbitrary user uploads. The vulnerability allows a threat actor to impersonate and take over an account on a remote server that satisfies all of the following properties: allows the threat actor to register an account; accepts arbitrary user-uploaded documents and places them on the same domain as legitimate Activity Streams actors; and serves user-uploaded document in response to requests with an `Accept` header value of the Activity Streams media type. Version 2024.2.0 contains a patch for the issue.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**misskey-dev - misskey**
Affected versions:
- < 2024.2.0 (Status: affected)
### References
1. [https://github.com/misskey-dev/misskey/security/advisories/GHSA-qqrm-9grj-6v32](https://github.com/misskey-dev/misskey/security/advisories/GHSA-qqrm-9grj-6v32)
2. [https://github.com/misskey-dev/misskey/commit/9a70ce8f5ea9df00001894809f5ce7bc69b14c8a](https://github.com/misskey-dev/misskey/commit/9a70ce8f5ea9df00001894809f5ce7bc69b14c8a)
3. [https://github.com/misskey-dev/misskey/blob/2024.2.0-beta.10/packages/backend/src/core/activitypub/ApResolverService.ts#L69-L119](https://github.com/misskey-dev/misskey/blob/2024.2.0-beta.10/packages/backend/src/core/activitypub/ApResolverService.ts#L69-L119)
4. [https://github.com/misskey-dev/misskey/blob/2024.2.0-beta.10/packages/backend/src/core/activitypub/models/ApNoteService.ts#L112-L308](https://github.com/misskey-dev/misskey/blob/2024.2.0-beta.10/packages/backend/src/core/activitypub/models/ApNoteService.ts#L112-L308)
5. [https://github.com/misskey-dev/misskey/blob/2024.2.0-beta.10/packages/backend/src/server/api/endpoints/ap/show.ts#L125-L143](https://github.com/misskey-dev/misskey/blob/2024.2.0-beta.10/packages/backend/src/server/api/endpoints/ap/show.ts#L125-L143) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2331
- **State**: PUBLISHED
- **Published Date**: August 16, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:22 UTC
- **Reserved Date**: August 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ColdFusion MX 6.1 and 6.1 J2EE allows local users to bypass sandbox security restrictions and obtain sensitive information by using Java reflection methods to access trusted Java objects without using the CreateObject function or cfobject tag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.macromedia.com/devnet/security/security_zone/mpsb04-01.html)
2. [coldfusion-mx-sandbox-bypass(14984)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14984)
3. [9521](http://www.securityfocus.com/bid/9521)
4. [10743](http://secunia.com/advisories/10743/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40407
- **State**: PUBLISHED
- **Published Date**: September 29, 2022 at 13:20 UTC
- **Last Updated**: May 20, 2025 at 19:15 UTC
- **Reserved Date**: September 11, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A zip slip vulnerability in the file upload function of Chamilo v1.11 allows attackers to execute arbitrary code via a crafted Zip file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/chamilo/chamilo-lms)
2. [](https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-94-2022-09-06-High-impact-Moderate-risk-Authenticated-RCE-via-zipslip-attack-in-file-upload)
3. [](https://github.com/alexmackey/security-research/blob/main/chamilo/ChamiloRceViaZipSlip.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0701, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0701 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0701
- **State**: PUBLISHED
- **Published Date**: March 14, 2011 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 21:58 UTC
- **Reserved Date**: January 31, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
wp-admin/async-upload.php in the media uploader in WordPress before 3.0.5 allows remote authenticated users to read (1) draft posts or (2) private posts via a modified attachment_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2011-3746](http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057003.html)
2. [](http://codex.wordpress.org/Version_3.0.5)
3. [ADV-2011-0658](http://www.vupen.com/english/advisories/2011/0658)
4. [43729](http://secunia.com/advisories/43729)
5. [FEDORA-2011-3408](http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056412.html)
6. [46249](http://www.securityfocus.com/bid/46249)
7. [](http://www.wordpress.org/news/2011/02/wordpress-3-0-5/)
8. [[oss-security] 20110209 Re: CVE request: wordpress before 3.0.5](http://openwall.com/lists/oss-security/2011/02/09/13)
9. [FEDORA-2011-3738](http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056998.html)
10. [[oss-security] 20110209 CVE request: wordpress before 3.0.5](http://openwall.com/lists/oss-security/2011/02/08/7)
11. [ADV-2011-0721](http://www.vupen.com/english/advisories/2011/0721)
12. [DSA-2190](http://www.debian.org/security/2011/dsa-2190)
13. [](http://core.trac.wordpress.org/changeset/17393) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24647
- **State**: PUBLISHED
- **Published Date**: February 13, 2023 at 00:00 UTC
- **Last Updated**: March 21, 2025 at 18:05 UTC
- **Reserved Date**: January 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Food Ordering System v2.0 was discovered to contain a SQL injection vulnerability via the email parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/Food-Ordering-System-v2.0/SQLi) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0199, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0199 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0199
- **State**: PUBLISHED
- **Published Date**: April 14, 2010 at 15:44 UTC
- **Last Updated**: August 07, 2024 at 00:37 UTC
- **Reserved Date**: January 06, 2010 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0202, and CVE-2010-0203.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2010-0873](http://www.vupen.com/english/advisories/2010/0873)
2. [oval:org.mitre.oval:def:6900](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6900)
3. [TA10-103C](http://www.us-cert.gov/cas/techalerts/TA10-103C.html)
4. [39329](http://www.securityfocus.com/bid/39329)
5. [](http://www.adobe.com/support/security/bulletins/apsb10-09.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0594, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0594 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0594
- **State**: PUBLISHED
- **Published Date**: May 04, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:21 UTC
- **Reserved Date**: February 28, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the Netinfo Setup Tool (NeST) allows local users to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#354486](http://www.kb.cert.org/vuls/id/354486)
2. [TA05-136A](http://www.us-cert.gov/cas/techalerts/TA05-136A.html)
3. [APPLE-SA-2005-05-03](http://lists.apple.com/archives/security-announce/2005/May/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16980
- **State**: REJECTED
- **Published Date**: October 30, 2019 at 15:36 UTC
- **Last Updated**: October 30, 2019 at 15:36 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36120, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36120 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36120
- **State**: PUBLISHED
- **Published Date**: April 14, 2021 at 13:50 UTC
- **Last Updated**: August 04, 2024 at 17:16 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow in the "sixel_encoder_encode_bytes" function of Libsixel v1.8.6 allows attackers to cause a Denial of Service (DoS).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/saitoha/libsixel/issues/143) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1813, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1813
- **State**: PUBLISHED
- **Published Date**: June 09, 2011 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 22:37 UTC
- **Reserved Date**: April 20, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Google Chrome before 12.0.742.91 does not properly implement the framework for extensions, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44829](http://secunia.com/advisories/44829)
2. [chrome-extension-framenwork-ce(67896)](https://exchange.xforce.ibmcloud.com/vulnerabilities/67896)
3. [](http://code.google.com/p/chromium/issues/detail?id=78516)
4. [](http://googlechromereleases.blogspot.com/2011/06/chrome-stable-release.html)
5. [72783](http://osvdb.org/72783)
6. [oval:org.mitre.oval:def:14481](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14481)
7. [48129](http://www.securityfocus.com/bid/48129) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26919
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 15:59 UTC
- **Last Updated**: May 04, 2025 at 08:59 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
usb: ulpi: Fix debugfs directory leak
The ULPI per-device debugfs root is named after the ulpi device's
parent, but ulpi_unregister_interface tries to remove a debugfs
directory named after the ulpi device itself. This results in the
directory sticking around and preventing subsequent (deferred) probes
from succeeding. Change the directory name to match the ulpi device.
### Affected Products
**Linux - Linux**
Affected versions:
- bd0a0a024f2a41e7cc8eadb9862f82c45884b69c (Status: affected)
- bd0a0a024f2a41e7cc8eadb9862f82c45884b69c (Status: affected)
- bd0a0a024f2a41e7cc8eadb9862f82c45884b69c (Status: affected)
- bd0a0a024f2a41e7cc8eadb9862f82c45884b69c (Status: affected)
**Linux - Linux**
Affected versions:
- 5.18 (Status: affected)
- 0 (Status: unaffected)
- 6.1.79 (Status: unaffected)
- 6.6.18 (Status: unaffected)
- 6.7.6 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/d31b886ed6a5095214062ee4fb55037eb930adb6)
2. [](https://git.kernel.org/stable/c/330d22aba17a4d30a56f007d0f51291d7e00862b)
3. [](https://git.kernel.org/stable/c/33713945cc92ea9c4a1a9479d5c1b7acb7fc4df3)
4. [](https://git.kernel.org/stable/c/3caf2b2ad7334ef35f55b95f3e1b138c6f77b368) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47369, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47369
- **State**: PUBLISHED
- **Published Date**: November 09, 2023 at 00:00 UTC
- **Last Updated**: September 03, 2024 at 19:00 UTC
- **Reserved Date**: November 06, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The leakage of channel access token in best_training_member Line 13.6.1 allows remote attackers to send malicious notifications.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/syz913/CVE-reports/blob/main/best_training_member.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4973, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4973
- **State**: PUBLISHED
- **Published Date**: November 01, 2011 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 23:51 UTC
- **Reserved Date**: November 01, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the search feature in Campsite 3.4.0 allows remote attackers to inject arbitrary web script or HTML via the f_search_keywords parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [40589](http://secunia.com/advisories/40589) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7462
- **State**: PUBLISHED
- **Published Date**: October 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:47 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Fashion Story: Neon 90's (aka com.teamlava.fashionstory39) application 1.5.6.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#642073](http://www.kb.cert.org/vuls/id/642073)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3540, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3540 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3540
- **State**: PUBLISHED
- **Published Date**: July 07, 2023 at 15:00 UTC
- **Last Updated**: October 23, 2024 at 20:40 UTC
- **Reserved Date**: July 07, 2023 at 12:01 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in SimplePHPscripts NewsLetter Script PHP 2.4. Affected is an unknown function of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-233292.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SimplePHPscripts - NewsLetter Script PHP**
Affected versions:
- 2.4 (Status: affected)
### References
1. [](https://vuldb.com/?id.233292)
2. [](https://vuldb.com/?ctiid.233292)
### Credits
- skalvin (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20165
- **State**: PUBLISHED
- **Published Date**: January 22, 2025 at 16:21 UTC
- **Last Updated**: February 18, 2025 at 19:39 UTC
- **Reserved Date**: October 10, 2024 at 19:15 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition.
This vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Cisco - Cisco BroadWorks**
Affected versions:
- 22.0 (Status: affected)
- 23.0 (Status: affected)
- RI.2021.02 (Status: affected)
- 23.0 ap380391 (Status: affected)
- 23.0 ap380396 (Status: affected)
- RI.2021.08 (Status: affected)
- RI.2021.09 (Status: affected)
- RI.2021.10 (Status: affected)
- RI.2021.11 (Status: affected)
- RI.2021.12 (Status: affected)
- 23.0 ap382281 (Status: affected)
- 22.0 ap382358 (Status: affected)
- 23.0 ap382358 (Status: affected)
- RI.2022.02 (Status: affected)
- RI.2022.03 (Status: affected)
- 23.0 ap373151 (Status: affected)
- 23.0 ap371527 (Status: affected)
- 22.0 ap353530 (Status: affected)
- 22.0 ap348633 (Status: affected)
- 22.0 ap347741 (Status: affected)
- 22.0 ap352375 (Status: affected)
- 22.0 ap353911 (Status: affected)
- 22.0 ap339206 (Status: affected)
- 22.0 ap351637 (Status: affected)
- 22.0 ap351160 (Status: affected)
- 22.0 ap339395 (Status: affected)
- 23.0 ap372548 (Status: affected)
- 23.0 ap373098 (Status: affected)
- 22.0 ap358889 (Status: affected)
- 22.0 ap359119 (Status: affected)
- 22.0 ap357087 (Status: affected)
- 22.0 ap357506 (Status: affected)
- 22.0 ap361590 (Status: affected)
- 22.0 ap356317 (Status: affected)
- 22.0 ap358076 (Status: affected)
- 22.0 ap355095 (Status: affected)
- 22.0 ap352969 (Status: affected)
- 22.0 ap356705 (Status: affected)
- 23.0 ap375383 (Status: affected)
- 23.0 ap375465 (Status: affected)
- 23.0 ap375435 (Status: affected)
- 22.0 ap375601 (Status: affected)
- 22.0 ap375345 (Status: affected)
- 22.0 ap349872 (Status: affected)
- 22.0 ap381419 (Status: affected)
- 23.0 ap380771 (Status: affected)
- 22.0 ap367805 (Status: affected)
- 22.0 ap365223 (Status: affected)
- 22.0 ap368419 (Status: affected)
- 22.0 ap360116 (Status: affected)
- 22.0 ap366298 (Status: affected)
- 22.0 ap368125 (Status: affected)
- 22.0 ap364925 (Status: affected)
- 22.0 ap368497 (Status: affected)
- 22.0 ap364168 (Status: affected)
- 22.0 ap367732 (Status: affected)
- 23.0 ap380041 (Status: affected)
- 22.0 ap382183 (Status: affected)
- 22.0 ap382057 (Status: affected)
- 23.0 ap381271 (Status: affected)
- 23.0 ap381243 (Status: affected)
- 23.0 ap380691 (Status: affected)
- 23.0 ap375345 (Status: affected)
- 23.0 ap375601 (Status: affected)
- 22.0 ap377577 (Status: affected)
- 23.0 ap379795 (Status: affected)
- 23.0 ap382195 (Status: affected)
- 23.0 ap376661 (Status: affected)
- RI.2022.06 (Status: affected)
- RI.2022.05 (Status: affected)
- RI.2022.04 (Status: affected)
- 23.0 ap376010 (Status: affected)
- 23.0 ap382487 (Status: affected)
- 23.0 ap383569 (Status: affected)
- 23.0 ap383519 (Status: affected)
- 23.0 ap383560 (Status: affected)
- 22.0 ap383754 (Status: affected)
- 23.0 ap383710 (Status: affected)
- RI.2022.08 (Status: affected)
- 22.0 ap366290 (Status: affected)
- 22.0 ap372504 (Status: affected)
- 22.0 ap366807 (Status: affected)
- 22.0 ap373151 (Status: affected)
- 22.0 ap366181 (Status: affected)
- 22.0 ap366207 (Status: affected)
- 22.0 ap371527 (Status: affected)
- 23.0 ap367434 (Status: affected)
- 22.0 ap365170 (Status: affected)
- 22.0 ap372620 (Status: affected)
- 22.0 ap354474 (Status: affected)
- 22.0 ap372243 (Status: affected)
- 22.0 ap366268 (Status: affected)
- 22.0 ap366373 (Status: affected)
- 22.0 ap379780 (Status: affected)
- 23.0 ap351263 (Status: affected)
- 22.0 ap364384 (Status: affected)
- 22.0 ap365775 (Status: affected)
- 22.0 ap361308 (Status: affected)
- 22.0 ap351263 (Status: affected)
- 22.0 ap364369 (Status: affected)
- 22.0 ap364879 (Status: affected)
- 22.0 ap365341 (Status: affected)
- 22.0 ap360568 (Status: affected)
- 22.0 ap366916 (Status: affected)
- 22.0 ap363363 (Status: affected)
- 22.0 ap363366 (Status: affected)
- 22.0 ap374507 (Status: affected)
- 22.0 ap374557 (Status: affected)
- 22.0 ap375533 (Status: affected)
- 22.0 ap373283 (Status: affected)
- 22.0 ap372845 (Status: affected)
- 22.0 ap373684 (Status: affected)
- 22.0 ap373817 (Status: affected)
- 22.0 ap367794 (Status: affected)
- 22.0 ap369778 (Status: affected)
- 22.0 ap368180 (Status: affected)
- 22.0 ap369774 (Status: affected)
- 22.0 ap366898 (Status: affected)
- 22.0 ap366882 (Status: affected)
- 22.0 ap359646 (Status: affected)
- 22.0 ap353184 (Status: affected)
- 22.0 ap358871 (Status: affected)
- 22.0 ap348431 (Status: affected)
- 22.0 ap358861 (Status: affected)
- 22.0 ap348100 (Status: affected)
- 22.0 ap359283 (Status: affected)
- 22.0 ap356817 (Status: affected)
- 22.0 ap356375 (Status: affected)
- 22.0 ap373015 (Status: affected)
- 22.0 ap374946 (Status: affected)
- 22.0 ap374269 (Status: affected)
- 22.0 ap373434 (Status: affected)
- 22.0 ap373003 (Status: affected)
- 22.0 ap372234 (Status: affected)
- 22.0 ap365239 (Status: affected)
- 22.0 ap369286 (Status: affected)
- 22.0 ap367782 (Status: affected)
- 22.0 ap359991 (Status: affected)
- 22.0 ap359729 (Status: affected)
- 22.0 ap358357 (Status: affected)
- 22.0 ap360306 (Status: affected)
- 22.0 ap359433 (Status: affected)
- 22.0 ap359972 (Status: affected)
- 22.0 ap365889 (Status: affected)
- 22.0 ap369931 (Status: affected)
- 22.0 ap353426 (Status: affected)
- 22.0 ap360244 (Status: affected)
- 22.0 ap360966 (Status: affected)
- 22.0 ap367874 (Status: affected)
- 22.0 ap376710 (Status: affected)
- 22.0 ap377079 (Status: affected)
- 22.0 ap356186 (Status: affected)
- 23.0 ap377147 (Status: affected)
- 22.0 ap380691 (Status: affected)
- 22.0 ap361695 (Status: affected)
- 23.0 ap383943 (Status: affected)
- 23.0 ap383955 (Status: affected)
- RI.2022.09 (Status: affected)
- 23.0 ap383838 (Status: affected)
- 23.0 ap384023 (Status: affected)
- 23.0 ap384025 (Status: affected)
- 23.0 ap383797 (Status: affected)
- 22.0 ap383797 (Status: affected)
- 23.0 ap384127 (Status: affected)
- 23.0 ap384015 (Status: affected)
- RI.2022.10 (Status: affected)
- 22.0 ap384211 (Status: affected)
- 23.0 ap384211 (Status: affected)
- 23.0 ap383717 (Status: affected)
- 23.0 ap384185 (Status: affected)
- 23.0 ap384173 (Status: affected)
- 23.0 ap383815 (Status: affected)
- 23.0 ap384245 (Status: affected)
- 22.0 ap383514 (Status: affected)
- 22.0 ap360201 (Status: affected)
- 22.0 ap353676 (Status: affected)
- 23.0 ap377120 (Status: affected)
- 22.0 ap374339 (Status: affected)
- 22.0 ap355070 (Status: affected)
- 22.0 ap374330 (Status: affected)
- 22.0 ap375089 (Status: affected)
- 23.0 ap368445 (Status: affected)
- 23.0 ap372994 (Status: affected)
- 23.0 ap369219 (Status: affected)
- 23.0 ap369693 (Status: affected)
- 22.0 ap369219 (Status: affected)
- 23.0 ap381725 (Status: affected)
- 22.0 ap370636 (Status: affected)
- 23.0 ap376521 (Status: affected)
- 22.0 ap371262 (Status: affected)
- 22.0 ap382434 (Status: affected)
- 22.0 ap355027 (Status: affected)
- 23.0 ap379049 (Status: affected)
- 22.0 ap361054 (Status: affected)
- 22.0 ap369738 (Status: affected)
- 23.0 ap375634 (Status: affected)
- 22.0 ap369433 (Status: affected)
- 22.0 ap377680 (Status: affected)
- 22.0 ap357047 (Status: affected)
- 22.0 ap377727 (Status: affected)
- 22.0 ap377147 (Status: affected)
- 22.0 ap377908 (Status: affected)
- 23.0 ap367874 (Status: affected)
- 22.0 ap366375 (Status: affected)
- 22.0 ap379847 (Status: affected)
- 22.0 ap358059 (Status: affected)
- 23.0 ap373924 (Status: affected)
- 23.0 ap383597 (Status: affected)
- 22.0 ap365727 (Status: affected)
- 22.0 ap374530 (Status: affected)
- 22.0 ap360912 (Status: affected)
- 23.0 ap373018 (Status: affected)
- 22.0 ap378509 (Status: affected)
- 23.0 ap376485 (Status: affected)
- 22.0 ap371043 (Status: affected)
- 22.0 ap378603 (Status: affected)
- 22.0 ap372657 (Status: affected)
- 22.0 ap363846 (Status: affected)
- 22.0 ap376041 (Status: affected)
- 22.0 ap372488 (Status: affected)
- 22.0 ap359145 (Status: affected)
- 23.0 ap368461 (Status: affected)
- 22.0 ap378966 (Status: affected)
- 23.0 ap376602 (Status: affected)
- 22.0 ap356603 (Status: affected)
- 23.0 ap373257 (Status: affected)
- 23.0 ap376668 (Status: affected)
- 22.0 ap381810 (Status: affected)
- 23.0 ap375533 (Status: affected)
- 22.0 ap364278 (Status: affected)
- 23.0 ap380817 (Status: affected)
- 23.0 ap374295 (Status: affected)
- 22.0 ap381725 (Status: affected)
- 23.0 ap380537 (Status: affected)
- 22.0 ap377398 (Status: affected)
- 22.0 ap370817 (Status: affected)
- 22.0 ap374818 (Status: affected)
- 23.0 ap380042 (Status: affected)
- 23.0 ap374475 (Status: affected)
- 22.0 ap373644 (Status: affected)
- 22.0 ap366330 (Status: affected)
- 22.0 ap361696 (Status: affected)
- 23.0 ap377755 (Status: affected)
- 22.0 ap373813 (Status: affected)
- 22.0 ap375343 (Status: affected)
- 22.0 ap379374 (Status: affected)
- 23.0 ap374031 (Status: affected)
- 22.0 ap377900 (Status: affected)
- 22.0 ap360931 (Status: affected)
- 22.0 ap362831 (Status: affected)
- 22.0 ap367461 (Status: affected)
- 22.0 ap354764 (Status: affected)
- 22.0 ap352325 (Status: affected)
- 23.0 ap372091 (Status: affected)
- 23.0 ap370911 (Status: affected)
- 22.0 ap363770 (Status: affected)
- 22.0 ap379487 (Status: affected)
- 23.0 ap380180 (Status: affected)
- 23.0 ap367969 (Status: affected)
- 23.0 ap380697 (Status: affected)
- 22.0 ap363372 (Status: affected)
- 22.0 ap353490 (Status: affected)
- 23.0 ap373271 (Status: affected)
- 22.0 ap356848 (Status: affected)
- 22.0 ap373918 (Status: affected)
- 22.0 ap382158 (Status: affected)
- 22.0 ap364598 (Status: affected)
- 23.0 ap381584 (Status: affected)
- 23.0 ap379888 (Status: affected)
- 22.0 ap356512 (Status: affected)
- 22.0 ap379098 (Status: affected)
- 22.0 ap376620 (Status: affected)
- 23.0 ap367998 (Status: affected)
- 23.0 ap366348 (Status: affected)
- 22.0 ap376614 (Status: affected)
- 23.0 ap382824 (Status: affected)
- 23.0 ap376984 (Status: affected)
- 23.0 ap366677 (Status: affected)
- 23.0 ap381523 (Status: affected)
- 22.0 ap383569 (Status: affected)
- 22.0 ap382524 (Status: affected)
- 22.0 ap379016 (Status: affected)
- 22.0 ap363584 (Status: affected)
- 22.0 ap358399 (Status: affected)
- 22.0 ap383335 (Status: affected)
- 23.0 ap374145 (Status: affected)
- 22.0 ap374295 (Status: affected)
- 23.0 ap376509 (Status: affected)
- 22.0 ap354785 (Status: affected)
- 23.0 ap381091 (Status: affected)
- 23.0 ap380512 (Status: affected)
- 22.0 ap355286 (Status: affected)
- 22.0 ap368887 (Status: affected)
- 22.0 ap383560 (Status: affected)
- 23.0 ap382977 (Status: affected)
- 23.0 ap368180 (Status: affected)
- 22.0 ap352516 (Status: affected)
- 22.0 ap350176 (Status: affected)
- 23.0 ap366373 (Status: affected)
- 23.0 ap375038 (Status: affected)
- 23.0 ap373102 (Status: affected)
- 23.0 ap378965 (Status: affected)
- 23.0 ap378080 (Status: affected)
- 22.0 ap377566 (Status: affected)
- 22.0 ap359589 (Status: affected)
- 23.0 ap380167 (Status: affected)
- 22.0 ap372338 (Status: affected)
- 22.0 ap361445 (Status: affected)
- 22.0 ap354784 (Status: affected)
- 22.0 ap356706 (Status: affected)
- 22.0 ap378140 (Status: affected)
- 23.0 ap378585 (Status: affected)
- 22.0 ap356458 (Status: affected)
- 22.0 ap368216 (Status: affected)
- 22.0 ap367675 (Status: affected)
- 22.0 ap368978 (Status: affected)
- 23.0 ap374330 (Status: affected)
- 22.0 ap355775 (Status: affected)
- 23.0 ap372338 (Status: affected)
- 22.0 ap380629 (Status: affected)
- 23.0 ap376087 (Status: affected)
- 22.0 ap367207 (Status: affected)
- 22.0 ap366346 (Status: affected)
- 22.0 ap376356 (Status: affected)
- 22.0 ap375383 (Status: affected)
- 22.0 ap373336 (Status: affected)
- 23.0 ap378863 (Status: affected)
- 22.0 ap352178 (Status: affected)
- 23.0 ap363366 (Status: affected)
- 22.0 ap351973 (Status: affected)
- 22.0 ap366261 (Status: affected)
- 22.0 ap354027 (Status: affected)
- 23.0 ap368706 (Status: affected)
- 22.0 ap364781 (Status: affected)
- 23.0 ap362771 (Status: affected)
- 23.0 ap360317 (Status: affected)
- 22.0 ap380282 (Status: affected)
- 22.0 ap356434 (Status: affected)
- 23.0 ap380239 (Status: affected)
- 22.0 ap365730 (Status: affected)
- 23.0 ap381270 (Status: affected)
- 22.0 ap355825 (Status: affected)
- 22.0 ap361974 (Status: affected)
- 22.0 ap371155 (Status: affected)
- 22.0 ap377757 (Status: affected)
- 22.0 ap361598 (Status: affected)
- 22.0 ap383168 (Status: affected)
- 23.0 ap377908 (Status: affected)
- 22.0 ap370103 (Status: affected)
- 22.0 ap381091 (Status: affected)
- 23.0 ap382945 (Status: affected)
- 23.0 ap377779 (Status: affected)
- 22.0 ap346307 (Status: affected)
- 23.0 ap365239 (Status: affected)
- 22.0 ap371313 (Status: affected)
- 23.0 ap371771 (Status: affected)
- 23.0 ap373452 (Status: affected)
- 23.0 ap375865 (Status: affected)
- 22.0 ap374714 (Status: affected)
- 22.0 ap376179 (Status: affected)
- 22.0 ap362001 (Status: affected)
- 22.0 ap378426 (Status: affected)
- 23.0 ap369748 (Status: affected)
- 23.0 ap383002 (Status: affected)
- 22.0 ap371030 (Status: affected)
- 22.0 ap370459 (Status: affected)
- 23.0 ap372708 (Status: affected)
- 22.0 ap382488 (Status: affected)
- 22.0 ap368326 (Status: affected)
- 23.0 ap370465 (Status: affected)
- 22.0 ap355000 (Status: affected)
- 22.0 ap355922 (Status: affected)
- 23.0 ap369454 (Status: affected)
- 22.0 ap364922 (Status: affected)
- 22.0 ap365167 (Status: affected)
- 22.0 ap374475 (Status: affected)
- 23.0 ap367675 (Status: affected)
- 22.0 ap379874 (Status: affected)
- 22.0 ap366677 (Status: affected)
- 22.0 ap366972 (Status: affected)
- 22.0 ap372100 (Status: affected)
- 23.0 ap373434 (Status: affected)
- 22.0 ap356164 (Status: affected)
- 23.0 ap372757 (Status: affected)
- 22.0 ap376531 (Status: affected)
- 23.0 ap377412 (Status: affected)
- 22.0 ap365232 (Status: affected)
- 22.0 ap348945 (Status: affected)
- 22.0 ap352703 (Status: affected)
- 22.0 ap364670 (Status: affected)
- 23.0 ap370103 (Status: affected)
- 23.0 ap370884 (Status: affected)
- 23.0 ap366261 (Status: affected)
- 22.0 ap367969 (Status: affected)
- 23.0 ap378865 (Status: affected)
- 22.0 ap371436 (Status: affected)
- 22.0 ap375685 (Status: affected)
- 23.0 ap380161 (Status: affected)
- 22.0 ap366490 (Status: affected)
- 23.0 ap380737 (Status: affected)
- 23.0 ap370952 (Status: affected)
- 22.0 ap374895 (Status: affected)
- 22.0 ap366656 (Status: affected)
- 22.0 ap379548 (Status: affected)
- 23.0 ap378471 (Status: affected)
- 23.0 ap379780 (Status: affected)
- 22.0 ap378865 (Status: affected)
- 22.0 ap354964 (Status: affected)
- 22.0 ap371656 (Status: affected)
- 22.0 ap381594 (Status: affected)
- 23.0 ap381118 (Status: affected)
- 22.0 ap368087 (Status: affected)
- 22.0 ap363234 (Status: affected)
- 22.0 ap362713 (Status: affected)
- 23.0 ap372163 (Status: affected)
- 23.0 ap379833 (Status: affected)
- 22.0 ap377494 (Status: affected)
- 23.0 ap367986 (Status: affected)
- 22.0 ap362610 (Status: affected)
- 22.0 ap378882 (Status: affected)
- 23.0 ap370544 (Status: affected)
- 22.0 ap379008 (Status: affected)
- 22.0 ap382945 (Status: affected)
- 22.0 ap362088 (Status: affected)
- 22.0 ap383002 (Status: affected)
- 23.0 ap370627 (Status: affected)
- 22.0 ap362150 (Status: affected)
- 22.0 ap371295 (Status: affected)
- 22.0 ap350179 (Status: affected)
- 22.0 ap371467 (Status: affected)
- 23.0 ap369150 (Status: affected)
- 22.0 ap365449 (Status: affected)
- 23.0 ap375264 (Status: affected)
- 23.0 ap379694 (Status: affected)
- 22.0 ap381609 (Status: affected)
- 22.0 ap353915 (Status: affected)
- 22.0 ap358234 (Status: affected)
- 22.0 ap363146 (Status: affected)
- 22.0 ap369934 (Status: affected)
- 23.0 ap366184 (Status: affected)
- 22.0 ap371516 (Status: affected)
- 22.0 ap365800 (Status: affected)
- 22.0 ap356960 (Status: affected)
- 22.0 ap343927 (Status: affected)
- 22.0 ap361999 (Status: affected)
- 22.0 ap373954 (Status: affected)
- 23.0 ap379852 (Status: affected)
- 22.0 ap375655 (Status: affected)
- 23.0 ap382857 (Status: affected)
- 22.0 ap380396 (Status: affected)
- 22.0 ap381569 (Status: affected)
- 22.0 ap369693 (Status: affected)
- 22.0 ap358971 (Status: affected)
- 23.0 ap366290 (Status: affected)
- 22.0 ap378258 (Status: affected)
- 22.0 ap380818 (Status: affected)
- 22.0 ap359227 (Status: affected)
- 22.0 ap358578 (Status: affected)
- 23.0 ap371050 (Status: affected)
- 23.0 ap383247 (Status: affected)
- 22.0 ap354413 (Status: affected)
- 22.0 ap382053 (Status: affected)
- 23.0 ap367513 (Status: affected)
- 22.0 ap374803 (Status: affected)
- 23.0 ap383536 (Status: affected)
- 22.0 ap360600 (Status: affected)
- 22.0 ap373046 (Status: affected)
- 23.0 ap372641 (Status: affected)
- 22.0 ap379396 (Status: affected)
- 22.0 ap377307 (Status: affected)
- 23.0 ap379438 (Status: affected)
- 23.0 ap379397 (Status: affected)
- 22.0 ap365372 (Status: affected)
- 22.0 ap364158 (Status: affected)
- 23.0 ap380751 (Status: affected)
- 22.0 ap361533 (Status: affected)
- 22.0 ap371049 (Status: affected)
- 22.0 ap352372 (Status: affected)
- 23.0 ap378258 (Status: affected)
- 23.0 ap383064 (Status: affected)
- 22.0 ap362619 (Status: affected)
- 23.0 ap379772 (Status: affected)
- 22.0 ap379934 (Status: affected)
- 23.0 ap365801 (Status: affected)
- 23.0 ap366701 (Status: affected)
- 22.0 ap381125 (Status: affected)
- 22.0 ap357471 (Status: affected)
- 22.0 ap362298 (Status: affected)
- 22.0 ap353839 (Status: affected)
- 22.0 ap383309 (Status: affected)
- 23.0 ap375133 (Status: affected)
- 22.0 ap353168 (Status: affected)
- 23.0 ap369132 (Status: affected)
- 23.0 ap371583 (Status: affected)
- 22.0 ap373564 (Status: affected)
- 23.0 ap366375 (Status: affected)
- 22.0 ap363815 (Status: affected)
- 23.0 ap365170 (Status: affected)
- 22.0 ap365400 (Status: affected)
- 22.0 ap371613 (Status: affected)
- 22.0 ap373950 (Status: affected)
- 23.0 ap352969 (Status: affected)
- 23.0 ap379046 (Status: affected)
- 22.0 ap380737 (Status: affected)
- 22.0 ap359029 (Status: affected)
- 23.0 ap367325 (Status: affected)
- 22.0 ap359765 (Status: affected)
- 23.0 ap378953 (Status: affected)
- 22.0 ap357632 (Status: affected)
- 22.0 ap361883 (Status: affected)
- 23.0 ap379191 (Status: affected)
- 22.0 ap364628 (Status: affected)
- 22.0 ap369667 (Status: affected)
- 22.0 ap352962 (Status: affected)
- 22.0 ap349384 (Status: affected)
- 22.0 ap367325 (Status: affected)
- 22.0 ap368604 (Status: affected)
- 22.0 ap370186 (Status: affected)
- 23.0 ap371030 (Status: affected)
- 23.0 ap376041 (Status: affected)
- 23.0 ap380841 (Status: affected)
- 22.0 ap372075 (Status: affected)
- 22.0 ap370138 (Status: affected)
- 22.0 ap371587 (Status: affected)
- 23.0 ap366298 (Status: affected)
- 22.0 ap380239 (Status: affected)
- 23.0 ap377566 (Status: affected)
- 22.0 ap380739 (Status: affected)
- 23.0 ap371961 (Status: affected)
- 22.0 ap367524 (Status: affected)
- 22.0 ap376416 (Status: affected)
- 22.0 ap378599 (Status: affected)
- 22.0 ap381732 (Status: affected)
- 22.0 ap354750 (Status: affected)
- 22.0 ap375060 (Status: affected)
- 23.0 ap383168 (Status: affected)
- 22.0 ap351855 (Status: affected)
- 22.0 ap382487 (Status: affected)
- 22.0 ap370801 (Status: affected)
- 23.0 ap379548 (Status: affected)
- 22.0 ap361534 (Status: affected)
- 22.0 ap352330 (Status: affected)
- 22.0 ap369132 (Status: affected)
- 22.0 ap375354 (Status: affected)
- 22.0 ap363144 (Status: affected)
- 22.0 ap361580 (Status: affected)
- 23.0 ap381348 (Status: affected)
- 22.0 ap383710 (Status: affected)
- 22.0 ap378924 (Status: affected)
- 23.0 ap363729 (Status: affected)
- 22.0 ap363430 (Status: affected)
- 22.0 ap375308 (Status: affected)
- 23.0 ap376704 (Status: affected)
- 23.0 ap374971 (Status: affected)
- 22.0 ap368510 (Status: affected)
- 23.0 ap364699 (Status: affected)
- 23.0 ap374557 (Status: affected)
- 23.0 ap372351 (Status: affected)
- 22.0 ap364651 (Status: affected)
- 22.0 ap373777 (Status: affected)
- 22.0 ap370680 (Status: affected)
- 22.0 ap380143 (Status: affected)
- 23.0 ap367396 (Status: affected)
- 22.0 ap364797 (Status: affected)
- 23.0 ap372100 (Status: affected)
- 23.0 ap367453 (Status: affected)
- 22.0 ap373664 (Status: affected)
- 22.0 ap373122 (Status: affected)
- 22.0 ap370911 (Status: affected)
- 22.0 ap354090 (Status: affected)
- 23.0 ap382039 (Status: affected)
- 22.0 ap372643 (Status: affected)
- 23.0 ap381072 (Status: affected)
- 22.0 ap358019 (Status: affected)
- 23.0 ap381410 (Status: affected)
- 22.0 ap378863 (Status: affected)
- 22.0 ap364898 (Status: affected)
- 22.0 ap353509 (Status: affected)
- 23.0 ap378153 (Status: affected)
- 23.0 ap383754 (Status: affected)
- 23.0 ap382158 (Status: affected)
- 22.0 ap374414 (Status: affected)
- 23.0 ap380936 (Status: affected)
- 22.0 ap377068 (Status: affected)
- 22.0 ap366013 (Status: affected)
- 22.0 ap357791 (Status: affected)
- 22.0 ap380167 (Status: affected)
- 22.0 ap379465 (Status: affected)
- 22.0 ap382386 (Status: affected)
- 22.0 ap369607 (Status: affected)
- 23.0 ap372845 (Status: affected)
- 22.0 ap373914 (Status: affected)
- 23.0 ap380783 (Status: affected)
- 22.0 ap378999 (Status: affected)
- 23.0 ap382386 (Status: affected)
- 23.0 ap369501 (Status: affected)
- 22.0 ap364199 (Status: affected)
- 22.0 ap370269 (Status: affected)
- 23.0 ap377496 (Status: affected)
- 23.0 ap368218 (Status: affected)
- 22.0 ap380180 (Status: affected)
- 22.0 ap372708 (Status: affected)
- 23.0 ap379934 (Status: affected)
- 23.0 ap376426 (Status: affected)
- 22.0 ap360325 (Status: affected)
- 22.0 ap363392 (Status: affected)
- 23.0 ap377523 (Status: affected)
- 22.0 ap380128 (Status: affected)
- 22.0 ap355343 (Status: affected)
- 22.0 ap381781 (Status: affected)
- 22.0 ap368695 (Status: affected)
- 23.0 ap378436 (Status: affected)
- 22.0 ap365632 (Status: affected)
- 23.0 ap382057 (Status: affected)
- 22.0 ap379524 (Status: affected)
- 23.0 ap372706 (Status: affected)
- 22.0 ap357775 (Status: affected)
- 23.0 ap364559 (Status: affected)
- 22.0 ap371583 (Status: affected)
- 23.0 ap376541 (Status: affected)
- 22.0 ap366184 (Status: affected)
- 22.0 ap363729 (Status: affected)
- 23.0 ap356141 (Status: affected)
- 22.0 ap358893 (Status: affected)
- 22.0 ap356538 (Status: affected)
- 22.0 ap356503 (Status: affected)
- 22.0 ap360904 (Status: affected)
- 22.0 ap374460 (Status: affected)
- 22.0 ap371437 (Status: affected)
- 23.0 ap370620 (Status: affected)
- 22.0 ap371050 (Status: affected)
- 22.0 ap366117 (Status: affected)
- 23.0 ap366117 (Status: affected)
- 22.0 ap375865 (Status: affected)
- 23.0 ap367340 (Status: affected)
- 23.0 ap378880 (Status: affected)
- 22.0 ap376523 (Status: affected)
- 22.0 ap380787 (Status: affected)
- 22.0 ap375509 (Status: affected)
- 22.0 ap350217 (Status: affected)
- 22.0 ap380854 (Status: affected)
- 23.0 ap376252 (Status: affected)
- 22.0 ap354180 (Status: affected)
- 22.0 ap342836 (Status: affected)
- 23.0 ap370361 (Status: affected)
- 22.0 ap363759 (Status: affected)
- 23.0 ap374506 (Status: affected)
- 23.0 ap377384 (Status: affected)
- 23.0 ap365775 (Status: affected)
- 23.0 ap373914 (Status: affected)
- 23.0 ap382192 (Status: affected)
- 23.0 ap383573 (Status: affected)
- 23.0 ap380045 (Status: affected)
- 22.0 ap366301 (Status: affected)
- 22.0 ap370615 (Status: affected)
- 22.0 ap355285 (Status: affected)
- 22.0 ap380626 (Status: affected)
- 23.0 ap380282 (Status: affected)
- 22.0 ap359911 (Status: affected)
- 22.0 ap377149 (Status: affected)
- 23.0 ap356256 (Status: affected)
- 22.0 ap358563 (Status: affected)
- 22.0 ap370177 (Status: affected)
- 23.0 ap363128 (Status: affected)
- 23.0 ap371295 (Status: affected)
- 22.0 ap355555 (Status: affected)
- 23.0 ap381961 (Status: affected)
- 22.0 ap370948 (Status: affected)
- 22.0 ap359470 (Status: affected)
- 23.0 ap373820 (Status: affected)
- 23.0 ap368419 (Status: affected)
- 22.0 ap371495 (Status: affected)
- 23.0 ap380854 (Status: affected)
- 23.0 ap378862 (Status: affected)
- 22.0 ap356390 (Status: affected)
- 22.0 ap363596 (Status: affected)
- 22.0 ap378970 (Status: affected)
- 23.0 ap378391 (Status: affected)
- 23.0 ap375343 (Status: affected)
- 23.0 ap369302 (Status: affected)
- 23.0 ap368632 (Status: affected)
- 22.0 ap366295 (Status: affected)
- 23.0 ap379847 (Status: affected)
- 23.0 ap374649 (Status: affected)
- 22.0 ap353903 (Status: affected)
- 22.0 ap371470 (Status: affected)
- 22.0 ap357859 (Status: affected)
- 22.0 ap374265 (Status: affected)
- 22.0 ap374649 (Status: affected)
- 22.0 ap350573 (Status: affected)
- 22.0 ap383519 (Status: affected)
- 22.0 ap380697 (Status: affected)
- 22.0 ap357718 (Status: affected)
- 22.0 ap367453 (Status: affected)
- 22.0 ap376429 (Status: affected)
- 22.0 ap355812 (Status: affected)
- 22.0 ap355699 (Status: affected)
- 23.0 ap349850 (Status: affected)
- 22.0 ap362378 (Status: affected)
- 22.0 ap370884 (Status: affected)
- 22.0 ap368603 (Status: affected)
- 22.0 ap370180 (Status: affected)
- 22.0 ap355905 (Status: affected)
- 23.0 ap368032 (Status: affected)
- 22.0 ap356584 (Status: affected)
- 23.0 ap364932 (Status: affected)
- 22.0 ap360228 (Status: affected)
- 23.0 ap378599 (Status: affected)
- 22.0 ap355443 (Status: affected)
- 23.0 ap370196 (Status: affected)
- 23.0 ap379012 (Status: affected)
- 23.0 ap367726 (Status: affected)
- 22.0 ap368706 (Status: affected)
- 22.0 ap381080 (Status: affected)
- 23.0 ap373817 (Status: affected)
- 23.0 ap377802 (Status: affected)
- 22.0 ap373018 (Status: affected)
- 22.0 ap376508 (Status: affected)
- 22.0 ap356330 (Status: affected)
- 22.0 ap381523 (Status: affected)
- 22.0 ap357768 (Status: affected)
- 23.0 ap375646 (Status: affected)
- 22.0 ap383367 (Status: affected)
- 22.0 ap351700 (Status: affected)
- 22.0 ap358132 (Status: affected)
- 22.0 ap374274 (Status: affected)
- 23.0 ap369434 (Status: affected)
- 22.0 ap380914 (Status: affected)
- 22.0 ap380535 (Status: affected)
- 22.0 ap355091 (Status: affected)
- 22.0 ap358345 (Status: affected)
- 23.0 ap368987 (Status: affected)
- 22.0 ap358442 (Status: affected)
- 22.0 ap362553 (Status: affected)
- 22.0 ap372354 (Status: affected)
- 23.0 ap366803 (Status: affected)
- 23.0 ap379874 (Status: affected)
- 22.0 ap355080 (Status: affected)
- 22.0 ap357395 (Status: affected)
- 23.0 ap367358 (Status: affected)
- 22.0 ap375936 (Status: affected)
- 22.0 ap372854 (Status: affected)
- 22.0 ap365659 (Status: affected)
- 22.0 ap352205 (Status: affected)
- 23.0 ap376523 (Status: affected)
- 22.0 ap359465 (Status: affected)
- 23.0 ap374414 (Status: affected)
- 22.0 ap383150 (Status: affected)
- 22.0 ap366649 (Status: affected)
- 22.0 ap369929 (Status: affected)
- 23.0 ap372016 (Status: affected)
- 22.0 ap376656 (Status: affected)
- 23.0 ap366827 (Status: affected)
- 22.0 ap370620 (Status: affected)
- 23.0 ap373303 (Status: affected)
- 23.0 ap375060 (Status: affected)
- 22.0 ap353358 (Status: affected)
- 22.0 ap360459 (Status: affected)
- 23.0 ap382709 (Status: affected)
- 23.0 ap374312 (Status: affected)
- 23.0 ap366181 (Status: affected)
- 22.0 ap369668 (Status: affected)
- 22.0 ap375924 (Status: affected)
- 23.0 ap369607 (Status: affected)
- 22.0 ap374230 (Status: affected)
- 22.0 ap378581 (Status: affected)
- 22.0 ap380841 (Status: affected)
- 23.0 ap375908 (Status: affected)
- 22.0 ap353360 (Status: affected)
- 22.0 ap362373 (Status: affected)
- 23.0 ap381548 (Status: affected)
- 22.0 ap364745 (Status: affected)
- 22.0 ap359049 (Status: affected)
- 23.0 ap367805 (Status: affected)
- 22.0 ap367291 (Status: affected)
- 22.0 ap365633 (Status: affected)
- 23.0 ap383170 (Status: affected)
- 22.0 ap383134 (Status: affected)
- 23.0 ap374946 (Status: affected)
- 23.0 ap377757 (Status: affected)
- 22.0 ap353372 (Status: affected)
- 23.0 ap379853 (Status: affected)
- 23.0 ap370817 (Status: affected)
- 22.0 ap352109 (Status: affected)
- 23.0 ap371821 (Status: affected)
- 22.0 ap378585 (Status: affected)
- 22.0 ap371911 (Status: affected)
- 22.0 ap372963 (Status: affected)
- 22.0 ap365146 (Status: affected)
- 23.0 ap378966 (Status: affected)
- 23.0 ap375069 (Status: affected)
- 22.0 ap373480 (Status: affected)
- 22.0 ap364500 (Status: affected)
- 22.0 ap361835 (Status: affected)
- 23.0 ap367678 (Status: affected)
- 22.0 ap354070 (Status: affected)
- 22.0 ap366306 (Status: affected)
- 22.0 ap353681 (Status: affected)
- 22.0 ap370828 (Status: affected)
- 22.0 ap354313 (Status: affected)
- 22.0 ap364471 (Status: affected)
- 22.0 ap379848 (Status: affected)
- 22.0 ap374428 (Status: affected)
- 22.0 ap368327 (Status: affected)
- 22.0 ap382432 (Status: affected)
- 22.0 ap360317 (Status: affected)
- 23.0 ap368327 (Status: affected)
- 22.0 ap356799 (Status: affected)
- 22.0 ap380532 (Status: affected)
- 22.0 ap377120 (Status: affected)
- 22.0 ap360740 (Status: affected)
- 22.0 ap370627 (Status: affected)
- 22.0 ap381518 (Status: affected)
- 22.0 ap382240 (Status: affected)
- 22.0 ap374995 (Status: affected)
- 23.0 ap376531 (Status: affected)
- 22.0 ap370659 (Status: affected)
- 23.0 ap365730 (Status: affected)
- 22.0 ap380099 (Status: affected)
- 23.0 ap381569 (Status: affected)
- 22.0 ap379972 (Status: affected)
- 23.0 ap375509 (Status: affected)
- 23.0 ap366747 (Status: affected)
- 22.0 ap352932 (Status: affected)
- 23.0 ap372177 (Status: affected)
- 22.0 ap365798 (Status: affected)
- 22.0 ap382192 (Status: affected)
- 22.0 ap359156 (Status: affected)
- 23.0 ap379008 (Status: affected)
- 23.0 ap369934 (Status: affected)
- 22.0 ap358995 (Status: affected)
- 23.0 ap382240 (Status: affected)
- 23.0 ap379972 (Status: affected)
- 22.0 ap359748 (Status: affected)
- 22.0 ap364621 (Status: affected)
- 23.0 ap380626 (Status: affected)
- 22.0 ap378153 (Status: affected)
- 23.0 ap373539 (Status: affected)
- 22.0 ap370696 (Status: affected)
- 23.0 ap370737 (Status: affected)
- 23.0 ap378401 (Status: affected)
- 22.0 ap376298 (Status: affected)
- 22.0 ap367109 (Status: affected)
- 23.0 ap382252 (Status: affected)
- 23.0 ap379389 (Status: affected)
- 22.0 ap357413 (Status: affected)
- 22.0 ap372371 (Status: affected)
- 22.0 ap374114 (Status: affected)
- 22.0 ap345032 (Status: affected)
- 22.0 ap355003 (Status: affected)
- 22.0 ap382095 (Status: affected)
- 22.0 ap365115 (Status: affected)
- 23.0 ap373046 (Status: affected)
- 23.0 ap367291 (Status: affected)
- 22.0 ap379772 (Status: affected)
- 23.0 ap382846 (Status: affected)
- 22.0 ap365970 (Status: affected)
- 22.0 ap363597 (Status: affected)
- 22.0 ap376286 (Status: affected)
- 22.0 ap362490 (Status: affected)
- 22.0 ap367367 (Status: affected)
- 22.0 ap372177 (Status: affected)
- 23.0 ap372246 (Status: affected)
- 22.0 ap372994 (Status: affected)
- 23.0 ap369788 (Status: affected)
- 22.0 ap377578 (Status: affected)
- 23.0 ap378425 (Status: affected)
- 22.0 ap371805 (Status: affected)
- 22.0 ap362637 (Status: affected)
- 22.0 ap368137 (Status: affected)
- 23.0 ap369863 (Status: affected)
- 22.0 ap372390 (Status: affected)
- 22.0 ap380771 (Status: affected)
- 22.0 ap368461 (Status: affected)
- 23.0 ap378545 (Status: affected)
- 23.0 ap378165 (Status: affected)
- 22.0 ap379191 (Status: affected)
- 22.0 ap364634 (Status: affected)
- 22.0 ap355916 (Status: affected)
- 22.0 ap370645 (Status: affected)
- 23.0 ap377644 (Status: affected)
- 22.0 ap377779 (Status: affected)
- 23.0 ap369926 (Status: affected)
- 23.0 ap381809 (Status: affected)
- 22.0 ap380401 (Status: affected)
- 23.0 ap375734 (Status: affected)
- 22.0 ap376661 (Status: affected)
- 22.0 ap382954 (Status: affected)
- 22.0 ap381029 (Status: affected)
- 23.0 ap361533 (Status: affected)
- 22.0 ap380117 (Status: affected)
- 22.0 ap378440 (Status: affected)
- 23.0 ap376298 (Status: affected)
- 23.0 ap364925 (Status: affected)
- 23.0 ap376671 (Status: affected)
- 22.0 ap374822 (Status: affected)
- 22.0 ap366221 (Status: affected)
- 22.0 ap370275 (Status: affected)
- 23.0 ap374230 (Status: affected)
- 23.0 ap380535 (Status: affected)
- 22.0 ap373098 (Status: affected)
- 23.0 ap373664 (Status: affected)
- 23.0 ap368153 (Status: affected)
- 22.0 ap354354 (Status: affected)
- 23.0 ap372380 (Status: affected)
- 23.0 ap366916 (Status: affected)
- 22.0 ap381410 (Status: affected)
- 23.0 ap382435 (Status: affected)
- 22.0 ap380486 (Status: affected)
- 22.0 ap361854 (Status: affected)
- 22.0 ap352928 (Status: affected)
- 22.0 ap382977 (Status: affected)
- 23.0 ap367207 (Status: affected)
- 23.0 ap367524 (Status: affected)
- 22.0 ap370389 (Status: affected)
- 23.0 ap368913 (Status: affected)
- 22.0 ap363332 (Status: affected)
- 23.0 ap374507 (Status: affected)
- 22.0 ap380936 (Status: affected)
- 23.0 ap369922 (Status: affected)
- 22.0 ap367338 (Status: affected)
- 22.0 ap377109 (Status: affected)
- 22.0 ap350405 (Status: affected)
- 23.0 ap376429 (Status: affected)
- 23.0 ap365223 (Status: affected)
- 22.0 ap365662 (Status: affected)
- 22.0 ap354927 (Status: affected)
- 23.0 ap373564 (Status: affected)
- 22.0 ap377802 (Status: affected)
- 22.0 ap360817 (Status: affected)
- 22.0 ap364256 (Status: affected)
- 23.0 ap371836 (Status: affected)
- 22.0 ap355365 (Status: affected)
- 22.0 ap368026 (Status: affected)
- 22.0 ap372956 (Status: affected)
- 22.0 ap381723 (Status: affected)
- 23.0 ap373336 (Status: affected)
- 22.0 ap370160 (Status: affected)
- 23.0 ap377329 (Status: affected)
- 22.0 ap372043 (Status: affected)
- 23.0 ap366972 (Status: affected)
- 22.0 ap358454 (Status: affected)
- 23.0 ap380998 (Status: affected)
- 22.0 ap376181 (Status: affected)
- 22.0 ap376685 (Status: affected)
- 23.0 ap374254 (Status: affected)
- 23.0 ap368087 (Status: affected)
- 22.0 ap375091 (Status: affected)
- 22.0 ap368660 (Status: affected)
- 23.0 ap366294 (Status: affected)
- 22.0 ap352493 (Status: affected)
- 22.0 ap380751 (Status: affected)
- 22.0 ap358582 (Status: affected)
- 23.0 ap378882 (Status: affected)
- 23.0 ap375036 (Status: affected)
- 22.0 ap363845 (Status: affected)
- 22.0 ap378400 (Status: affected)
- 22.0 ap362163 (Status: affected)
- 22.0 ap366646 (Status: affected)
- 22.0 ap352795 (Status: affected)
- 22.0 ap361456 (Status: affected)
- 23.0 ap378332 (Status: affected)
- 22.0 ap356978 (Status: affected)
- 22.0 ap367513 (Status: affected)
- 22.0 ap365920 (Status: affected)
- 23.0 ap371049 (Status: affected)
- 23.0 ap374356 (Status: affected)
- 22.0 ap372152 (Status: affected)
- 22.0 ap378405 (Status: affected)
- 22.0 ap369571 (Status: affected)
- 22.0 ap373257 (Status: affected)
- 23.0 ap366486 (Status: affected)
- 23.0 ap374895 (Status: affected)
- 23.0 ap382053 (Status: affected)
- 23.0 ap376179 (Status: affected)
- 23.0 ap366731 (Status: affected)
- 22.0 ap374356 (Status: affected)
- 23.0 ap372674 (Status: affected)
- 22.0 ap357083 (Status: affected)
- 22.0 ap365556 (Status: affected)
- 22.0 ap358887 (Status: affected)
- 23.0 ap371033 (Status: affected)
- 22.0 ap372024 (Status: affected)
- 22.0 ap381809 (Status: affected)
- 22.0 ap352383 (Status: affected)
- 22.0 ap368754 (Status: affected)
- 23.0 ap382412 (Status: affected)
- 22.0 ap365125 (Status: affected)
- 22.0 ap375465 (Status: affected)
- 23.0 ap372243 (Status: affected)
- 22.0 ap371871 (Status: affected)
- 23.0 ap345032 (Status: affected)
- 23.0 ap377109 (Status: affected)
- 22.0 ap360586 (Status: affected)
- 22.0 ap352728 (Status: affected)
- 22.0 ap357400 (Status: affected)
- 22.0 ap373102 (Status: affected)
- 22.0 ap376630 (Status: affected)
- 22.0 ap371966 (Status: affected)
- 22.0 ap354448 (Status: affected)
- 22.0 ap375634 (Status: affected)
- 23.0 ap376410 (Status: affected)
- 23.0 ap366170 (Status: affected)
- 22.0 ap377523 (Status: affected)
- 22.0 ap368015 (Status: affected)
- 22.0 ap359103 (Status: affected)
- 23.0 ap376218 (Status: affected)
- 23.0 ap375291 (Status: affected)
- 23.0 ap374956 (Status: affected)
- 23.0 ap366211 (Status: affected)
- 22.0 ap376485 (Status: affected)
- 22.0 ap380528 (Status: affected)
- 23.0 ap372974 (Status: affected)
- 23.0 ap369929 (Status: affected)
- 23.0 ap369738 (Status: affected)
- 23.0 ap374995 (Status: affected)
- 22.0 ap357161 (Status: affected)
- 22.0 ap362771 (Status: affected)
- 22.0 ap372690 (Status: affected)
- 22.0 ap375038 (Status: affected)
- 23.0 ap368695 (Status: affected)
- 22.0 ap359112 (Status: affected)
- 23.0 ap359103 (Status: affected)
- 22.0 ap379853 (Status: affected)
- 23.0 ap375688 (Status: affected)
- 22.0 ap365815 (Status: affected)
- 23.0 ap378924 (Status: affected)
- 22.0 ap348078 (Status: affected)
- 22.0 ap371999 (Status: affected)
- 23.0 ap373644 (Status: affected)
- 22.0 ap354557 (Status: affected)
- 22.0 ap366118 (Status: affected)
- 22.0 ap367434 (Status: affected)
- 22.0 ap352402 (Status: affected)
- 23.0 ap375254 (Status: affected)
- 23.0 ap368216 (Status: affected)
- 22.0 ap372757 (Status: affected)
- 22.0 ap380817 (Status: affected)
- 23.0 ap363392 (Status: affected)
- 22.0 ap376010 (Status: affected)
- 22.0 ap373722 (Status: affected)
- 22.0 ap368422 (Status: affected)
- 23.0 ap366330 (Status: affected)
- 23.0 ap354354 (Status: affected)
- 23.0 ap351530 (Status: affected)
- 23.0 ap378134 (Status: affected)
- 23.0 ap381732 (Status: affected)
- 23.0 ap383706 (Status: affected)
- 22.0 ap381072 (Status: affected)
- 22.0 ap356474 (Status: affected)
- 23.0 ap374530 (Status: affected)
- 22.0 ap375734 (Status: affected)
- 22.0 ap361833 (Status: affected)
- 22.0 ap363867 (Status: affected)
- 22.0 ap358092 (Status: affected)
- 22.0 ap374145 (Status: affected)
- 22.0 ap362247 (Status: affected)
- 22.0 ap374838 (Status: affected)
- 22.0 ap373622 (Status: affected)
- 22.0 ap375435 (Status: affected)
- 22.0 ap353499 (Status: affected)
- 23.0 ap376670 (Status: affected)
- 23.0 ap371760 (Status: affected)
- 23.0 ap376656 (Status: affected)
- 22.0 ap371895 (Status: affected)
- 23.0 ap369106 (Status: affected)
- 23.0 ap370926 (Status: affected)
- 22.0 ap382412 (Status: affected)
- 23.0 ap381367 (Status: affected)
- 22.0 ap382195 (Status: affected)
- 22.0 ap373899 (Status: affected)
- 22.0 ap353549 (Status: affected)
- 22.0 ap377755 (Status: affected)
- 22.0 ap360362 (Status: affected)
- 23.0 ap380739 (Status: affected)
- 22.0 ap356000 (Status: affected)
- 22.0 ap370217 (Status: affected)
- 23.0 ap381526 (Status: affected)
- 23.0 ap379531 (Status: affected)
- 22.0 ap370952 (Status: affected)
- 23.0 ap378400 (Status: affected)
- 22.0 ap369106 (Status: affected)
- 22.0 ap378401 (Status: affected)
- 22.0 ap369724 (Status: affected)
- 22.0 ap367396 (Status: affected)
- 23.0 ap376736 (Status: affected)
- 22.0 ap377107 (Status: affected)
- 22.0 ap358493 (Status: affected)
- 22.0 ap363705 (Status: affected)
- 23.0 ap375936 (Status: affected)
- 22.0 ap352766 (Status: affected)
- 22.0 ap355616 (Status: affected)
- 22.0 ap361520 (Status: affected)
- 22.0 ap356140 (Status: affected)
- 23.0 ap374274 (Status: affected)
- 22.0 ap358246 (Status: affected)
- 22.0 ap360495 (Status: affected)
- 22.0 ap362328 (Status: affected)
- 22.0 ap364473 (Status: affected)
- 22.0 ap370737 (Status: affected)
- 22.0 ap381584 (Status: affected)
- 22.0 ap362848 (Status: affected)
- 23.0 ap367794 (Status: affected)
- 23.0 ap372043 (Status: affected)
- 22.0 ap354355 (Status: affected)
- 22.0 ap370667 (Status: affected)
- 22.0 ap353418 (Status: affected)
- 23.0 ap380128 (Status: affected)
- 23.0 ap368137 (Status: affected)
- 22.0 ap371361 (Status: affected)
- 23.0 ap379565 (Status: affected)
- 22.0 ap367517 (Status: affected)
- 23.0 ap365995 (Status: affected)
- 23.0 ap383309 (Status: affected)
- 22.0 ap382824 (Status: affected)
- 22.0 ap380391 (Status: affected)
- 23.0 ap372854 (Status: affected)
- 23.0 ap369724 (Status: affected)
- 23.0 ap365798 (Status: affected)
- 22.0 ap365639 (Status: affected)
- 22.0 ap357571 (Status: affected)
- 22.0 ap370675 (Status: affected)
- 23.0 ap370828 (Status: affected)
- 22.0 ap359106 (Status: affected)
- 22.0 ap356141 (Status: affected)
- 23.0 ap369257 (Status: affected)
- 23.0 ap366744 (Status: affected)
- 23.0 ap367646 (Status: affected)
- 22.0 ap353975 (Status: affected)
- 23.0 ap380528 (Status: affected)
- 23.0 ap363265 (Status: affected)
- 23.0 ap381498 (Status: affected)
- 22.0 ap370349 (Status: affected)
- 22.0 ap363265 (Status: affected)
- 22.0 ap352421 (Status: affected)
- 22.0 ap372016 (Status: affected)
- 23.0 ap381322 (Status: affected)
- 22.0 ap375688 (Status: affected)
- 22.0 ap369454 (Status: affected)
- 23.0 ap370680 (Status: affected)
- 22.0 ap362182 (Status: affected)
- 22.0 ap365801 (Status: affected)
- 23.0 ap378999 (Status: affected)
- 23.0 ap375685 (Status: affected)
- 22.0 ap353577 (Status: affected)
- 22.0 ap359649 (Status: affected)
- 22.0 ap352972 (Status: affected)
- 22.0 ap373117 (Status: affected)
- 22.0 ap381270 (Status: affected)
- 22.0 ap355385 (Status: affected)
- 22.0 ap375254 (Status: affected)
- 22.0 ap352320 (Status: affected)
- 22.0 ap372706 (Status: affected)
- 23.0 ap375003 (Status: affected)
- 23.0 ap373899 (Status: affected)
- 23.0 ap379016 (Status: affected)
- 23.0 ap382717 (Status: affected)
- 22.0 ap357378 (Status: affected)
- 22.0 ap349850 (Status: affected)
- 22.0 ap353162 (Status: affected)
- 22.0 ap360265 (Status: affected)
- 22.0 ap363831 (Status: affected)
- 22.0 ap359851 (Status: affected)
- 22.0 ap357645 (Status: affected)
- 23.0 ap377079 (Status: affected)
- 23.0 ap382095 (Status: affected)
- 22.0 ap379833 (Status: affected)
- 23.0 ap379085 (Status: affected)
- 23.0 ap376416 (Status: affected)
- 23.0 ap372643 (Status: affected)
- 22.0 ap359829 (Status: affected)
- 22.0 ap361820 (Status: affected)
- 22.0 ap372072 (Status: affected)
- 22.0 ap370113 (Status: affected)
- 22.0 ap355894 (Status: affected)
- 22.0 ap378332 (Status: affected)
- 22.0 ap355638 (Status: affected)
- 22.0 ap379597 (Status: affected)
- 22.0 ap382435 (Status: affected)
- 23.0 ap373918 (Status: affected)
- 22.0 ap378436 (Status: affected)
- 22.0 ap366731 (Status: affected)
- 22.0 ap353520 (Status: affected)
- 23.0 ap377581 (Status: affected)
- 22.0 ap383372 (Status: affected)
- 22.0 ap353384 (Status: affected)
- 23.0 ap378140 (Status: affected)
- 22.0 ap372932 (Status: affected)
- 23.0 ap374822 (Status: affected)
- 22.0 ap381367 (Status: affected)
- 22.0 ap380371 (Status: affected)
- 23.0 ap374265 (Status: affected)
- 23.0 ap375018 (Status: affected)
- 22.0 ap361834 (Status: affected)
- 23.0 ap378068 (Status: affected)
- 22.0 ap377329 (Status: affected)
- 22.0 ap383170 (Status: affected)
- 23.0 ap373950 (Status: affected)
- 22.0 ap364020 (Status: affected)
- 22.0 ap363218 (Status: affected)
- 23.0 ap365390 (Status: affected)
- 22.0 ap376668 (Status: affected)
- 22.0 ap363145 (Status: affected)
- 23.0 ap374324 (Status: affected)
- 23.0 ap382198 (Status: affected)
- 23.0 ap366882 (Status: affected)
- 22.0 ap370545 (Status: affected)
- 23.0 ap382463 (Status: affected)
- 23.0 ap370801 (Status: affected)
- 23.0 ap368604 (Status: affected)
- 23.0 ap378603 (Status: affected)
- 23.0 ap373777 (Status: affected)
- 22.0 ap359111 (Status: affected)
- 23.0 ap382434 (Status: affected)
- 23.0 ap371436 (Status: affected)
- 22.0 ap378953 (Status: affected)
- 22.0 ap357769 (Status: affected)
- 22.0 ap359525 (Status: affected)
- 22.0 ap372750 (Status: affected)
- 23.0 ap364667 (Status: affected)
- 22.0 ap366171 (Status: affected)
- 22.0 ap377126 (Status: affected)
- 22.0 ap364805 (Status: affected)
- 22.0 ap380608 (Status: affected)
- 22.0 ap373111 (Status: affected)
- 22.0 ap379389 (Status: affected)
- 23.0 ap371516 (Status: affected)
- 23.0 ap378259 (Status: affected)
- 23.0 ap369674 (Status: affected)
- 23.0 ap374803 (Status: affected)
- 22.0 ap355673 (Status: affected)
- 22.0 ap377412 (Status: affected)
- 22.0 ap375266 (Status: affected)
- 22.0 ap374971 (Status: affected)
- 22.0 ap376670 (Status: affected)
- 22.0 ap362799 (Status: affected)
- 23.0 ap372152 (Status: affected)
- 22.0 ap374144 (Status: affected)
- 22.0 ap358137 (Status: affected)
- 22.0 ap383562 (Status: affected)
- 22.0 ap379852 (Status: affected)
- 22.0 ap365685 (Status: affected)
- 22.0 ap369788 (Status: affected)
- 23.0 ap375304 (Status: affected)
- 22.0 ap374031 (Status: affected)
- 23.0 ap364295 (Status: affected)
- 23.0 ap378440 (Status: affected)
- 22.0 ap353841 (Status: affected)
- 22.0 ap365379 (Status: affected)
- 23.0 ap368510 (Status: affected)
- 22.0 ap375321 (Status: affected)
- 22.0 ap376602 (Status: affected)
- 22.0 ap380537 (Status: affected)
- 22.0 ap358707 (Status: affected)
- 23.0 ap369931 (Status: affected)
- 22.0 ap361153 (Status: affected)
- 22.0 ap365173 (Status: affected)
- 22.0 ap364667 (Status: affected)
- 22.0 ap370358 (Status: affected)
- 22.0 ap354098 (Status: affected)
- 22.0 ap372974 (Status: affected)
- 23.0 ap365115 (Status: affected)
- 22.0 ap362548 (Status: affected)
- 22.0 ap376410 (Status: affected)
- 23.0 ap366346 (Status: affected)
- 22.0 ap355774 (Status: affected)
- 23.0 ap383365 (Status: affected)
- 23.0 ap382300 (Status: affected)
- 23.0 ap374838 (Status: affected)
- 22.0 ap354769 (Status: affected)
- 23.0 ap383547 (Status: affected)
- 22.0 ap361560 (Status: affected)
- 23.0 ap373647 (Status: affected)
- 23.0 ap369206 (Status: affected)
- 22.0 ap354793 (Status: affected)
- 22.0 ap374334 (Status: affected)
- 23.0 ap371495 (Status: affected)
- 22.0 ap371771 (Status: affected)
- 22.0 ap362825 (Status: affected)
- 22.0 ap376984 (Status: affected)
- 23.0 ap372033 (Status: affected)
- 22.0 ap356328 (Status: affected)
- 22.0 ap379531 (Status: affected)
- 22.0 ap374092 (Status: affected)
- 23.0 ap365889 (Status: affected)
- 22.0 ap354936 (Status: affected)
- 22.0 ap355672 (Status: affected)
- 22.0 ap361666 (Status: affected)
- 23.0 ap380187 (Status: affected)
- 22.0 ap348472 (Status: affected)
- 22.0 ap370654 (Status: affected)
- 23.0 ap373283 (Status: affected)
- 23.0 ap380371 (Status: affected)
- 22.0 ap375036 (Status: affected)
- 22.0 ap379694 (Status: affected)
- 23.0 ap360007 (Status: affected)
- 22.0 ap377480 (Status: affected)
- 23.0 ap369227 (Status: affected)
- 22.0 ap379795 (Status: affected)
- 23.0 ap371775 (Status: affected)
- 23.0 ap373954 (Status: affected)
- 23.0 ap371437 (Status: affected)
- 23.0 ap382954 (Status: affected)
- 22.0 ap343616 (Status: affected)
- 23.0 ap381609 (Status: affected)
- 22.0 ap378823 (Status: affected)
- 22.0 ap355674 (Status: affected)
- 22.0 ap365545 (Status: affected)
- 23.0 ap366807 (Status: affected)
- 22.0 ap375018 (Status: affected)
- 23.0 ap374339 (Status: affected)
- 22.0 ap381418 (Status: affected)
- 23.0 ap378218 (Status: affected)
- 23.0 ap379080 (Status: affected)
- 22.0 ap375743 (Status: affected)
- 22.0 ap369501 (Status: affected)
- 22.0 ap356271 (Status: affected)
- 22.0 ap366348 (Status: affected)
- 22.0 ap370544 (Status: affected)
- 22.0 ap380512 (Status: affected)
- 23.0 ap379848 (Status: affected)
- 22.0 ap365995 (Status: affected)
- 22.0 ap361101 (Status: affected)
- 23.0 ap381418 (Status: affected)
- 22.0 ap378471 (Status: affected)
- 22.0 ap371775 (Status: affected)
- 22.0 ap356256 (Status: affected)
- 22.0 ap380161 (Status: affected)
- 23.0 ap352962 (Status: affected)
- 22.0 ap364860 (Status: affected)
- 22.0 ap382252 (Status: affected)
- 23.0 ap374588 (Status: affected)
- 23.0 ap372504 (Status: affected)
- 23.0 ap377494 (Status: affected)
- 22.0 ap365390 (Status: affected)
- 23.0 ap366880 (Status: affected)
- 22.0 ap357670 (Status: affected)
- 22.0 ap359974 (Status: affected)
- 23.0 ap367109 (Status: affected)
- 22.0 ap365601 (Status: affected)
- 22.0 ap359644 (Status: affected)
- 22.0 ap356161 (Status: affected)
- 23.0 ap379487 (Status: affected)
- 22.0 ap364291 (Status: affected)
- 22.0 ap371804 (Status: affected)
- 23.0 ap376614 (Status: affected)
- 23.0 ap374093 (Status: affected)
- 22.0 ap376513 (Status: affected)
- 23.0 ap371043 (Status: affected)
- 23.0 ap375655 (Status: affected)
- 23.0 ap381419 (Status: affected)
- 22.0 ap377496 (Status: affected)
- 22.0 ap381498 (Status: affected)
- 23.0 ap367367 (Status: affected)
- 22.0 ap367340 (Status: affected)
- 22.0 ap353357 (Status: affected)
- 22.0 ap379165 (Status: affected)
- 22.0 ap376426 (Status: affected)
- 22.0 ap378259 (Status: affected)
- 22.0 ap364761 (Status: affected)
- 22.0 ap378880 (Status: affected)
- 22.0 ap370258 (Status: affected)
- 22.0 ap359252 (Status: affected)
- 22.0 ap376218 (Status: affected)
- 22.0 ap364223 (Status: affected)
- 22.0 ap351250 (Status: affected)
- 22.0 ap383706 (Status: affected)
- 23.0 ap380143 (Status: affected)
- 23.0 ap366221 (Status: affected)
- 22.0 ap371821 (Status: affected)
- 22.0 ap373820 (Status: affected)
- 22.0 ap354921 (Status: affected)
- 23.0 ap377149 (Status: affected)
- 22.0 ap360960 (Status: affected)
- 22.0 ap380041 (Status: affected)
- 22.0 ap365597 (Status: affected)
- 22.0 ap376373 (Status: affected)
- 23.0 ap375321 (Status: affected)
- 23.0 ap377799 (Status: affected)
- 23.0 ap375743 (Status: affected)
- 22.0 ap382198 (Status: affected)
- 22.0 ap375646 (Status: affected)
- 23.0 ap377578 (Status: affected)
- 22.0 ap353701 (Status: affected)
- 22.0 ap376147 (Status: affected)
- 23.0 ap379098 (Status: affected)
- 22.0 ap382849 (Status: affected)
- 23.0 ap373212 (Status: affected)
- 23.0 ap370193 (Status: affected)
- 23.0 ap380099 (Status: affected)
- 23.0 ap366306 (Status: affected)
- 22.0 ap381118 (Status: affected)
- 23.0 ap383515 (Status: affected)
- 23.0 ap376620 (Status: affected)
- 22.0 ap354646 (Status: affected)
- 22.0 ap352896 (Status: affected)
- 22.0 ap358034 (Status: affected)
- 23.0 ap373111 (Status: affected)
- 23.0 ap370075 (Status: affected)
- 23.0 ap379396 (Status: affected)
- 22.0 ap363213 (Status: affected)
- 22.0 ap352515 (Status: affected)
- 22.0 ap365584 (Status: affected)
- 22.0 ap363521 (Status: affected)
- 23.0 ap373684 (Status: affected)
- 22.0 ap380187 (Status: affected)
- 22.0 ap369173 (Status: affected)
- 23.0 ap372932 (Status: affected)
- 22.0 ap364699 (Status: affected)
- 22.0 ap371836 (Status: affected)
- 22.0 ap373303 (Status: affected)
- 23.0 ap378164 (Status: affected)
- 23.0 ap364634 (Status: affected)
- 22.0 ap366803 (Status: affected)
- 23.0 ap366653 (Status: affected)
- 23.0 ap377126 (Status: affected)
- 22.0 ap355083 (Status: affected)
- 22.0 ap378164 (Status: affected)
- 23.0 ap376701 (Status: affected)
- 22.0 ap372674 (Status: affected)
- 23.0 ap372160 (Status: affected)
- 23.0 ap366207 (Status: affected)
- 22.0 ap366747 (Status: affected)
- 23.0 ap374144 (Status: affected)
- 23.0 ap366171 (Status: affected)
- 22.0 ap374956 (Status: affected)
- 22.0 ap376704 (Status: affected)
- 22.0 ap381729 (Status: affected)
- 22.0 ap359959 (Status: affected)
- 22.0 ap373452 (Status: affected)
- 23.0 ap371155 (Status: affected)
- 23.0 ap375097 (Status: affected)
- 23.0 ap375266 (Status: affected)
- 22.0 ap359429 (Status: affected)
- 23.0 ap381729 (Status: affected)
- 22.0 ap361559 (Status: affected)
- 22.0 ap353699 (Status: affected)
- 23.0 ap373480 (Status: affected)
- 22.0 ap364932 (Status: affected)
- 22.0 ap360007 (Status: affected)
- 22.0 ap371033 (Status: affected)
- 22.0 ap367986 (Status: affected)
- 23.0 ap373562 (Status: affected)
- 22.0 ap378391 (Status: affected)
- 22.0 ap379085 (Status: affected)
- 22.0 ap374312 (Status: affected)
- 23.0 ap382849 (Status: affected)
- 22.0 ap362710 (Status: affected)
- 23.0 ap377068 (Status: affected)
- 23.0 ap371300 (Status: affected)
- 22.0 ap376736 (Status: affected)
- 22.0 ap362532 (Status: affected)
- 22.0 ap365905 (Status: affected)
- 22.0 ap362143 (Status: affected)
- 22.0 ap354519 (Status: affected)
- 22.0 ap370193 (Status: affected)
- 22.0 ap382717 (Status: affected)
- 23.0 ap378509 (Status: affected)
- 23.0 ap367732 (Status: affected)
- 23.0 ap378970 (Status: affected)
- 22.0 ap381136 (Status: affected)
- 22.0 ap370590 (Status: affected)
- 23.0 ap373015 (Status: affected)
- 23.0 ap379167 (Status: affected)
- 22.0 ap373539 (Status: affected)
- 23.0 ap368167 (Status: affected)
- 22.0 ap359127 (Status: affected)
- 22.0 ap371455 (Status: affected)
- 22.0 ap372163 (Status: affected)
- 22.0 ap375291 (Status: affected)
- 22.0 ap354069 (Status: affected)
- 22.0 ap377384 (Status: affected)
- 22.0 ap365779 (Status: affected)
- 22.0 ap378862 (Status: affected)
- 22.0 ap381243 (Status: affected)
- 22.0 ap380473 (Status: affected)
- 22.0 ap369227 (Status: affected)
- 22.0 ap368913 (Status: affected)
- 22.0 ap372517 (Status: affected)
- 22.0 ap375069 (Status: affected)
- 22.0 ap366486 (Status: affected)
- 22.0 ap376402 (Status: affected)
- 23.0 ap381594 (Status: affected)
- 23.0 ap376356 (Status: affected)
- 23.0 ap382253 (Status: affected)
- 22.0 ap365186 (Status: affected)
- 23.0 ap371587 (Status: affected)
- 22.0 ap373302 (Status: affected)
- 22.0 ap376541 (Status: affected)
- 23.0 ap380473 (Status: affected)
- 23.0 ap376181 (Status: affected)
- 22.0 ap371024 (Status: affected)
- 22.0 ap374254 (Status: affected)
- 23.0 ap380486 (Status: affected)
- 23.0 ap372286 (Status: affected)
- 23.0 ap371804 (Status: affected)
- 22.0 ap366211 (Status: affected)
- 22.0 ap373562 (Status: affected)
- 22.0 ap369478 (Status: affected)
- 22.0 ap377963 (Status: affected)
- 22.0 ap358453 (Status: affected)
- 22.0 ap379080 (Status: affected)
- 22.0 ap352726 (Status: affected)
- 22.0 ap360184 (Status: affected)
- 22.0 ap361863 (Status: affected)
- 23.0 ap377727 (Status: affected)
- 22.0 ap370465 (Status: affected)
- 22.0 ap353458 (Status: affected)
- 22.0 ap369863 (Status: affected)
- 22.0 ap356432 (Status: affected)
- 23.0 ap366898 (Status: affected)
- 23.0 ap366118 (Status: affected)
- 22.0 ap370179 (Status: affected)
- 22.0 ap370579 (Status: affected)
- 22.0 ap364003 (Status: affected)
- 22.0 ap375908 (Status: affected)
- 23.0 ap374428 (Status: affected)
- 22.0 ap366174 (Status: affected)
- 22.0 ap382300 (Status: affected)
- 22.0 ap377581 (Status: affected)
- 23.0 ap372337 (Status: affected)
- 22.0 ap373647 (Status: affected)
- 22.0 ap376860 (Status: affected)
- 22.0 ap372351 (Status: affected)
- 23.0 ap377508 (Status: affected)
- 23.0 ap367782 (Status: affected)
- 22.0 ap369674 (Status: affected)
- 22.0 ap370075 (Status: affected)
- 23.0 ap378823 (Status: affected)
- 22.0 ap366701 (Status: affected)
- 22.0 ap355757 (Status: affected)
- 22.0 ap358469 (Status: affected)
- 22.0 ap366653 (Status: affected)
- 22.0 ap370196 (Status: affected)
- 23.0 ap369286 (Status: affected)
- 23.0 ap376860 (Status: affected)
- 22.0 ap368987 (Status: affected)
- 22.0 ap369922 (Status: affected)
- 23.0 ap367517 (Status: affected)
- 22.0 ap357607 (Status: affected)
- 23.0 ap375545 (Status: affected)
- 23.0 ap366295 (Status: affected)
- 22.0 ap358942 (Status: affected)
- 23.0 ap370590 (Status: affected)
- 22.0 ap376701 (Status: affected)
- 22.0 ap358515 (Status: affected)
- 22.0 ap378218 (Status: affected)
- 23.0 ap363363 (Status: affected)
- 23.0 ap382183 (Status: affected)
- 22.0 ap375090 (Status: affected)
- 23.0 ap362378 (Status: affected)
- 22.0 ap366744 (Status: affected)
- 23.0 ap376710 (Status: affected)
- 22.0 ap351721 (Status: affected)
- 23.0 ap370138 (Status: affected)
- 22.0 ap372286 (Status: affected)
- 22.0 ap374596 (Status: affected)
- 23.0 ap372517 (Status: affected)
- 22.0 ap378425 (Status: affected)
- 23.0 ap378581 (Status: affected)
- 23.0 ap372657 (Status: affected)
- 22.0 ap354374 (Status: affected)
- 22.0 ap369748 (Status: affected)
- 22.0 ap371961 (Status: affected)
- 23.0 ap384441 (Status: affected)
- 23.0 ap383514 (Status: affected)
- 23.0 ap384431 (Status: affected)
- 23.0 ap384650 (Status: affected)
- 23.0 ap384622 (Status: affected)
- 23.0 ap384639 (Status: affected)
- RI.2022.12 (Status: affected)
- 23.0 ap384745 (Status: affected)
- RI.2023.01 (Status: affected)
- 23.0 ap384591 (Status: affected)
- 23.0 ap384901 (Status: affected)
- 23.0 ap384931 (Status: affected)
- RI.2023.02 (Status: affected)
- 23.0 ap384930 (Status: affected)
- 23.0 ap384876 (Status: affected)
- 23.0 ap385048 (Status: affected)
- 23.0 ap385072 (Status: affected)
- RI.2023.03 (Status: affected)
- 23.0 ap385117 (Status: affected)
- 23.0 ap385046 (Status: affected)
- 23.0 ap385107 (Status: affected)
- 23.0 ap385136 (Status: affected)
- 23.0 ap385236 (Status: affected)
- 23.0 ap385115 (Status: affected)
- 23.0 ap385071 (Status: affected)
- 23.0 ap385251 (Status: affected)
- RI.2023.04 (Status: affected)
- 23.0 ap385244 (Status: affected)
- 23.0 ap385253 (Status: affected)
- 23.0 ap384793 (Status: affected)
- 23.0 ap385273 (Status: affected)
- 23.0 ap385247 (Status: affected)
- 23.0 ap385266 (Status: affected)
- 23.0 ap384947 (Status: affected)
- 23.0 ap385268 (Status: affected)
- RI.2023.05 (Status: affected)
- 23.0 ap385280 (Status: affected)
- 23.0 ap385276 (Status: affected)
- 23.0 ap385104 (Status: affected)
- 23.0 ap385311 (Status: affected)
- 23.0 ap385309 (Status: affected)
- 21.sp1 ap352340 (Status: affected)
- 21.sp1 ap358234 (Status: affected)
- 21.sp1 ap352205 (Status: affected)
- 21.sp1 ap353403 (Status: affected)
- 21.sp1 ap347189 (Status: affected)
- 21.sp1 ap339658 (Status: affected)
- 21.0 ap348753 (Status: affected)
- 21.sp1 ap348753 (Status: affected)
- 21.0 ap349642 (Status: affected)
- 21.sp1 ap344052 (Status: affected)
- 21.0 ap363705 (Status: affected)
- 21.sp1 ap364568 (Status: affected)
- 21.sp1 ap361122 (Status: affected)
- 21.sp1 ap364369 (Status: affected)
- 21.sp1 ap352726 (Status: affected)
- 21.0 ap345490 (Status: affected)
- 21.sp1 ap349996 (Status: affected)
- 21.sp1 ap349056 (Status: affected)
- 21.sp1 ap356817 (Status: affected)
- 21.sp1 ap367340 (Status: affected)
- 21.sp1 ap357775 (Status: affected)
- 21.sp1 ap342792 (Status: affected)
- 21.sp1 ap345456 (Status: affected)
- 21.sp1 ap355364 (Status: affected)
- 21.sp1 ap363265 (Status: affected)
- 21.sp1 ap366807 (Status: affected)
- 21.0 ap240784 (Status: affected)
- 21.sp1 ap351637 (Status: affected)
- 21.0 ap351363 (Status: affected)
- 21.sp1 ap341663 (Status: affected)
- 21.0 ap343999 (Status: affected)
- 21.sp1 ap349642 (Status: affected)
- 21.sp1 ap244609 (Status: affected)
- 21.sp1 ap345732 (Status: affected)
- 21.sp1 ap361534 (Status: affected)
- 21.0 ap366807 (Status: affected)
- 21.0 ap356271 (Status: affected)
- 21.sp1 ap358971 (Status: affected)
- 21.sp1 ap370388 (Status: affected)
- 21.0 ap354469 (Status: affected)
- 21.sp1 ap346233 (Status: affected)
- 21.sp1 ap346639 (Status: affected)
- 21.0 ap350497 (Status: affected)
- 21.0 ap245148 (Status: affected)
- 21.sp1 ap344752 (Status: affected)
- 21.sp1 ap375060 (Status: affected)
- 21.0 ap341939 (Status: affected)
- 21.sp1 ap243749 (Status: affected)
- 21.sp1 ap351216 (Status: affected)
- 21.0 ap347975 (Status: affected)
- 21.sp1 ap349724 (Status: affected)
- 21.sp1 ap360211 (Status: affected)
- 21.0 ap354180 (Status: affected)
- 21.sp1 ap343579 (Status: affected)
- 21.sp1 ap245579 (Status: affected)
- 21.sp1 ap215990 (Status: affected)
- 21.0 ap355000 (Status: affected)
- 21.sp1 ap360912 (Status: affected)
- 21.sp1 ap351795 (Status: affected)
- 21.sp1 ap357653 (Status: affected)
- 21.0 ap345720 (Status: affected)
- 21.0 ap348143 (Status: affected)
- 21.sp1 ap347016 (Status: affected)
- 21.0 ap235960 (Status: affected)
- 21.sp1 ap366295 (Status: affected)
- 21.sp1 ap369434 (Status: affected)
- 21.sp1 ap354936 (Status: affected)
- 21.sp1 ap353701 (Status: affected)
- 21.0 ap338833 (Status: affected)
- 21.0 ap339552 (Status: affected)
- 21.sp1 ap339346 (Status: affected)
- 21.0 ap356317 (Status: affected)
- 21.sp1 ap363001 (Status: affected)
- 21.sp1 ap361579 (Status: affected)
- 21.0 ap361534 (Status: affected)
- 21.0 ap354069 (Status: affected)
- 21.0 ap346646 (Status: affected)
- 21.0 ap349864 (Status: affected)
- 21.sp1 ap349384 (Status: affected)
- 21.0 ap363301 (Status: affected)
- 21.0 ap355616 (Status: affected)
- 21.sp1 ap339351 (Status: affected)
- 21.sp1 ap343616 (Status: affected)
- 21.0 ap348430 (Status: affected)
- 21.0 ap344681 (Status: affected)
- 21.0 ap352372 (Status: affected)
- 21.sp1 ap349631 (Status: affected)
- 21.sp1 ap350391 (Status: affected)
- 21.sp1 ap342145 (Status: affected)
- 21.0 ap355774 (Status: affected)
- 21.sp1 ap350614 (Status: affected)
- 21.sp1 ap342836 (Status: affected)
- 21.sp1 ap354098 (Status: affected)
- 21.sp1 ap355572 (Status: affected)
- 21.sp1 ap346031 (Status: affected)
- 21.0 ap350465 (Status: affected)
- 21.sp1 ap353464 (Status: affected)
- 21.sp1 ap351530 (Status: affected)
- 21.0 ap350859 (Status: affected)
- 21.0 ap244609 (Status: affected)
- 21.sp1 ap346386 (Status: affected)
- 21.sp1 ap372337 (Status: affected)
- 21.0 ap350204 (Status: affected)
- 21.sp1 ap352421 (Status: affected)
- 21.sp1 ap338964 (Status: affected)
- 21.sp1 ap361883 (Status: affected)
- 21.0 ap351835 (Status: affected)
- 21.0 ap349699 (Status: affected)
- 21.0 ap339351 (Status: affected)
- 21.0 ap339477 (Status: affected)
- 21.sp1 ap342284 (Status: affected)
- 21.sp1 ap356328 (Status: affected)
- 21.0 ap342324 (Status: affected)
- 21.0 ap351294 (Status: affected)
- 21.0 ap364358 (Status: affected)
- 21.sp1 ap342755 (Status: affected)
- 21.0 ap355091 (Status: affected)
- 21.sp1 ap360966 (Status: affected)
- 21.0 ap345054 (Status: affected)
- 21.sp1 ap353842 (Status: affected)
- 21.sp1 ap356145 (Status: affected)
- 21.0 ap347158 (Status: affected)
- 21.sp1 ap346577 (Status: affected)
- 21.sp1 ap350303 (Status: affected)
- 21.0 ap338964 (Status: affected)
- 21.0 ap350111 (Status: affected)
- 21.sp1 ap364667 (Status: affected)
- 21.0 ap341897 (Status: affected)
- 21.sp1 ap343408 (Status: affected)
- 21.0 ap361520 (Status: affected)
- 21.sp1 ap365889 (Status: affected)
- 21.sp1 ap358034 (Status: affected)
- 21.sp1 ap351487 (Status: affected)
- 21.sp1 ap356747 (Status: affected)
- 21.sp1 ap351295 (Status: affected)
- 21.0 ap366373 (Status: affected)
- 21.0 ap355095 (Status: affected)
- 21.0 ap359536 (Status: affected)
- 21.sp1 ap348012 (Status: affected)
- 21.sp1 ap354918 (Status: affected)
- 21.sp1 ap348565 (Status: affected)
- 21.sp1 ap242497 (Status: affected)
- 21.sp1 ap354785 (Status: affected)
- 21.0 ap348156 (Status: affected)
- 21.sp1 ap339196 (Status: affected)
- 21.0 ap357087 (Status: affected)
- 21.sp1 ap344485 (Status: affected)
- 21.sp1 ap242300 (Status: affected)
- 21.sp1 ap349390 (Status: affected)
- 21.0 ap351263 (Status: affected)
- 21.sp1 ap356164 (Status: affected)
- 21.sp1 ap363584 (Status: affected)
- 21.sp1 ap373777 (Status: affected)
- 21.0 ap358640 (Status: affected)
- 21.sp1 ap359764 (Status: affected)
- 21.sp1 ap357395 (Status: affected)
- 21.sp1 ap342625 (Status: affected)
- 21.sp1 ap351721 (Status: affected)
- 21.0 ap339209 (Status: affected)
- 21.0 ap353549 (Status: affected)
- 21.0 ap347562 (Status: affected)
- 21.sp1 ap362553 (Status: affected)
- 21.sp1 ap355717 (Status: affected)
- 21.sp1 ap364206 (Status: affected)
- 21.sp1 ap364510 (Status: affected)
- 21.0 ap347016 (Status: affected)
- 21.0 ap363228 (Status: affected)
- 21.sp1 ap345054 (Status: affected)
- 21.0 ap352969 (Status: affected)
- 21.sp1 ap365597 (Status: affected)
- 21.0 ap345013 (Status: affected)
- 21.sp1 ap359433 (Status: affected)
- 21.sp1 ap347959 (Status: affected)
- 21.sp1 ap374557 (Status: affected)
- 21.sp1 ap366118 (Status: affected)
- 21.sp1 ap346307 (Status: affected)
- 21.0 ap341645 (Status: affected)
- 21.0 ap351988 (Status: affected)
- 21.sp1 ap346646 (Status: affected)
- 21.sp1 ap379387 (Status: affected)
- 21.0 ap356503 (Status: affected)
- 21.sp1 ap351835 (Status: affected)
- 21.sp1 ap367732 (Status: affected)
- 21.sp1 ap344969 (Status: affected)
- 21.0 ap344100 (Status: affected)
- 21.sp1 ap349023 (Status: affected)
- 21.sp1 ap235252 (Status: affected)
- 21.0 ap366320 (Status: affected)
- 21.sp1 ap346064 (Status: affected)
- 21.sp1 ap369206 (Status: affected)
- 21.0 ap359145 (Status: affected)
- 21.0 ap351637 (Status: affected)
- 21.0 ap354557 (Status: affected)
- 21.0 ap347640 (Status: affected)
- 21.sp1 ap356141 (Status: affected)
- 21.sp1 ap345261 (Status: affected)
- 21.sp1 ap348100 (Status: affected)
- 21.sp1 ap344020 (Status: affected)
- 21.sp1 ap352997 (Status: affected)
- 21.0 ap338981 (Status: affected)
- 21.sp1 ap346562 (Status: affected)
- 21.0 ap345732 (Status: affected)
- 21.sp1 ap343877 (Status: affected)
- 21.sp1 ap347172 (Status: affected)
- 21.sp1 ap368399 (Status: affected)
- 21.0 ap361854 (Status: affected)
- 21.sp1 ap350050 (Status: affected)
- 21.0 ap342899 (Status: affected)
- 21.sp1 ap345490 (Status: affected)
- 21.0 ap350110 (Status: affected)
- 21.sp1 ap341939 (Status: affected)
- 21.0 ap354052 (Status: affected)
- 21.0 ap351961 (Status: affected)
- 21.sp1 ap349210 (Status: affected)
- 21.sp1 ap348430 (Status: affected)
- 21.sp1 ap360259 (Status: affected)
- 21.sp1 ap342483 (Status: affected)
- 21.sp1 ap347330 (Status: affected)
- 21.sp1 ap346261 (Status: affected)
- 21.sp1 ap352515 (Status: affected)
- 21.sp1 ap342548 (Status: affected)
- 21.0 ap350308 (Status: affected)
- 21.0 ap346253 (Status: affected)
- 21.sp1 ap356317 (Status: affected)
- 21.sp1 ap358726 (Status: affected)
- 21.0 ap342853 (Status: affected)
- 21.0 ap346147 (Status: affected)
- 21.sp1 ap372043 (Status: affected)
- 21.sp1 ap364004 (Status: affected)
- 21.0 ap242497 (Status: affected)
- 21.sp1 ap359974 (Status: affected)
- 21.sp1 ap356474 (Status: affected)
- 21.sp1 ap355091 (Status: affected)
- 21.sp1 ap350141 (Status: affected)
- 21.sp1 ap354052 (Status: affected)
- 21.0 ap354793 (Status: affected)
- 21.0 ap342284 (Status: affected)
- 21.0 ap355699 (Status: affected)
- 21.sp1 ap350420 (Status: affected)
- 21.sp1 ap355912 (Status: affected)
- 21.sp1 ap365971 (Status: affected)
- 21.sp1 ap351754 (Status: affected)
- 21.0 ap338988 (Status: affected)
- 21.0 ap347246 (Status: affected)
- 21.sp1 ap348107 (Status: affected)
- 21.sp1 ap362298 (Status: affected)
- 21.sp1 ap366744 (Status: affected)
- 21.0 ap348107 (Status: affected)
- 21.sp1 ap345246 (Status: affected)
- 21.0 ap367732 (Status: affected)
- 21.0 ap215990 (Status: affected)
- 21.0 ap339658 (Status: affected)
- 21.0 ap357571 (Status: affected)
- 21.0 ap344752 (Status: affected)
- 21.sp1 ap350573 (Status: affected)
- 21.sp1 ap371921 (Status: affected)
- 21.sp1 ap373102 (Status: affected)
- 21.sp1 ap345293 (Status: affected)
- 21.sp1 ap347548 (Status: affected)
- 21.sp1 ap359646 (Status: affected)
- 21.0 ap349066 (Status: affected)
- 21.sp1 ap362532 (Status: affected)
- 21.sp1 ap346128 (Status: affected)
- 21.sp1 ap359644 (Status: affected)
- 21.0 ap343495 (Status: affected)
- 21.sp1 ap361560 (Status: affected)
- 21.0 ap349206 (Status: affected)
- 21.0 ap343017 (Status: affected)
- 21.sp1 ap347640 (Status: affected)
- 21.0 ap247533 (Status: affected)
- 21.sp1 ap358642 (Status: affected)
- 21.0 ap363845 (Status: affected)
- 21.sp1 ap369173 (Status: affected)
- 21.sp1 ap344100 (Status: affected)
- 21.0 ap359829 (Status: affected)
- 21.sp1 ap358345 (Status: affected)
- 21.sp1 ap365167 (Status: affected)
- 21.0 ap339781 (Status: affected)
- 21.sp1 ap352109 (Status: affected)
- 21.sp1 ap375355 (Status: affected)
- 21.sp1 ap375931 (Status: affected)
- 21.0 ap339342 (Status: affected)
- 21.sp1 ap349872 (Status: affected)
- 21.sp1 ap359752 (Status: affected)
- 21.0 ap350189 (Status: affected)
- 21.sp1 ap365633 (Status: affected)
- 21.0 ap365632 (Status: affected)
- 21.sp1 ap355000 (Status: affected)
- 21.0 ap344043 (Status: affected)
- 21.sp1 ap362163 (Status: affected)
- 21.0 ap356817 (Status: affected)
- 21.0 ap355107 (Status: affected)
- 21.sp1 ap345873 (Status: affected)
- 21.0 ap347330 (Status: affected)
- 21.sp1 ap375674 (Status: affected)
- 21.sp1 ap374822 (Status: affected)
- 21.0 ap349872 (Status: affected)
- 21.sp1 ap366348 (Status: affected)
- 21.sp1 ap356787 (Status: affected)
- 21.sp1 ap351934 (Status: affected)
- 21.sp1 ap375053 (Status: affected)
- 21.0 ap348473 (Status: affected)
- 21.sp1 ap245441 (Status: affected)
- 21.sp1 ap353418 (Status: affected)
- 21.0 ap342696 (Status: affected)
- 21.sp1 ap363128 (Status: affected)
- 21.sp1 ap373914 (Status: affected)
- 21.sp1 ap364670 (Status: affected)
- 21.0 ap354646 (Status: affected)
- 21.0 ap359227 (Status: affected)
- 21.sp1 ap339538 (Status: affected)
- 21.sp1 ap343352 (Status: affected)
- 21.0 ap348142 (Status: affected)
- 21.sp1 ap350465 (Status: affected)
- 21.sp1 ap351961 (Status: affected)
- 21.sp1 ap369926 (Status: affected)
- 21.sp1 ap344681 (Status: affected)
- 21.0 ap350090 (Status: affected)
- 21.0 ap356164 (Status: affected)
- 21.0 ap346379 (Status: affected)
- 21.0 ap352421 (Status: affected)
- 21.0 ap360459 (Status: affected)
- 21.0 ap357161 (Status: affected)
- 21.sp1 ap374649 (Status: affected)
- 21.0 ap342836 (Status: affected)
- 21.0 ap346128 (Status: affected)
- 21.sp1 ap365798 (Status: affected)
- 21.0 ap348367 (Status: affected)
- 21.sp1 ap357574 (Status: affected)
- 21.sp1 ap358399 (Status: affected)
- 21.0 ap358411 (Status: affected)
- 21.sp1 ap363560 (Status: affected)
- 21.sp1 ap356424 (Status: affected)
- 21.sp1 ap345850 (Status: affected)
- 21.0 ap359030 (Status: affected)
- 21.sp1 ap363695 (Status: affected)
- 21.sp1 ap342060 (Status: affected)
- 21.sp1 ap350164 (Status: affected)
- 21.sp1 ap345729 (Status: affected)
- 21.sp1 ap350179 (Status: affected)
- 21.sp1 ap351263 (Status: affected)
- 21.0 ap346307 (Status: affected)
- 21.0 ap358942 (Status: affected)
- 21.sp1 ap348034 (Status: affected)
- 21.0 ap342175 (Status: affected)
- 21.sp1 ap354413 (Status: affected)
- 21.0 ap352515 (Status: affected)
- 21.sp1 ap358132 (Status: affected)
- 21.sp1 ap350474 (Status: affected)
- 21.sp1 ap350884 (Status: affected)
- 21.sp1 ap379440 (Status: affected)
- 21.sp1 ap363846 (Status: affected)
- 21.sp1 ap348531 (Status: affected)
- 21.sp1 ap371804 (Status: affected)
- 21.0 ap347189 (Status: affected)
- 21.sp1 ap359112 (Status: affected)
- 21.0 ap356584 (Status: affected)
- 21.0 ap358582 (Status: affected)
- 21.0 ap342588 (Status: affected)
- 21.0 ap346900 (Status: affected)
- 21.sp1 ap346900 (Status: affected)
- 21.sp1 ap351701 (Status: affected)
- 21.0 ap356145 (Status: affected)
- 21.sp1 ap350204 (Status: affected)
- 21.0 ap361876 (Status: affected)
- 21.sp1 ap352372 (Status: affected)
- 21.sp1 ap361055 (Status: affected)
- 21.sp1 ap349011 (Status: affected)
- 21.0 ap365889 (Status: affected)
- 21.sp1 ap366747 (Status: affected)
- 21.sp1 ap345477 (Status: affected)
- 21.sp1 ap350456 (Status: affected)
- 21.0 ap359085 (Status: affected)
- 21.0 ap350143 (Status: affected)
- 21.sp1 ap362593 (Status: affected)
- 21.0 ap349617 (Status: affected)
- 21.0 ap356231 (Status: affected)
- 21.sp1 ap366486 (Status: affected)
- 21.sp1 ap366320 (Status: affected)
- 21.sp1 ap339395 (Status: affected)
- 21.0 ap365167 (Status: affected)
- 21.0 ap344270 (Status: affected)
- 21.0 ap350591 (Status: affected)
- 21.0 ap360966 (Status: affected)
- 21.sp1 ap364473 (Status: affected)
- 21.0 ap346639 (Status: affected)
- 21.sp1 ap339568 (Status: affected)
- 21.sp1 ap342461 (Status: affected)
- 21.sp1 ap364384 (Status: affected)
- 21.0 ap365170 (Status: affected)
- 21.0 ap346554 (Status: affected)
- 21.0 ap358889 (Status: affected)
- 21.0 ap354098 (Status: affected)
- 21.sp1 ap367461 (Status: affected)
- 21.0 ap353839 (Status: affected)
- 21.sp1 ap339376 (Status: affected)
- 21.0 ap346074 (Status: affected)
- 21.sp1 ap343495 (Status: affected)
- 21.0 ap361883 (Status: affected)
- 21.sp1 ap366268 (Status: affected)
- 21.sp1 ap354050 (Status: affected)
- 21.sp1 ap363597 (Status: affected)
- 21.sp1 ap347562 (Status: affected)
- 21.sp1 ap351495 (Status: affected)
- 21.sp1 ap242893 (Status: affected)
- 21.sp1 ap349863 (Status: affected)
- 21.0 ap346559 (Status: affected)
- 21.0 ap340168 (Status: affected)
- 21.sp1 ap342975 (Status: affected)
- 21.sp1 ap355107 (Status: affected)
- 21.sp1 ap351014 (Status: affected)
- 21.0 ap347741 (Status: affected)
- 21.sp1 ap357571 (Status: affected)
- 21.sp1 ap363146 (Status: affected)
- 21.sp1 ap341577 (Status: affected)
- 21.sp1 ap347741 (Status: affected)
- 21.sp1 ap352766 (Status: affected)
- 21.sp1 ap350763 (Status: affected)
- 21.sp1 ap339781 (Status: affected)
- 21.0 ap355003 (Status: affected)
- 21.0 ap338965 (Status: affected)
- 21.sp1 ap373814 (Status: affected)
- 21.sp1 ap353549 (Status: affected)
- 21.sp1 ap354707 (Status: affected)
- 21.0 ap346347 (Status: affected)
- 21.0 ap243749 (Status: affected)
- 21.sp1 ap346347 (Status: affected)
- 21.0 ap345246 (Status: affected)
- 21.sp1 ap361420 (Status: affected)
- 21.sp1 ap355699 (Status: affected)
- 21.sp1 ap348952 (Status: affected)
- 21.0 ap349867 (Status: affected)
- 21.0 ap345069 (Status: affected)
- 21.sp1 ap364158 (Status: affected)
- 21.sp1 ap351248 (Status: affected)
- 21.sp1 ap347534 (Status: affected)
- 21.sp1 ap346724 (Status: affected)
- 21.sp1 ap354474 (Status: affected)
- 21.sp1 ap373349 (Status: affected)
- 21.sp1 ap361308 (Status: affected)
- 21.sp1 ap348431 (Status: affected)
- 21.0 ap348633 (Status: affected)
- 21.sp1 ap344043 (Status: affected)
- 21.0 ap354413 (Status: affected)
- 21.sp1 ap363705 (Status: affected)
- 21.sp1 ap342696 (Status: affected)
- 21.0 ap360306 (Status: affected)
- 21.sp1 ap346862 (Status: affected)
- 21.sp1 ap351894 (Status: affected)
- 21.0 ap345452 (Status: affected)
- 21.0 ap352766 (Status: affected)
- 21.sp1 ap350832 (Status: affected)
- 21.sp1 ap349206 (Status: affected)
- 21.sp1 ap356375 (Status: affected)
- 21.sp1 ap361641 (Status: affected)
- 21.sp1 ap367325 (Status: affected)
- 21.sp1 ap342217 (Status: affected)
- 21.sp1 ap359956 (Status: affected)
- 21.0 ap349724 (Status: affected)
- 21.sp1 ap346074 (Status: affected)
- 21.sp1 ap342853 (Status: affected)
- 21.0 ap351478 (Status: affected)
- 21.sp1 ap361863 (Status: affected)
- 21.sp1 ap350613 (Status: affected)
- 21.sp1 ap342220 (Status: affected)
- 21.sp1 ap370620 (Status: affected)
- 21.sp1 ap338833 (Status: affected)
- 21.sp1 ap244265 (Status: affected)
- 21.sp1 (Status: affected)
- 21.sp1 ap339206 (Status: affected)
- 21.sp1 ap344954 (Status: affected)
- 21.0 ap354707 (Status: affected)
- 21.sp1 ap359076 (Status: affected)
- 21.0 ap346376 (Status: affected)
- 21.sp1 ap348104 (Status: affected)
- 21.0 ap360600 (Status: affected)
- 21.0 ap245468 (Status: affected)
- 21.sp1 ap361412 (Status: affected)
- 21.0 ap352972 (Status: affected)
- 21.0 ap342946 (Status: affected)
- 21.sp1 ap367782 (Status: affected)
- 21.sp1 ap233247 (Status: affected)
- 21.sp1 ap345627 (Status: affected)
- 21.sp1 ap245148 (Status: affected)
- 21.sp1 ap358942 (Status: affected)
- 21.sp1 ap355385 (Status: affected)
- 21.sp1 ap342899 (Status: affected)
- 21.sp1 ap354646 (Status: affected)
- 21.sp1 ap364358 (Status: affected)
- 21.sp1 ap351294 (Status: affected)
- 21.0 ap364510 (Status: affected)
- 21.0 ap352320 (Status: affected)
- 21.sp1 ap343351 (Status: affected)
- 21.sp1 ap351988 (Status: affected)
- 21.sp1 ap339209 (Status: affected)
- 21.sp1 ap361520 (Status: affected)
- 21.sp1 ap246656 (Status: affected)
- 21.sp1 ap365632 (Status: affected)
- 21.0 ap345261 (Status: affected)
- 21.sp1 ap339236 (Status: affected)
- 21.sp1 ap360325 (Status: affected)
- 21.0 ap348945 (Status: affected)
- 21.sp1 ap355875 (Status: affected)
- 21.sp1 ap360306 (Status: affected)
- 21.0 ap353841 (Status: affected)
- 21.0 ap339395 (Status: affected)
- 21.0 ap357607 (Status: affected)
- 21.0 ap235252 (Status: affected)
- 21.sp1 ap345633 (Status: affected)
- 21.sp1 ap363228 (Status: affected)
- 21.0 ap354936 (Status: affected)
- 21.sp1 ap338972 (Status: affected)
- 21.sp1 ap341471 (Status: affected)
- 21.sp1 ap361153 (Status: affected)
- 21.sp1 ap351363 (Status: affected)
- 21.0 ap359470 (Status: affected)
- 21.sp1 ap359589 (Status: affected)
- 21.0 ap353418 (Status: affected)
- 21.0 ap343352 (Status: affected)
- 21.sp1 ap348037 (Status: affected)
- 21.sp1 ap339552 (Status: affected)
- 21.sp1 ap348633 (Status: affected)
- 21.0 ap348093 (Status: affected)
- 21.sp1 ap354069 (Status: affected)
- 21.sp1 ap347905 (Status: affected)
- 21.sp1 ap347302 (Status: affected)
- 21.0 ap348078 (Status: affected)
- 21.sp1 ap374265 (Status: affected)
- 21.sp1 ap348740 (Status: affected)
- 21.0 ap349859 (Status: affected)
- 21.sp1 ap346559 (Status: affected)
- 21.sp1 ap342175 (Status: affected)
- 21.sp1 ap360771 (Status: affected)
- 21.sp1 ap379554 (Status: affected)
- 21.0 ap356458 (Status: affected)
- 21.sp1 ap342127 (Status: affected)
- 21.0 ap343877 (Status: affected)
- 21.0 ap356328 (Status: affected)
- 21.sp1 ap344479 (Status: affected)
- 21.sp1 ap370196 (Status: affected)
- 21.0 ap341471 (Status: affected)
- 21.sp1 ap338988 (Status: affected)
- 21.0 ap338972 (Status: affected)
- 21.sp1 ap340054 (Status: affected)
- 21.0 ap346622 (Status: affected)
- 21.sp1 ap365449 (Status: affected)
- 21.sp1 ap353354 (Status: affected)
- 21.0 ap351721 (Status: affected)
- 21.sp1 ap359911 (Status: affected)
- 21.sp1 ap359023 (Status: affected)
- 21.0 ap344253 (Status: affected)
- 21.sp1 ap346622 (Status: affected)
- 21.sp1 ap365556 (Status: affected)
- 21.sp1 ap372454 (Status: affected)
- 21.sp1 ap349589 (Status: affected)
- 21.sp1 ap357197 (Status: affected)
- 21.sp1 ap360459 (Status: affected)
- 21.sp1 ap359085 (Status: affected)
- 21.0 ap343410 (Status: affected)
- 21.sp1 ap349859 (Status: affected)
- 21.sp1 ap338879 (Status: affected)
- 21.sp1 ap342474 (Status: affected)
- 21.sp1 ap345548 (Status: affected)
- 21.0 ap357653 (Status: affected)
- 21.sp1 ap344094 (Status: affected)
- 21.0 ap351700 (Status: affected)
- 21.sp1 ap358563 (Status: affected)
- 21.0 ap350613 (Status: affected)
- 21.0 ap364473 (Status: affected)
- 21.sp1 ap362825 (Status: affected)
- 21.sp1 ap361854 (Status: affected)
- 21.sp1 ap341645 (Status: affected)
- 21.0 ap342771 (Status: affected)
- 21.0 ap347302 (Status: affected)
- 21.sp1 ap348462 (Status: affected)
- 21.sp1 ap355894 (Status: affected)
- 21.0 ap346183 (Status: affected)
- 21.0 ap341350 (Status: affected)
- 21.sp1 ap346376 (Status: affected)
- 21.0 ap343408 (Status: affected)
- 21.sp1 ap349221 (Status: affected)
- 21.sp1 ap378970 (Status: affected)
- 21.0 ap349996 (Status: affected)
- 21.sp1 ap354789 (Status: affected)
- 21.sp1 ap355581 (Status: affected)
- 21.sp1 ap341908 (Status: affected)
- 21.sp1 ap359685 (Status: affected)
- 21.0 ap345627 (Status: affected)
- 21.0 ap363584 (Status: affected)
- 21.sp1 ap359145 (Status: affected)
- 21.0 ap363560 (Status: affected)
- 21.sp1 ap359227 (Status: affected)
- 21.sp1 ap359030 (Status: affected)
- 21.sp1 ap371527 (Status: affected)
- 21.0 ap339376 (Status: affected)
- 21.sp1 ap354469 (Status: affected)
- 21.0 ap345633 (Status: affected)
- 21.0 ap243808 (Status: affected)
- 21.0 ap244020 (Status: affected)
- 21.sp1 ap350338 (Status: affected)
- 21.0 ap348472 (Status: affected)
- 21.sp1 ap354927 (Status: affected)
- 21.sp1 ap338981 (Status: affected)
- 21.0 ap344969 (Status: affected)
- 21.sp1 ap366803 (Status: affected)
- 21.0 ap344052 (Status: affected)
- 21.sp1 ap339897 (Status: affected)
- 21.sp1 ap361945 (Status: affected)
- 21.sp1 ap345738 (Status: affected)
- 21.0 ap359729 (Status: affected)
- 21.0 ap348034 (Status: affected)
- 21.sp1 ap359465 (Status: affected)
- 21.0 ap359076 (Status: affected)
- 21.sp1 ap347930 (Status: affected)
- 21.0 ap347896 (Status: affected)
- 21.sp1 ap348367 (Status: affected)
- 21.0 ap246656 (Status: affected)
- 21.sp1 ap362317 (Status: affected)
- 21.0 ap339538 (Status: affected)
- 21.sp1 ap345452 (Status: affected)
- 21.0 ap348012 (Status: affected)
- 21.sp1 ap375061 (Status: affected)
- 21.sp1 ap363363 (Status: affected)
- 21.sp1 ap354494 (Status: affected)
- 21.sp1 ap364003 (Status: affected)
- 21.sp1 ap360586 (Status: affected)
- 21.0 ap358893 (Status: affected)
- 21.sp1 ap339342 (Status: affected)
- 21.0 ap350491 (Status: affected)
- 21.sp1 ap357718 (Status: affected)
- 21.sp1 ap354964 (Status: affected)
- 21.0 ap244595 (Status: affected)
- 21.sp1 ap244595 (Status: affected)
- 21.sp1 ap364879 (Status: affected)
- 21.sp1 ap373813 (Status: affected)
- 21.sp1 ap358095 (Status: affected)
- 21.sp1 ap359959 (Status: affected)
- 21.sp1 ap355855 (Status: affected)
- 21.sp1 ap356458 (Status: affected)
- 21.0 ap342217 (Status: affected)
- 21.0 ap363146 (Status: affected)
- 21.sp1 ap347685 (Status: affected)
- 21.sp1 ap347603 (Status: affected)
- 21.0 ap355673 (Status: affected)
- 21.sp1 ap346379 (Status: affected)
- 21.sp1 ap360931 (Status: affected)
- 21.0 ap342625 (Status: affected)
- 21.sp1 ap344253 (Status: affected)
- 21.0 ap343351 (Status: affected)
- 21.sp1 ap351644 (Status: affected)
- 21.sp1 ap357768 (Status: affected)
- 21.sp1 ap360600 (Status: affected)
- 21.sp1 ap349617 (Status: affected)
- 21.sp1 ap370801 (Status: affected)
- 21.sp1 ap350111 (Status: affected)
- 21.0 ap351644 (Status: affected)
- 21.0 ap354494 (Status: affected)
- 21.sp1 ap348156 (Status: affected)
- 21.sp1 ap357161 (Status: affected)
- 21.0 ap344020 (Status: affected)
- 21.0 ap339196 (Status: affected)
- 21.sp1 ap354331 (Status: affected)
- 21.sp1 ap361820 (Status: affected)
- 21.sp1 ap348945 (Status: affected)
- 21.0 ap342220 (Status: affected)
- 21.sp1 ap341897 (Status: affected)
- 21.sp1 ap350143 (Status: affected)
- 21.sp1 ap249376 (Status: affected)
- 21.0 ap245579 (Status: affected)
- 21.sp1 ap343017 (Status: affected)
- 21.0 ap354964 (Status: affected)
- 21.0 ap244265 (Status: affected)
- 21.0 ap349056 (Status: affected)
- 21.sp1 ap348878 (Status: affected)
- 21.sp1 ap375026 (Status: affected)
- 21.0 ap344094 (Status: affected)
- 21.sp1 ap357083 (Status: affected)
- 21.sp1 ap349443 (Status: affected)
- 21.sp1 ap364256 (Status: affected)
- 21.sp1 ap358469 (Status: affected)
- 21.sp1 ap375465 (Status: affected)
- 21.0 ap353842 (Status: affected)
- 21.0 ap348100 (Status: affected)
- 21.0 ap354474 (Status: affected)
- 21.0 ap342975 (Status: affected)
- 21.0 ap345755 (Status: affected)
- 21.0 ap350884 (Status: affected)
- 21.0 ap355385 (Status: affected)
- 21.0 ap358469 (Status: affected)
- 21.sp1 ap358101 (Status: affected)
- 21.sp1 ap352972 (Status: affected)
- 21.sp1 ap357047 (Status: affected)
- 21.sp1 ap364062 (Status: affected)
- 21.sp1 ap359729 (Status: affected)
- 21.sp1 ap350189 (Status: affected)
- 21.sp1 ap348143 (Status: affected)
- 21.0 ap340054 (Status: affected)
- 21.sp1 ap366370 (Status: affected)
- 21.0 ap356474 (Status: affected)
- 21.0 ap364384 (Status: affected)
- 21.0 ap350141 (Status: affected)
- 21.sp1 ap357607 (Status: affected)
- 21.sp1 ap349864 (Status: affected)
- 21.sp1 ap353843 (Status: affected)
- 21.sp1 ap342543 (Status: affected)
- 21.0 ap338879 (Status: affected)
- 21.0 ap242300 (Status: affected)
- 21.sp1 ap357769 (Status: affected)
- 21.sp1 ap366211 (Status: affected)
- 21.sp1 ap245468 (Status: affected)
- 21.sp1 ap345059 (Status: affected)
- 21.0 ap358563 (Status: affected)
- 21.0 ap339200 (Status: affected)
- 21.sp1 ap372842 (Status: affected)
- 21.sp1 ap359119 (Status: affected)
- 21.sp1 ap343675 (Status: affected)
- 21.sp1 ap354531 (Status: affected)
- 21.sp1 ap366373 (Status: affected)
- 21.sp1 ap363301 (Status: affected)
- 21.sp1 ap352087 (Status: affected)
- 21.sp1 ap240784 (Status: affected)
- 21.sp1 ap349867 (Status: affected)
- 21.sp1 ap344952 (Status: affected)
- 21.sp1 ap339200 (Status: affected)
- 21.0 ap349210 (Status: affected)
- 21.0 ap351216 (Status: affected)
- 21.sp1 ap344422 (Status: affected)
- 21.sp1 ap343999 (Status: affected)
- 21.0 ap364471 (Status: affected)
- 21.sp1 ap371030 (Status: affected)
- 21.sp1 ap367524 (Status: affected)
- 21.sp1 ap344945 (Status: affected)
- 21.sp1 ap360993 (Status: affected)
- 21.sp1 ap365186 (Status: affected)
- 21.0 ap346076 (Status: affected)
- 21.sp1 ap374145 (Status: affected)
- 21.sp1 ap358641 (Status: affected)
- 21.0 ap356787 (Status: affected)
- 21.sp1 ap348564 (Status: affected)
- 21.sp1 ap361590 (Status: affected)
- 21.sp1 ap356231 (Status: affected)
- 21.0 ap346386 (Status: affected)
- 21.sp1 ap355673 (Status: affected)
- 21.0 ap358234 (Status: affected)
- 21.0 ap350478 (Status: affected)
- 21.sp1 ap373015 (Status: affected)
- 21.sp1 ap347246 (Status: affected)
- 21.sp1 ap342782 (Status: affected)
- 21.0 ap364369 (Status: affected)
- 21.sp1 ap362637 (Status: affected)
- 21.sp1 ap349383 (Status: affected)
- 21.0 ap358345 (Status: affected)
- 21.sp1 ap349066 (Status: affected)
- 21.0 ap342145 (Status: affected)
- 21.0 ap343445 (Status: affected)
- 21.0 ap358101 (Status: affected)
- 21.sp1 ap345720 (Status: affected)
- 21.sp1 ap352795 (Status: affected)
- 21.sp1 ap350591 (Status: affected)
- 21.0 ap359589 (Status: affected)
- 21.0 ap346902 (Status: affected)
- 21.sp1 ap363218 (Status: affected)
- 21.sp1 ap355638 (Status: affected)
- 21.0 ap249383 (Status: affected)
- 21.sp1 ap353499 (Status: affected)
- 21.sp1 ap350859 (Status: affected)
- 21.0 ap352728 (Status: affected)
- 21.sp1 ap349699 (Status: affected)
- 21.0 ap354785 (Status: affected)
- 21.sp1 ap365390 (Status: affected)
- 21.sp1 ap361821 (Status: affected)
- 21.0 ap339568 (Status: affected)
- 21.sp1 ap343445 (Status: affected)
- 21.sp1 ap340730 (Status: affected)
- 21.sp1 ap348527 (Status: affected)
- 21.sp1 ap342588 (Status: affected)
- 21.sp1 ap351704 (Status: affected)
- 21.0 ap351701 (Status: affected)
- 21.sp1 ap342771 (Status: affected)
- 21.sp1 ap370636 (Status: affected)
- 21.sp1 ap367794 (Status: affected)
- 21.sp1 ap365730 (Status: affected)
- 21.0 (Status: affected)
- 21.sp1 ap375036 (Status: affected)
- 21.sp1 ap379847 (Status: affected)
- 21.sp1 ap359470 (Status: affected)
- 21.0 ap359646 (Status: affected)
- 21.sp1 ap365584 (Status: affected)
- 21.sp1 ap355095 (Status: affected)
- 21.sp1 ap346632 (Status: affected)
- 21.0 ap354331 (Status: affected)
- 21.0 ap361590 (Status: affected)
- 21.0 ap352795 (Status: affected)
- 21.0 ap366118 (Status: affected)
- 21.sp1 ap348142 (Status: affected)
- 21.sp1 ap348078 (Status: affected)
- 21.sp1 ap354793 (Status: affected)
- 21.0 ap344952 (Status: affected)
- 21.0 ap344945 (Status: affected)
- 21.0 ap356978 (Status: affected)
- 21.sp1 ap349703 (Status: affected)
- 21.sp1 ap366731 (Status: affected)
- 21.sp1 ap358861 (Status: affected)
- 21.sp1 ap365662 (Status: affected)
- 21.sp1 ap353841 (Status: affected)
- 21.sp1 ap344964 (Status: affected)
- 21.0 ap366290 (Status: affected)
- 21.sp1 ap358137 (Status: affected)
- 21.sp1 ap346607 (Status: affected)
- 21.sp1 ap341498 (Status: affected)
- 21.sp1 ap347158 (Status: affected)
- 21.sp1 ap373786 (Status: affected)
- 21.sp1 ap346902 (Status: affected)
- 21.sp1 ap365170 (Status: affected)
- 21.sp1 ap366880 (Status: affected)
- 21.sp1 ap363729 (Status: affected)
- 21.0 ap351160 (Status: affected)
- 21.sp1 ap244020 (Status: affected)
- 21.sp1 ap380473 (Status: affected)
- 21.0 ap352896 (Status: affected)
- 21.0 ap346562 (Status: affected)
- 21.sp1 ap348093 (Status: affected)
- 21.sp1 ap352320 (Status: affected)
- 21.0 ap366295 (Status: affected)
- 21.sp1 ap344238 (Status: affected)
- 21.0 ap364670 (Status: affected)
- 21.0 ap350338 (Status: affected)
- 21.sp1 ap360893 (Status: affected)
- 21.sp1 ap338965 (Status: affected)
- 21.sp1 ap353839 (Status: affected)
- 21.0 ap346085 (Status: affected)
- 21.sp1 ap355003 (Status: affected)
- 21.0 ap345850 (Status: affected)
- 21.0 ap340730 (Status: affected)
- 21.0 ap341908 (Status: affected)
- 21.sp1 ap358731 (Status: affected)
- 21.0 ap346607 (Status: affected)
- 21.0 ap350614 (Status: affected)
- 21.sp1 ap360907 (Status: affected)
- 21.sp1 ap356978 (Status: affected)
- 21.0 ap351898 (Status: affected)
- 21.0 ap242893 (Status: affected)
- 21.0 ap339346 (Status: affected)
- 21.sp1 ap358893 (Status: affected)
- 21.0 ap355904 (Status: affected)
- 21.sp1 ap366298 (Status: affected)
- 21.sp1 ap357049 (Status: affected)
- 21.sp1 ap365970 (Status: affected)
- 21.0 ap342792 (Status: affected)
- 21.sp1 ap349850 (Status: affected)
- 21.sp1 ap346554 (Status: affected)
- 21.sp1 ap340168 (Status: affected)
- 21.sp1 ap358019 (Status: affected)
- 21.0 ap347172 (Status: affected)
- 21.0 ap353701 (Status: affected)
- 21.sp1 ap342028 (Status: affected)
- 21.sp1 ap373899 (Status: affected)
- 21.0 ap359752 (Status: affected)
- 21.sp1 ap346337 (Status: affected)
- 21.sp1 ap367998 (Status: affected)
- 21.sp1 ap359829 (Status: affected)
- 21.0 ap345293 (Status: affected)
- 21.sp1 ap361559 (Status: affected)
- 21.sp1 ap368497 (Status: affected)
- 21.sp1 ap345069 (Status: affected)
- 21.sp1 ap342324 (Status: affected)
- 21.sp1 ap362961 (Status: affected)
- 21.sp1 ap348086 (Status: affected)
- 21.sp1 ap351700 (Status: affected)
- 21.sp1 ap373950 (Status: affected)
- 21.sp1 ap344290 (Status: affected)
- 21.sp1 ap358730 (Status: affected)
- 21.sp1 ap347983 (Status: affected)
- 21.sp1 ap350379 (Status: affected)
- 21.0 ap347930 (Status: affected)
- 21.0 ap343616 (Status: affected)
- 21.0 ap365730 (Status: affected)
- 21.0 ap343864 (Status: affected)
- 21.sp1 ap347975 (Status: affected)
- 21.sp1 ap355774 (Status: affected)
- 21.0 ap349390 (Status: affected)
- 21.0 ap342669 (Status: affected)
- 21.sp1 ap343883 (Status: affected)
- 21.sp1 ap344600 (Status: affected)
- 21.sp1 ap355616 (Status: affected)
- 21.sp1 ap364471 (Status: affected)
- 21.sp1 ap355825 (Status: affected)
- 21.0 ap357083 (Status: affected)
- 21.sp1 ap360373 (Status: affected)
- 21.sp1 ap354755 (Status: affected)
- 21.sp1 ap342669 (Status: affected)
- 21.0 ap347603 (Status: affected)
- 21.0 ap360586 (Status: affected)
- 21.0 ap360912 (Status: affected)
- 21.sp1 ap358889 (Status: affected)
- 21.sp1 ap364239 (Status: affected)
- 21.sp1 ap247533 (Status: affected)
- 21.sp1 ap345755 (Status: affected)
- 21.0 ap355825 (Status: affected)
- 21.0 ap342719 (Status: affected)
- 21.sp1 ap351160 (Status: affected)
- 21.sp1 ap379473 (Status: affected)
- 21.sp1 ap355904 (Status: affected)
- 21.0 ap361533 (Status: affected)
- 21.0 ap339206 (Status: affected)
- 21.sp1 ap350584 (Status: affected)
- 21.sp1 ap343229 (Status: affected)
- 21.sp1 ap350497 (Status: affected)
- 21.sp1 ap346253 (Status: affected)
- 21.0 ap346577 (Status: affected)
- 21.sp1 ap346183 (Status: affected)
- 21.0 ap350474 (Status: affected)
- 21.sp1 ap351898 (Status: affected)
- 21.sp1 ap364243 (Status: affected)
- 21.sp1 ap352728 (Status: affected)
- 21.0 ap343927 (Status: affected)
- 21.0 ap352109 (Status: affected)
- 21.0 ap249376 (Status: affected)
- 21.sp1 ap243808 (Status: affected)
- 21.sp1 ap344270 (Status: affected)
- 21.sp1 ap343927 (Status: affected)
- 21.0 ap353843 (Status: affected)
- 21.sp1 ap370654 (Status: affected)
- 21.sp1 ap358582 (Status: affected)
- 21.sp1 ap352969 (Status: affected)
- 21.0 ap359465 (Status: affected)
- 21.0 ap342483 (Status: affected)
- 21.sp1 ap347506 (Status: affected)
- 21.sp1 ap359536 (Status: affected)
- 21.0 ap346261 (Status: affected)
- 21.sp1 ap352402 (Status: affected)
- 21.sp1 ap339477 (Status: affected)
- 21.0 ap347905 (Status: affected)
- 21.0 ap362532 (Status: affected)
- 21.sp1 ap356503 (Status: affected)
- 21.0 ap347685 (Status: affected)
- 21.sp1 ap352082 (Status: affected)
- 21.sp1 ap361338 (Status: affected)
- 21.sp1 ap358411 (Status: affected)
- 21.sp1 ap369219 (Status: affected)
- 21.sp1 ap233913 (Status: affected)
- 21.0 ap355638 (Status: affected)
- 21.sp1 ap350491 (Status: affected)
- 21.0 ap350303 (Status: affected)
- 21.sp1 ap367109 (Status: affected)
- 21.0 ap355894 (Status: affected)
- 21.sp1 ap364559 (Status: affected)
- 21.sp1 ap354090 (Status: affected)
- 21.sp1 ap353520 (Status: affected)
- 21.sp1 ap343410 (Status: affected)
- 21.sp1 ap365379 (Status: affected)
- 21.sp1 ap358640 (Status: affected)
- 21.sp1 ap378258 (Status: affected)
- 21.0 ap353499 (Status: affected)
- 21.sp1 ap350308 (Status: affected)
- 21.sp1 ap366290 (Status: affected)
- 21.sp1 ap349222 (Status: affected)
- 21.sp1 ap235960 (Status: affected)
- 21.sp1 ap360295 (Status: affected)
- 21.0 ap362825 (Status: affected)
- 21.sp1 ap364898 (Status: affected)
- 21.0 ap359433 (Status: affected)
- 21.0 ap347548 (Status: affected)
- 21.0 ap349850 (Status: affected)
- 21.sp1 ap362848 (Status: affected)
- 21.sp1 ap347896 (Status: affected)
- 21.0 ap347506 (Status: affected)
- 21.0 ap342461 (Status: affected)
- 21.0 ap362637 (Status: affected)
- 21.sp1 ap353406 (Status: affected)
- 21.0 ap245441 (Status: affected)
- 21.sp1 ap346085 (Status: affected)
- 21.sp1 ap357670 (Status: affected)
- 21.sp1 ap364304 (Status: affected)
- 21.sp1 ap368604 (Status: affected)
- 21.sp1 ap345013 (Status: affected)
- 21.sp1 ap348891 (Status: affected)
- 21.sp1 ap373276 (Status: affected)
- 21.sp1 ap343864 (Status: affected)
- 21.0 ap350573 (Status: affected)
- 21.sp1 ap354454 (Status: affected)
- 21.0 ap361412 (Status: affected)
- 21.sp1 ap358578 (Status: affected)
- 21.0 ap345738 (Status: affected)
- 21.sp1 ap350090 (Status: affected)
- 21.0 ap344083 (Status: affected)
- 21.sp1 ap341350 (Status: affected)
- 21.sp1 ap342719 (Status: affected)
- 21.0 ap364879 (Status: affected)
- 21.0 ap343579 (Status: affected)
- 21.sp1 ap355027 (Status: affected)
- 21.0 ap348431 (Status: affected)
- 21.0 ap342060 (Status: affected)
- 21.sp1 ap346129 (Status: affected)
- 21.0 ap339897 (Status: affected)
- 21.sp1 ap354355 (Status: affected)
- 21.sp1 ap352896 (Status: affected)
- 21.sp1 ap348472 (Status: affected)
- 21.0 ap346724 (Status: affected)
- 21.0 ap361559 (Status: affected)
- 21.sp1 ap372351 (Status: affected)
- 21.0 ap349384 (Status: affected)
- 21.0 ap355027 (Status: affected)
- 21.sp1 ap358508 (Status: affected)
- 21.sp1 ap344083 (Status: affected)
- 21.sp1 ap358887 (Status: affected)
- 21.sp1 ap354557 (Status: affected)
- 21.sp1 ap342946 (Status: affected)
- 21.sp1 ap354180 (Status: affected)
- 21.sp1 ap359808 (Status: affected)
- 21.sp1 ap350110 (Status: affected)
- 21.0 ap343675 (Status: affected)
- 21.sp1 ap352806 (Status: affected)
- 21.sp1 ap249383 (Status: affected)
- 21.sp1 ap354559 (Status: affected)
- 21.sp1 ap372110 (Status: affected)
- 21.0 ap352340 (Status: affected)
- 21.sp1 ap346076 (Status: affected)
- 21.sp1 ap369132 (Status: affected)
- 21.0 ap358726 (Status: affected)
- 21.sp1 ap359172 (Status: affected)
- 21.sp1 ap355914 (Status: affected)
- 21.sp1 ap374144 (Status: affected)
- 21.0 ap358019 (Status: affected)
- 21.sp1 ap356271 (Status: affected)
- 21.sp1 ap356584 (Status: affected)
- 21.sp1 ap357087 (Status: affected)
- 21.sp1 ap360265 (Status: affected)
- 21.0 ap359119 (Status: affected)
- 21.sp1 ap361533 (Status: affected)
- 21.sp1 ap363845 (Status: affected)
- 21.0 ap345059 (Status: affected)
- 21.0 ap348527 (Status: affected)
- 21.sp1 ap361876 (Status: affected)
- 23.0 ap385283 (Status: affected)
- 23.0 ap385314 (Status: affected)
- 23.0 ap385274 (Status: affected)
- 23.0 ap385318 (Status: affected)
- 23.0 ap385327 (Status: affected)
- 23.0 ap385334 (Status: affected)
- RI.2023.07 (Status: affected)
- 23.0 ap385341 (Status: affected)
- 23.0 ap385329 (Status: affected)
- 23.0 ap385346 (Status: affected)
- 23.0 ap385351 (Status: affected)
- RI.2023.08 (Status: affected)
- 23.0 ap385360 (Status: affected)
- 23.0 ap385355 (Status: affected)
- 23.0 ap385333 (Status: affected)
- 23.0 ap385368 (Status: affected)
- 23.0 ap385370 (Status: affected)
- 23.0 ap385366 (Status: affected)
- 23.0 ap385373 (Status: affected)
- 23.0 ap385379 (Status: affected)
- RI.2023.09 (Status: affected)
- 23.0 ap385380 (Status: affected)
- 23.0 ap385330 (Status: affected)
- 23.0 ap385352 (Status: affected)
- 23.0 ap385384 (Status: affected)
- 23.0 ap385390 (Status: affected)
- 23.0 ap385389 (Status: affected)
- 23.0 ap385396 (Status: affected)
- 23.0 ap385399 (Status: affected)
- RI.2023.10 (Status: affected)
- 23.0 ap385404 (Status: affected)
- 23.0 ap385374 (Status: affected)
- 23.0 ap385413 (Status: affected)
- 23.0 ap385407 (Status: affected)
- 23.0 ap385395 (Status: affected)
- 23.0 ap385405 (Status: affected)
- RI.2023.11 (Status: affected)
- 23.0 ap385429 (Status: affected)
- 23.0 ap385430 (Status: affected)
- 23.0 ap385444 (Status: affected)
- RI.2023.12 (Status: affected)
- 23.0 ap385441 (Status: affected)
- 23.0 ap385424 (Status: affected)
- 23.0 ap385453 (Status: affected)
- RI.2024.01 (Status: affected)
- 23.0 ap385472 (Status: affected)
- 23.0 ap385459 (Status: affected)
- RI.2024.02 (Status: affected)
- 23.0 ap385475 (Status: affected)
- RI.2024.03 (Status: affected)
- 23.0 ap385487 (Status: affected)
- 23.0 ap385507 (Status: affected)
- RI.2024.04 (Status: affected)
- RI.2024.05 (Status: affected)
- 23.0 ap385528 (Status: affected)
- RI.2024.06 (Status: affected)
- RI.2024.07 (Status: affected)
- RI.2024.08 (Status: affected)
- RI.2024.09 (Status: affected)
- RI.2024.10 (Status: affected)
### References
1. [cisco-sa-bw-sip-dos-mSySbrmt](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt)
2. [ClamAV blog](https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html)
3. [https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2502, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2502 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2502
- **State**: PUBLISHED
- **Published Date**: August 19, 2015 at 10:00 UTC
- **Last Updated**: February 10, 2025 at 17:57 UTC
- **Reserved Date**: March 19, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," as exploited in the wild in August 2015.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1033317](http://www.securitytracker.com/id/1033317)
2. [](http://twitter.com/Laughing_Mantis/statuses/633839231840841728)
3. [76403](http://www.securityfocus.com/bid/76403)
4. [](http://www.securityweek.com/microsoft-issues-emergency-patch-critical-ie-flaw-exploited-wild)
5. [](http://twitter.com/Laughing_Mantis/statuses/633839771865886721)
6. [MS15-093](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-093) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17692, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17692 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17692
- **State**: PUBLISHED
- **Published Date**: December 21, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 20:59 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43376](https://www.exploit-db.com/exploits/43376/)
2. [](http://packetstormsecurity.com/files/145510/Samsung-Internet-Browser-SOP-Bypass.html)
3. [](https://datarift.blogspot.in/p/samsung-interent-browser-sop-bypass-cve.html)
4. [](https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/samsung_browser_sop_bypass.rb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23129
- **State**: PUBLISHED
- **Published Date**: January 21, 2022 at 18:17 UTC
- **Last Updated**: August 03, 2024 at 03:36 UTC
- **Reserved Date**: January 11, 2022 at 00:00 UTC
- **Assigned By**: Mitsubishi
### Vulnerability Description
Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information.
### Affected Products
**n/a - Mitsubishi Electric MC Works64; ICONICS GENESIS64**
Affected versions:
- Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior (Status: affected)
- ICONICS GENESIS64 versions 10.90 to 10.97 (Status: affected)
### References
1. [](https://jvn.jp/vu/JVNVU95403720/index.html)
2. [](https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01)
3. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-027_en.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42491, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42491
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 14:34 UTC
- **Last Updated**: September 17, 2024 at 13:40 UTC
- **Reserved Date**: September 11, 2023 at 07:58 UTC
- **Assigned By**: INCD
### Vulnerability Description
EisBaer Scada - CWE-285: Improper Authorization
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
** EisBaer Scada - EisBaer Scada**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://www.gov.il/en/Departments/faq/cve_advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12545, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12545 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12545
- **State**: PUBLISHED
- **Published Date**: January 04, 2025 at 07:24 UTC
- **Last Updated**: January 06, 2025 at 16:29 UTC
- **Reserved Date**: December 11, 2024 at 21:24 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.1. This is due to missing nonce validation on the reset_installation() function. This makes it possible for unauthenticated attackers to reset the plugin’s installation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**akashmalik - Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7cbc157b-4f1b-4212-9e5c-dd10dd443df7?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/scratch-win-giveaways-for-website-facebook/tags/2.7.0/includes/swin-api.php)
3. [](https://wordpress.org/plugins/scratch-win-giveaways-for-website-facebook/#developers)
4. [](https://plugins.trac.wordpress.org/changeset/3212730/)
### Credits
- Peter Thaleikis |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9118
- **State**: PUBLISHED
- **Published Date**: February 06, 2021 at 01:10 UTC
- **Last Updated**: August 04, 2024 at 10:19 UTC
- **Reserved Date**: February 18, 2020 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is an insufficient integrity check vulnerability in Huawei Sound X Product. The system does not check certain software package's integrity sufficiently. Successful exploit could allow an attacker to load a crafted software package to the device. Affected product versions include:AIS-BW80H-00 versions 9.0.3.1(H100SP13C00),9.0.3.1(H100SP18C00),9.0.3.1(H100SP3C00),9.0.3.1(H100SP9C00),9.0.3.2(H100SP1C00),9.0.3.2(H100SP2C00),9.0.3.2(H100SP5C00),9.0.3.2(H100SP8C00),9.0.3.3(H100SP1C00).
### Affected Products
**n/a - AIS-BW80H-00**
Affected versions:
- 9.0.3.1(H100SP13C00),9.0.3.1(H100SP18C00),9.0.3.1(H100SP3C00),9.0.3.1(H100SP9C00),9.0.3.2(H100SP1C00),9.0.3.2(H100SP2C00),9.0.3.2(H100SP5C00),9.0.3.2(H100SP8C00),9.0.3.3(H100SP1C00) (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210113-01-ais-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25955
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 00:00 UTC
- **Last Updated**: February 10, 2025 at 15:58 UTC
- **Reserved Date**: March 15, 2023 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
National land numerical information data conversion tool all versions improperly restricts XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the PC may be accessed by an attacker.
### Affected Products
**Ministry of Land, Infrastructure, Transport and Tourism, Japan - National land numerical information data conversion tool**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://nlftp.mlit.go.jp/i_news.html#news4)
2. [](https://jvn.jp/en/jp/JVN75742861/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8945
- **State**: PUBLISHED
- **Published Date**: March 22, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 07:10 UTC
- **Reserved Date**: March 22, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2018:3032](https://access.redhat.com/errata/RHSA-2018:3032)
2. [GLSA-201811-17](https://security.gentoo.org/glsa/201811-17)
3. [](https://sourceware.org/bugzilla/show_bug.cgi?id=22809)
4. [RHBA-2019:0327](https://access.redhat.com/errata/RHBA-2019:0327)
5. [openSUSE-SU-2019:2415](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html)
6. [openSUSE-SU-2019:2432](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html)
7. [USN-4336-1](https://usn.ubuntu.com/4336-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1080, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1080 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1080
- **State**: PUBLISHED
- **Published Date**: June 25, 2002 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
rmmount in SunOS 5.7 may mount file systems without the nosuid flag set, contrary to the documentation and its use in previous versions of SunOS, which could allow local users with physical access to gain root privileges by mounting a floppy or CD-ROM that contains a setuid program and running volcheck, when the file systems do not have the nosuid option specified in rmmount.conf.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19990510 SunOS 5.7 rmmount, no nosuid.](http://marc.info/?l=bugtraq&m=92633694100270&w=2)
2. [250](http://www.securityfocus.com/bid/250)
3. [solaris-rmmount-gain-root(8350)](https://exchange.xforce.ibmcloud.com/vulnerabilities/8350)
4. [19991011](http://marc.info/?l=bugtraq&m=93971288323395&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33673, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33673 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33673
- **State**: PUBLISHED
- **Published Date**: September 14, 2021 at 11:18 UTC
- **Last Updated**: August 03, 2024 at 23:58 UTC
- **Reserved Date**: May 28, 2021 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Under certain conditions, SAP Contact Center - version 700,does not sufficiently encode user-controlled inputs and persists in them. This allows an attacker to exploit a Stored Cross-Site Scripting (XSS) vulnerability when a user browses through the employee directory and to execute arbitrary code on the victim's browser. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands.
### Affected Products
**SAP SE - SAP Contact Center**
Affected versions:
- < 700 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405)
2. [](https://launchpad.support.sap.com/#/notes/3073891) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10578, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10578 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10578
- **State**: PUBLISHED
- **Published Date**: December 06, 2024 at 05:26 UTC
- **Last Updated**: December 06, 2024 at 16:07 UTC
- **Reserved Date**: October 31, 2024 at 12:31 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Pubnews theme for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the pubnews_importer_plugin_action_for_notice() function in all versions up to, and including, 1.0.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install arbitrary plugins that can be leveraged to exploit other vulnerabilities.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**blazethemes - Pubnews**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7eaa0117-5320-431f-b3d2-05a867901528?source=cve)
2. [](https://themes.trac.wordpress.org/browser/pubnews/1.0.7/inc/admin/admin.php#L1017)
3. [](https://themes.trac.wordpress.org/changeset/250743/pubnews/1.0.8?contextall=1&old=245552&old_path=%2Fpubnews%2F1.0.7)
### Credits
- Kevin Murphy |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27968
- **State**: PUBLISHED
- **Published Date**: May 08, 2023 at 00:00 UTC
- **Last Updated**: January 29, 2025 at 15:21 UTC
- **Reserved Date**: March 08, 2023 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213670) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24924, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24924
- **State**: PUBLISHED
- **Published Date**: February 13, 2024 at 09:00 UTC
- **Last Updated**: May 09, 2025 at 18:30 UTC
- **Reserved Date**: February 01, 2024 at 15:21 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Simcenter Femap (All versions < V2306.0000). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted Catia MODEL file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-22059)
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Siemens - Simcenter Femap**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-000072.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45354
- **State**: PUBLISHED
- **Published Date**: October 09, 2023 at 00:00 UTC
- **Last Updated**: September 19, 2024 at 15:30 UTC
- **Reserved Date**: October 09, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Atos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated remote attacker to execute arbitrary code on the operating system by using the Common Management Portal web interface. This is also known as OCMP-6589.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://networks.unify.com/security/advisories/OBSO-2306-02.pdf)
2. [](https://www.news.de/technik/857003738/unify-openscape-common-management-platform-gefaehrdet-it-sicherheitswarnung-vom-bsi-und-bug-report-update-zu-bekannten-schwachstellen-und-sicherheitsluecken-vom-03-07-2023/1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10157
- **State**: PUBLISHED
- **Published Date**: August 08, 2017 at 15:00 UTC
- **Last Updated**: October 04, 2024 at 18:58 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the BI Publisher component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). Supported versions that are affected are 11.1.1.7.0, 11.1.1.9.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher accessible data as well as unauthorized read access to a subset of BI Publisher accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - BI Publisher (formerly XML Publisher)**
Affected versions:
- 11.1.1.7.0 (Status: affected)
- 11.1.1.9.0 (Status: affected)
- 12.2.1.1.0 (Status: affected)
- 12.2.1.2.0 (Status: affected)
### References
1. [99694](http://www.securityfocus.com/bid/99694)
2. [1038940](http://www.securitytracker.com/id/1038940)
3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0132
- **State**: PUBLISHED
- **Published Date**: February 08, 2000 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:05 UTC
- **Reserved Date**: February 08, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Java Virtual Machine allows remote attackers to read files via the getSystemResourceAsStream function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [957](http://www.securityfocus.com/bid/957) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7700
- **State**: PUBLISHED
- **Published Date**: August 31, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 07:58 UTC
- **Reserved Date**: October 04, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Double-free vulnerability in the sPLT chunk structure and png.c in pngcrush before 1.7.87 allows attackers to have unspecified impact via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/pmt/news/2015/10/pngcrush-1787-released/)
2. [](http://pmt.sourceforge.net/pngcrush/changelog.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3622
- **State**: PUBLISHED
- **Published Date**: October 20, 2023 at 07:29 UTC
- **Last Updated**: September 11, 2024 at 15:54 UTC
- **Reserved Date**: October 20, 2022 at 19:50 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Blog2Social plugin for WordPress is vulnerable to authorization bypass due to missing capability checks in versions up to, and including, 6.9.11. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to change some plugin settings intended to be modifiable by admins only.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N`
### Affected Products
**pr-gateway - Blog2Social: Social Media Auto Post & Scheduler**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f5b8d39c-d307-42c9-a972-29b5521a82a4?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/blog2social/tags/6.9.10/includes/B2S/Settings/Item.php#L116)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2795052%40blog2social&new=2795052%40blog2social&sfp_email=&sfph_mail=)
4. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2796598%40blog2social&new=2796598%40blog2social&sfp_email=&sfph_mail=)
### Credits
- Marco Wotschka |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17368, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17368 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17368
- **State**: REJECTED
- **Published Date**: November 05, 2020 at 23:05 UTC
- **Last Updated**: November 05, 2020 at 23:05 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6742
- **State**: PUBLISHED
- **Published Date**: January 11, 2024 at 08:32 UTC
- **Last Updated**: August 02, 2024 at 08:42 UTC
- **Reserved Date**: December 12, 2023 at 16:09 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Gallery Plugin for WordPress – Envira Photo Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to an improper capability check on the 'envira_gallery_insert_images' function in all versions up to, and including, 1.8.7.1. This makes it possible for authenticated attackers, with contributor access and above, to modify galleries on other users' posts.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Affected Products
**smub - Gallery Plugin for WordPress – Envira Photo Gallery**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/40655278-6915-4a76-ac2d-bb161d3cee92?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/envira-gallery-lite/trunk/includes/admin/ajax.php)
3. [](https://plugins.trac.wordpress.org/changeset/3017115/envira-gallery-lite/tags/1.8.7.3/includes/admin/ajax.php)
### Credits
- Nex Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47693
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 12:00 UTC
- **Last Updated**: January 03, 2025 at 18:59 UTC
- **Reserved Date**: November 08, 2023 at 18:55 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Themefic Ultimate Addons for Contact Form 7 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ultimate Addons for Contact Form 7: from n/a through 3.2.6.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Themefic - Ultimate Addons for Contact Form 7**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/ultimate-addons-for-contact-form-7/vulnerability/wordpress-ultimate-addons-for-contact-form-7-plugin-3-2-5-broken-access-control-vulnerability?_s_id=cve)
### Credits
- minhtuanact (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4884
- **State**: PUBLISHED
- **Published Date**: January 25, 2010 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 02:32 UTC
- **Reserved Date**: January 25, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Oracle OLAP component in Oracle Database Server 10.1.0.4 (10g) allows remote authenticated attackers to affect availability via unknown vectors, aka DB02.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technology/deploy/security/pdf/cpujul2005.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8238, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8238 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8238
- **State**: PUBLISHED
- **Published Date**: June 13, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 16:27 UTC
- **Reserved Date**: April 25, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in a camera function.
### Affected Products
**Qualcomm, Inc. - All Qualcomm products**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41127, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41127
- **State**: PUBLISHED
- **Published Date**: August 02, 2024 at 14:46 UTC
- **Last Updated**: August 02, 2024 at 16:52 UTC
- **Reserved Date**: July 15, 2024 at 15:53 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Monkeytype is a minimalistic and customizable typing test. Monkeytype is vulnerable to Poisoned Pipeline Execution through Code Injection in its ci-failure-comment.yml GitHub Workflow, enabling attackers to gain pull-requests write access. The ci-failure-comment.yml workflow is triggered when the Monkey CI workflow completes. When it runs, it will download an artifact uploaded by the triggering workflow and assign the contents of ./pr_num/pr_num.txt artifact to the steps.pr_num_reader.outputs.content WorkFlow variable. It is not validated that the variable is actually a number and later it is interpolated into a JS script allowing an attacker to change the code to be executed. This issue leads to pull-requests write access. This vulnerability is fixed in 24.30.0.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-74: Security Weakness
### Affected Products
**monkeytypegame - monkeytype**
Affected versions:
- < 24.30.0 (Status: affected)
### References
1. [https://github.com/monkeytypegame/monkeytype/security/advisories/GHSA-wcjf-5464-4wq9](https://github.com/monkeytypegame/monkeytype/security/advisories/GHSA-wcjf-5464-4wq9)
2. [https://github.com/monkeytypegame/monkeytype/commit/29627fd0d5f152e2da59671987090ea0a5c29874](https://github.com/monkeytypegame/monkeytype/commit/29627fd0d5f152e2da59671987090ea0a5c29874)
3. [https://securitylab.github.com/advisories/GHSL-2024-167_monkeytype](https://securitylab.github.com/advisories/GHSL-2024-167_monkeytype) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7198
- **State**: PUBLISHED
- **Published Date**: March 31, 2019 at 23:38 UTC
- **Last Updated**: August 06, 2024 at 12:40 UTC
- **Reserved Date**: September 26, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OMERO before 5.0.6 has multiple CSRF vulnerabilities because the framework for OMERO's web interface lacks CSRF protection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.openmicroscopy.org/security/advisories/2014-SV3-csrf/)
2. [](http://lists.openmicroscopy.org.uk/pipermail/ome-users/2014-November/004871.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12490
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 18:55 UTC
- **Reserved Date**: August 05, 2017 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version.
### Affected Products
**Hewlett Packard Enterprise - Intelligent Management Center (iMC) PLAT**
Affected versions:
- PLAT 7.3 (E0504) (Status: affected)
### References
1. [1039152](http://www.securitytracker.com/id/1039152)
2. [100367](http://www.securityfocus.com/bid/100367)
3. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36471, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36471 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36471
- **State**: PUBLISHED
- **Published Date**: February 07, 2023 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 21:28 UTC
- **Reserved Date**: July 12, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory Traversal vulnerability in AdminLTE 3.1.0 allows remote attackers to gain escalated privilege and view sensitive information via /admin/index2.html, /admin/index3.html URIs. Note: AdminLTE developers dispute that this a weakness with AdminLTE and is instead a misconfiguration error on various websites by the website developers.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/cybersaki/31ffe679a5552c1047164e3a5b01c2fd)
2. [](https://github.com/ColorlibHQ/AdminLTE/issues/4948) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1087, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1087 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1087
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 15:37 UTC
- **Last Updated**: February 19, 2025 at 15:17 UTC
- **Reserved Date**: February 28, 2023 at 13:17 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WC Sales Notification WordPress plugin before 1.2.3 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
### Weakness Classification (CWE)
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - WC Sales Notification**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/356c89a1-81b6-4600-9291-1a74788af7f9)
### Credits
- WPScan
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24316, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24316
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 22:05 UTC
- **Last Updated**: August 03, 2024 at 04:07 UTC
- **Reserved Date**: February 02, 2022 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-665: Improper Initialization vulnerability exists that could cause information exposure when an attacker sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
### Weakness Classification (CWE)
- CWE-665: Security Weakness
### Affected Products
**n/a - Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)**
Affected versions:
- Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior) (Status: affected)
### References
1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-01)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-323/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15355, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15355
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 19:57 UTC
- **Reserved Date**: October 14, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei DP300, V500R002C00, RP200, V600R006C00, TE30, V100R001C10, V500R002C00,V600R006C00, TE40, V500R002C00, V600R006C00, TE50, V500R002C00,V600R006C00, TE60, V100R001C10, V500R002C00, V600R006C00, TX50,V500R002C00, V600R006C00 have a buffer overflow vulnerability. An attacker may send specially crafted HTTP messages to the affected products. Due insufficient input validation of three different parameters in the messages, successful exploit may cause some service abnormal.
### Affected Products
**Huawei Technologies Co., Ltd. - DP300,RP200,TE30,TE40,TE50,TE60,TX50**
Affected versions:
- DP300 ,V500R002C00 ,RP200 ,V600R006C00 ,TE30 ,V100R001C10 ,V500R002C00 ,V600R006C00 ,TE40 ,V500R002C00 ,V600R006C00 ,TE50 ,V500R002C00 ,V600R006C00 ,TE60 ,V100R001C10 ,V500R002C00 ,V600R006C00 ,TX50 ,V500R002C00 ,V600R006C00 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171108-02-http-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0250, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0250
- **State**: PUBLISHED
- **Published Date**: April 04, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: March 29, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Web Publishing feature in Netscape Enterprise Server 4.x and earlier allows remote attackers to list arbitrary directories under the web server root via the INDEX command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010124 [SAFER] Security Bulletin 010124.EXP.1.11](http://archives.neohapsis.com/archives/bugtraq/2001-01/0396.html)
2. [2285](http://www.securityfocus.com/bid/2285)
3. [netscape-enterprise-list-directories(5997)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5997) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40156
- **State**: PUBLISHED
- **Published Date**: February 14, 2024 at 13:38 UTC
- **Last Updated**: August 16, 2024 at 18:13 UTC
- **Reserved Date**: September 14, 2023 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled search path element in some Intel(R) SSU software before version 3.0.0.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**n/a - Intel(R) SSU software**
Affected versions:
- before version 3.0.0.2 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01011.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01011.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.