System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-1502, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-1502 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1502
- **State**: PUBLISHED
- **Published Date**: March 12, 2024 at 23:33 UTC
- **Last Updated**: August 01, 2024 at 19:24 UTC
- **Reserved Date**: February 14, 2024 at 17:56 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the tutor_delete_announcement() function in all versions up to, and including, 2.6.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary posts.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Affected Products
**themeum - Tutor LMS – eLearning and online course solution**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/834c4ca9-7173-4c84-8287-9916ec72935d?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3049105%40tutor&new=3049105%40tutor&sfp_email=&sfph_mail=)
### Credits
- Lucio Sá
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-5420, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-5420 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5420
- **State**: PUBLISHED
- **Published Date**: December 23, 2013 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 17:06 UTC
- **Reserved Date**: August 22, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The IMS server before Ifix 6 in IBM Security Access Manager for Enterprise Single Sign-On (ISAM ESSO) 8.2 allows remote authenticated users to read log files by leveraging helpdesk privileges for a direct request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ibm-sam-cve20135420-info-disc(87482)](https://exchange.xforce.ibmcloud.com/vulnerabilities/87482)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21660211)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-28822, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-28822 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28822
- **State**: PUBLISHED
- **Published Date**: May 13, 2022 at 14:27 UTC
- **Last Updated**: April 23, 2025 at 18:26 UTC
- **Reserved Date**: April 08, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Framemaker versions 2029u8 (and earlier) and 2020u4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Adobe - FrameMaker**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/framemaker/apsb22-27.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-4462, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-4462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4462
- **State**: PUBLISHED
- **Published Date**: May 09, 2025 at 05:00 UTC
- **Last Updated**: May 09, 2025 at 15:51 UTC
- **Reserved Date**: May 08, 2025 at 19:07 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in TOTOLINK N150RT 3.4.0-B20190525. This issue affects some unknown processing of the file /boafrm/formWsc. The manipulation of the argument localPin leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
- CWE-119: Security Weakness
### Affected Products
**TOTOLINK - N150RT**
Affected versions:
- 3.4.0-B20190525 (Status: affected)
### References
1. [VDB-308081 | TOTOLINK N150RT formWsc buffer overflow](https://vuldb.com/?id.308081)
2. [VDB-308081 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.308081)
3. [Submit #565958 | TOTOLINK N150RT V3.4.0-B20190525 Buffer Overflow](https://vuldb.com/?submit.565958)
4. [](https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/N150RT/BufferOverflow_formWsc_2)
5. [](https://www.totolink.net/)
### Credits
- lcyf-fizz (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-0540, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-0540 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0540
- **State**: PUBLISHED
- **Published Date**: July 17, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 18:30 UTC
- **Reserved Date**: January 11, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier and 5.5.23 and earlier allows remote authenticated users to affect availability, related to GIS Extension.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2012:1462](http://rhn.redhat.com/errata/RHSA-2012-1462.html)
2. [1027263](http://www.securitytracker.com/id?1027263)
3. [53372](http://secunia.com/advisories/53372)
4. [GLSA-201308-06](http://security.gentoo.org/glsa/glsa-201308-06.xml)
5. [mysql-gisextension-dos(77061)](https://exchange.xforce.ibmcloud.com/vulnerabilities/77061)
6. [54551](http://www.securityfocus.com/bid/54551)
7. [83976](http://osvdb.org/83976)
8. [51309](http://secunia.com/advisories/51309)
9. [](http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html)
10. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-1073, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-1073 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1073
- **State**: PUBLISHED
- **Published Date**: June 19, 2018 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 03:51 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The web console login form in ovirt-engine before version 4.2.3 returned different errors for non-existent users and invalid passwords, allowing an attacker to discover the names of valid user accounts.
### Weakness Classification (CWE)
- CWE-209: Improper Input Validation
### Affected Products
**[UNKNOWN] - ovirt-engine**
Affected versions:
- ovirt-engine 4.2.3 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1073)
2. [104189](http://www.securityfocus.com/bid/104189)
3. [RHSA-2018:1525](https://access.redhat.com/errata/RHSA-2018:1525)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-3851, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-3851 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3851
- **State**: PUBLISHED
- **Published Date**: August 05, 2016 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 00:10 UTC
- **Reserved Date**: March 30, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The LG Electronics bootloader Android before 2016-08-05 on Nexus 5X devices allows attackers to gain privileges by leveraging access to a privileged process, aka internal bug 29189941.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-08-01.html)
2. [92251](http://www.securityfocus.com/bid/92251)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-20622, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-20622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20622
- **State**: PUBLISHED
- **Published Date**: December 31, 2018 at 19:00 UTC
- **Last Updated**: May 06, 2025 at 16:23 UTC
- **Reserved Date**: December 31, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JasPer 2.0.14 has a memory leak in base/jas_malloc.c in libjasper.a when "--output-format jp2" is used.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-lts-announce] 20190102 [SECURITY] [DLA 1628-1] jasper security update](https://lists.debian.org/debian-lts-announce/2019/01/msg00003.html)
2. [106373](http://www.securityfocus.com/bid/106373)
3. [](https://github.com/mdadams/jasper/issues/193)
4. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
5. [openSUSE-SU-2020:1517](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html)
6. [openSUSE-SU-2020:1523](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-6931, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-6931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6931
- **State**: PUBLISHED
- **Published Date**: March 01, 2018 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 19:15 UTC
- **Reserved Date**: March 16, 2017 at 00:00 UTC
- **Assigned By**: drupal
### Vulnerability Description
In Drupal versions 8.4.x versions before 8.4.5 the Settings Tray module has a vulnerability that allows users to update certain data that they do not have the permissions for. If you have implemented a Settings Tray form in contrib or a custom module, the correct access checks should be added. This release fixes the only two implementations in core, but does not harden against other such bypasses. This vulnerability can be mitigated by disabling the Settings Tray module.
### Affected Products
**Drupal.org - Drupal Core**
Affected versions:
- 8.4.x versions before 8.4.5 (Status: affected)
### References
1. [](https://www.drupal.org/sa-core-2018-001)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-17469, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-17469 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-17469
- **State**: PUBLISHED
- **Published Date**: December 11, 2020 at 22:39 UTC
- **Last Updated**: August 04, 2024 at 13:53 UTC
- **Reserved Date**: August 10, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kb.cert.org/vuls/id/815128)
2. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01)
3. [](http://fnet.sourceforge.net/manual/fnet_history.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-2813, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-2813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2813
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 13:29 UTC
- **Last Updated**: September 27, 2024 at 19:08 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Email Center product of Oracle E-Business Suite (component: KB Search). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - Email Center**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
- 12.2.3-12.2.9 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-18773, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-18773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18773
- **State**: PUBLISHED
- **Published Date**: April 22, 2020 at 14:46 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6100 before V1.0.0.55, D7800 before V1.0.1.24, EX6150v2 before 1.0.0.48, R6100 before 1.0.1.14, R7500 before 1.0.0.110, R7500v2 before V1.0.3.16, R7800 before V1.0.2.36, WNDR4300v1 before 1.0.2.90, WNDR4300v2 before 1.0.0.48, WNDR4500v3 before 1.0.0.48, and WNR2000v5 before 1.0.0.48.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000049556/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2184)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-5899, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-5899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5899
- **State**: PUBLISHED
- **Published Date**: July 06, 2018 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 16:38 UTC
- **Reserved Date**: January 19, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05, whenever TDLS connection is setup, we are freeing the netbuf in ol_tx_completion_handler and after that, we are accessing it in NBUF_UPDATE_TX_PKT_COUNT causing a use after free.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin)
2. [](https://source.android.com/security/bulletin/pixel/2018-06-01#qualcomm-components)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-3199, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-3199 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3199
- **State**: PUBLISHED
- **Published Date**: January 22, 2021 at 02:41 UTC
- **Last Updated**: August 03, 2024 at 16:45 UTC
- **Reserved Date**: January 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal with remote code execution can occur in /upload in ONLYOFFICE Document Server before 5.6.3, when JWT is used, via a /.. sequence in an image upload parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ONLYOFFICE/DocumentServer/blob/903fe5ab7a275bd69c3c3346af2d21cf87ebeabf/CHANGELOG.md#563)
2. [](https://github.com/nola-milkin/poc_exploits/blob/master/CVE-2021-3199/poc_uploadImageFile.py)
3. [](https://github.com/moehw/poc_exploits/tree/master/CVE-2021-3199/poc_uploadImageFile.py)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-3701, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-3701 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3701
- **State**: PUBLISHED
- **Published Date**: July 30, 2020 at 11:40 UTC
- **Last Updated**: August 04, 2024 at 07:44 UTC
- **Reserved Date**: December 17, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Use after free issue while processing error notification from camx driver due to not properly releasing the sequence data in Snapdragon Mobile in Saipan, SM8250, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile**
Affected versions:
- Saipan, SM8250, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-10294, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-10294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10294
- **State**: PUBLISHED
- **Published Date**: May 02, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 07:32 UTC
- **Reserved Date**: April 22, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Flexense DiskBoss Enterprise v7.4.28 to v9.1.16 has XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20180501 XSS-Flexense-DiskBoss-Enterprise-all-versions](http://seclists.org/fulldisclosure/2018/May/3)
2. [](http://blog.n0ipr0cs.io/post/2018/04/29/XSS-Flexense-DiskBoss-Enterprise-all-versions)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-48288, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-48288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48288
- **State**: PUBLISHED
- **Published Date**: December 21, 2023 at 14:05 UTC
- **Last Updated**: August 02, 2024 at 21:23 UTC
- **Reserved Date**: November 13, 2023 at 23:43 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in HM Plugin WordPress Job Board and Recruitment Plugin – JobWP.This issue affects WordPress Job Board and Recruitment Plugin – JobWP: from n/a through 2.1.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**HM Plugin - WordPress Job Board and Recruitment Plugin – JobWP**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/jobwp/wordpress-jobwp-plugin-2-1-sensitive-data-exposure-on-resume-files-vulnerability?_s_id=cve)
### Credits
- MyungJu Kim (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-7623, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-7623 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7623
- **State**: PUBLISHED
- **Published Date**: April 10, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 16:12 UTC
- **Reserved Date**: April 10, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The iwmiffr_convert_row32 function in imagew-miff.c in libimageworsener.a in ImageWorsener 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jsummers/imageworsener/issues/12)
2. [97577](http://www.securityfocus.com/bid/97577)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-2743, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-2743 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2743
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: February 26, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-46567, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-46567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46567
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 19:44 UTC
- **Last Updated**: August 04, 2024 at 05:10 UTC
- **Reserved Date**: January 26, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15028.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Bentley - MicroStation CONNECT**
Affected versions:
- 10.16.0.80 (Status: affected)
### References
1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-154/)
### Credits
- xina1i
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-29730, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-29730 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29730
- **State**: PUBLISHED
- **Published Date**: May 27, 2022 at 12:56 UTC
- **Last Updated**: August 03, 2024 at 06:33 UTC
- **Reserved Date**: April 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
USR IOT 4G LTE Industrial Cellular VPN Router v1.0.36 was discovered to contain hard-coded credentials for its highest privileged account. The credentials cannot be altered through normal operation of the device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.pusr.com/)
2. [](https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5705.php)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-8583, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-8583 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8583
- **State**: PUBLISHED
- **Published Date**: December 16, 2014 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 13:25 UTC
- **Reserved Date**: November 04, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1111034)
2. [68111](http://www.securityfocus.com/bid/68111)
3. [](http://advisories.mageia.org/MGASA-2014-0513.html)
4. [](http://modwsgi.readthedocs.org/en/latest/release-notes/version-4.2.4.html)
5. [[oss-security] 20140619 CVE request: mod_wsgi group privilege dropping [was Re: Security release for mod_wsgi (version 3.5)]](http://www.openwall.com/lists/oss-security/2014/06/19/7)
6. [GLSA-201612-49](https://security.gentoo.org/glsa/201612-49)
7. [openSUSE-SU-2014:1590](http://lists.opensuse.org/opensuse-updates/2014-12/msg00036.html)
8. [[oss-security] 20141104 Re: CVE request: mod_wsgi group privilege dropping [was Re: Security release for mod_wsgi (version 3.5)]](http://www.openwall.com/lists/oss-security/2014/11/04/8)
9. [MDVSA-2014:253](http://www.mandriva.com/security/advisories?name=MDVSA-2014:253)
10. [USN-2431-1](http://www.ubuntu.com/usn/USN-2431-1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-4720, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-4720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4720
- **State**: PUBLISHED
- **Published Date**: October 23, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 10:24 UTC
- **Reserved Date**: October 23, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in The Gemini Portal 4.7 allow remote attackers to execute arbitrary PHP code via a URL in the lang parameter to (1) page/forums/bottom.php and (2) page/forums/category.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31433](http://www.securityfocus.com/bid/31433)
2. [32057](http://secunia.com/advisories/32057)
3. [4503](http://securityreason.com/securityalert/4503)
4. [6587](https://www.exploit-db.com/exploits/6587)
5. [thegeminiportal-bottom-file-include(45481)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45481)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2003-0373, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2003-0373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0373
- **State**: PUBLISHED
- **Published Date**: June 06, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:50 UTC
- **Reserved Date**: June 04, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in libnasl in Nessus before 2.0.6 allow local users with plugin upload privileges to cause a denial of service (core dump) and possibly execute arbitrary code via (1) a long proto argument to the scanner_add_port function, (2) a long user argument to the ftp_log_in function, (3) a long pass argument to the ftp_log_in function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20030522 Potential security vulnerability in Nessus](http://marc.info/?l=bugtraq&m=105364059803427&w=2)
2. [20030523 nessus NASL scripting engine security issues](http://marc.info/?l=bugtraq&m=105369506714849&w=2)
3. [7664](http://www.securityfocus.com/bid/7664)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-1640, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-1640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1640
- **State**: PUBLISHED
- **Published Date**: May 15, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 05:20 UTC
- **Reserved Date**: May 15, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in Nucleus Data Recovery Kernel Recovery for Macintosh 4.04 allows user-assisted attackers to execute arbitrary code via a crafted .AMHH file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [34846](http://www.securityfocus.com/bid/34846)
2. [](http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Macintosh-v-4-04-Buffer-Overflow)
3. [](http://www.insight-tech.org/xploits/KernelrecoveryforMacintoshv.4.04BufferOverflow.py)
4. [54224](http://osvdb.org/54224)
5. [nucleus-amhh-bo(50345)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50345)
6. [34860](http://secunia.com/advisories/34860)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-37785, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-37785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37785
- **State**: PUBLISHED
- **Published Date**: July 13, 2023 at 00:00 UTC
- **Last Updated**: October 30, 2024 at 16:08 UTC
- **Reserved Date**: July 10, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in ImpressCMS v1.4.5 and before allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the smile_code parameter of the component /editprofile.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/CrownZTX/cve-description)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-31031, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-31031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31031
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 01:46 UTC
- **Reserved Date**: March 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in `coap_pdu.c` in libcoap 4.3.4 allows attackers to cause undefined behavior via a sequence of messages leading to unsigned integer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/obgm/libcoap/issues/1351)
2. [FEDORA-2024-450b75e4a0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LPENEJBV3KSASIYKNZAKXDAH7Q66KPYG/)
3. [FEDORA-2024-75863445ff](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUL7QDYFGEIJVO2ZSG4O5HEAWR6PFC52/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-20689, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-20689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20689
- **State**: PUBLISHED
- **Published Date**: April 16, 2020 at 14:24 UTC
- **Last Updated**: August 05, 2024 at 02:46 UTC
- **Reserved Date**: April 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6000 before 1.0.0.75, D6100 before 1.0.0.63, EX2700 before 1.0.1.48, EX6100v2 before 1.0.1.76, EX6150v2 before 1.0.1.76, EX6200v2 before 1.0.1.72, EX6400 before 1.0.2.136, EX7300 before 1.0.2.136, EX8000 before 1.0.1.180, R7800 before 1.0.2.52, R8900 before 1.0.4.2, R9000 before 1.0.4.2, WN2000RPTv3 before 1.0.1.32, WN3000RPv2 before 1.0.0.68, WN3100RPv2 before 1.0.0.60, WNDR3700v4 before 1.0.2.102, WNDR4300v1 before 1.0.2.104, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, WNR2000v5 before 1.0.0.68, and XR500 before 2.3.2.32.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000061450/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0132)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-5086, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-5086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5086
- **State**: PUBLISHED
- **Published Date**: October 05, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 00:53 UTC
- **Reserved Date**: May 26, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Johnson & Johnson Animas OneTouch Ping devices allow remote attackers to bypass authentication via replay attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://community.rapid7.com/community/infosec/blog/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump)
2. [](http://www.kb.cert.org/vuls/id/BLUU-A9SQRS)
3. [](https://ics-cert.us-cert.gov/advisories/ICSMA-16-279-01)
4. [VU#884840](http://www.kb.cert.org/vuls/id/884840)
5. [93351](http://www.securityfocus.com/bid/93351)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-34801, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-34801 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34801
- **State**: PUBLISHED
- **Published Date**: June 30, 2022 at 17:48 UTC
- **Last Updated**: August 03, 2024 at 09:22 UTC
- **Reserved Date**: June 29, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Build Notifications Plugin 1.5.0 and earlier transmits tokens in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
### Affected Products
**Jenkins project - Jenkins Build Notifications Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.5.0 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2056)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-12751, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-12751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12751
- **State**: PUBLISHED
- **Published Date**: December 30, 2024 at 20:13 UTC
- **Last Updated**: January 01, 2025 at 04:56 UTC
- **Reserved Date**: December 18, 2024 at 16:29 UTC
- **Assigned By**: zdi
### Vulnerability Description
Foxit PDF Reader AcroForm Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25344.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 2024.2.3.25184 (Status: affected)
### References
1. [ZDI-24-1737](https://www.zerodayinitiative.com/advisories/ZDI-24-1737/)
2. [vendor-provided URL](https://www.foxit.com/support/security-bulletins.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-44131, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-44131 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44131
- **State**: PUBLISHED
- **Published Date**: September 16, 2024 at 23:22 UTC
- **Last Updated**: March 25, 2025 at 16:10 UTC
- **Reserved Date**: August 20, 2024 at 21:42 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed with improved validation of symlinks. This issue is fixed in iOS 18 and iPadOS 18, macOS Sequoia 15. An app may be able to access sensitive user data.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/121238)
2. [](https://support.apple.com/en-us/121250)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-1892, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-1892 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1892
- **State**: PUBLISHED
- **Published Date**: June 08, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:06 UTC
- **Reserved Date**: June 08, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FlatNuke 2.5.3 allows remote attackers to cause a denial of service or obtain sensitive information via (1) a direct request to foot_news.php, which triggers an infinite loop, or (2) direct requests to unknown scripts, which reveals the web document root in an error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1014114](http://securitytracker.com/id?1014114)
2. [15603](http://secunia.com/advisories/15603)
3. [](http://secwatch.org/advisories/secwatch/20050604_flatnuke.txt)
4. [ADV-2005-0697](http://www.vupen.com/english/advisories/2005/0697)
5. [](http://flatnuke.sourceforge.net/index.php?mod=read&id=1117979256)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-42685, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-42685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42685
- **State**: PUBLISHED
- **Published Date**: December 04, 2023 at 00:54 UTC
- **Last Updated**: May 29, 2025 at 14:11 UTC
- **Reserved Date**: September 13, 2023 at 07:40 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000**
Affected versions:
- Android11/Android12/Android13 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-39401, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-39401 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39401
- **State**: PUBLISHED
- **Published Date**: August 14, 2024 at 11:57 UTC
- **Last Updated**: September 17, 2024 at 11:05 UTC
- **Reserved Date**: June 24, 2024 at 20:32 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an admin attacker. Exploitation of this issue requires user interaction and scope is changed.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Adobe - Adobe Commerce**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/magento/apsb24-61.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-41901, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-41901 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41901
- **State**: PUBLISHED
- **Published Date**: November 18, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 16:03 UTC
- **Reserved Date**: September 30, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an open source platform for machine learning. An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in `tf.raw_ops.SparseMatrixNNZ`. We have patched the issue in GitHub commit f856d02e5322821aad155dad9b3acab1e9f5d693. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- >= 2.10.0, < 2.10.1 (Status: affected)
- >= 2.9.0, < 2.9.3 (Status: affected)
- < 2.8.4 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g9fm-r5mm-rf9f)
2. [](https://github.com/tensorflow/tensorflow/commit/f856d02e5322821aad155dad9b3acab1e9f5d693)
3. [](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/sparse/sparse_matrix.h)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-2716, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-2716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2716
- **State**: PUBLISHED
- **Published Date**: May 14, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 05:24 UTC
- **Reserved Date**: March 25, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2602-1](http://www.ubuntu.com/usn/USN-2602-1)
2. [RHSA-2015:0988](http://rhn.redhat.com/errata/RHSA-2015-0988.html)
3. [](https://www.tenable.com/security/tns-2016-20)
4. [](https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7)
5. [74611](http://www.securityfocus.com/bid/74611)
6. [openSUSE-SU-2015:0892](http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html)
7. [DSA-3264](http://www.debian.org/security/2015/dsa-3264)
8. [DSA-3260](http://www.debian.org/security/2015/dsa-3260)
9. [SUSE-SU-2015:0978](http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html)
10. [](https://hg.mozilla.org/releases/mozilla-esr31/rev/2f3e78643f5c)
11. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
12. [openSUSE-SU-2015:0934](http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html)
13. [](http://www.mozilla.org/security/announce/2015/mfsa2015-54.html)
14. [USN-2603-1](http://www.ubuntu.com/usn/USN-2603-1)
15. [SUSE-SU-2015:0960](http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html)
16. [RHSA-2015:1012](http://rhn.redhat.com/errata/RHSA-2015-1012.html)
17. [openSUSE-SU-2015:1266](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html)
18. [GLSA-201605-06](https://security.gentoo.org/glsa/201605-06)
19. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1140537)
20. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10365)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-3754, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-3754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3754
- **State**: PUBLISHED
- **Published Date**: July 19, 2023 at 03:00 UTC
- **Last Updated**: August 02, 2024 at 07:08 UTC
- **Reserved Date**: July 18, 2023 at 16:33 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in Creativeitem Ekushey Project Manager CRM 5.0. Affected is an unknown function of the file /index.php/client/message/message_read/xxxxxxxx[random-msg-hash]. The manipulation of the argument message leads to cross site scripting. It is possible to launch the attack remotely. VDB-234426 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Creativeitem - Ekushey Project Manager CRM**
Affected versions:
- 5.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.234426)
2. [](https://vuldb.com/?ctiid.234426)
### Credits
- skalvin (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-7676, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-7676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7676
- **State**: PUBLISHED
- **Published Date**: October 21, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:56 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Home Made Air Freshener (aka com.wHomeMadeAirFreshener) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#945937](http://www.kb.cert.org/vuls/id/945937)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2000-0326, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2000-0326 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0326
- **State**: PUBLISHED
- **Published Date**: May 18, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:14 UTC
- **Reserved Date**: May 11, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Meeting Maker uses weak encryption (a polyalphabetic substitution cipher) for passwords, which allows remote attackers to sniff and decrypt passwords for Meeting Maker accounts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1151](http://www.securityfocus.com/bid/1151)
2. [](http://support.on.com/support/mmxp.nsf/31af51e08bcc93eb852565a90056138b/11af70407a16b165852568c50056a952?OpenDocument)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-4609, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-4609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4609
- **State**: PUBLISHED
- **Published Date**: December 19, 2022 at 00:00 UTC
- **Last Updated**: April 14, 2025 at 18:03 UTC
- **Reserved Date**: December 19, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**usememos - usememos/memos**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/5b3115c5-776c-43d3-a7be-c8dc13ab81ce)
2. [](https://github.com/usememos/memos/commit/726285e63467820f94cbf872abe71025a161c212)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-38470, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-38470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38470
- **State**: PUBLISHED
- **Published Date**: November 02, 2023 at 14:57 UTC
- **Last Updated**: August 29, 2024 at 14:21 UTC
- **Reserved Date**: July 18, 2023 at 09:48 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-617: Security Weakness
### Affected Products
**n/a - avahi**
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 9**
**Fedora - Fedora**
### References
1. [](https://access.redhat.com/security/cve/CVE-2023-38470)
2. [RHBZ#2191690](https://bugzilla.redhat.com/show_bug.cgi?id=2191690)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-1769, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-1769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1769
- **State**: PUBLISHED
- **Published Date**: March 31, 2023 at 11:00 UTC
- **Last Updated**: August 02, 2024 at 05:57 UTC
- **Reserved Date**: March 31, 2023 at 10:30 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in SourceCodester Grade Point Average GPA Calculator 1.0. Affected is an unknown function of the file index.php. The manipulation of the argument page with the input php://filter/read=convert.base64-encode/resource=grade_table leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224670 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**SourceCodester - Grade Point Average GPA Calculator**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.224670)
2. [](https://vuldb.com/?ctiid.224670)
3. [](https://github.com/Pe4cefulSnow/CVE-Advisory/blob/main/README.md)
### Credits
- Pe4cefulSnow (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-10343, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-10343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10343
- **State**: PUBLISHED
- **Published Date**: October 19, 2017 at 17:00 UTC
- **Last Updated**: October 04, 2024 at 16:49 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Import/Export). Supported versions that are affected are 2.8 and 2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).
### Affected Products
**Oracle Corporation - Hospitality Simphony**
Affected versions:
- 2.8 (Status: affected)
- 2.9 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html)
2. [101409](http://www.securityfocus.com/bid/101409)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-45140, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-45140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45140
- **State**: PUBLISHED
- **Published Date**: November 08, 2023 at 15:26 UTC
- **Last Updated**: September 12, 2024 at 19:10 UTC
- **Reserved Date**: October 04, 2023 at 16:02 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
The Bastion provides authentication, authorization, traceability and auditability for SSH accesses. SCP and SFTP plugins don't honor group-based JIT MFA. Establishing a SCP/SFTP connection through The Bastion via a group access where MFA is enforced does not ask for additional factor. This abnormal behavior only applies to per-group-based JIT MFA. Other MFA setup types, such as Immediate MFA, JIT MFA on a per-plugin basis and JIT MFA on a per-account basis are not affected. This issue has been patched in version 3.14.15.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**ovh - the-bastion**
Affected versions:
- >= 3.0.0, <= 3.14.0 (Status: affected)
### References
1. [https://github.com/ovh/the-bastion/security/advisories/GHSA-pr4q-w883-pf5x](https://github.com/ovh/the-bastion/security/advisories/GHSA-pr4q-w883-pf5x)
2. [https://github.com/ovh/the-bastion/releases/tag/v3.14.15](https://github.com/ovh/the-bastion/releases/tag/v3.14.15)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-33467, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-33467 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33467
- **State**: PUBLISHED
- **Published Date**: July 26, 2022 at 12:52 UTC
- **Last Updated**: August 03, 2024 at 23:50 UTC
- **Reserved Date**: May 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in yasm version 1.3.0. There is a use-after-free in pp_getline() in modules/preprocs/nasm/nasm-pp.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yasm/yasm/issues/163)
2. [](https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-21300, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-21300 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21300
- **State**: PUBLISHED
- **Published Date**: January 19, 2022 at 11:23 UTC
- **Last Updated**: September 24, 2024 at 20:26 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the PeopleSoft Enterprise CS SA Integration Pack product of Oracle PeopleSoft (component: Snapshot Integration). Supported versions that are affected are 9.0 and 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise CS SA Integration Pack. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise CS SA Integration Pack accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - PeopleSoft Enterprise CS SA Integration Pack**
Affected versions:
- 9.0 (Status: affected)
- 9.2 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2022.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-1294, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-1294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1294
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 17:11 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Office Shortcut Bar (OSB) in Windows 3.51 enables backup and restore permissions, which are inherited by programs such as File Manager that are started from the Shortcut Bar, which could allow local users to read folders for which they do not have permission.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [Q146604](http://support.microsoft.com/support/kb/articles/q146/6/04.asp)
2. [nt-filemgr(562)](https://exchange.xforce.ibmcloud.com/vulnerabilities/562)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-4091, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-4091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4091
- **State**: PUBLISHED
- **Published Date**: November 03, 2023 at 07:56 UTC
- **Last Updated**: November 23, 2024 at 02:00 UTC
- **Reserved Date**: August 02, 2023 at 09:43 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**Red Hat - Red Hat Enterprise Linux 8**
Affected versions:
- 0:4.18.6-2.el8_9 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8**
Affected versions:
- 0:4.18.6-2.el8_9 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.6 Extended Update Support**
Affected versions:
- 0:4.15.5-13.el8_6 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.8 Extended Update Support**
Affected versions:
- 0:4.17.5-4.el8_8 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:4.18.6-101.el9_3 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:4.18.6-101.el9_3 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.0 Extended Update Support**
Affected versions:
- 0:4.15.5-111.el9_0 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
Affected versions:
- 0:4.17.5-104.el9_2 (Status: unaffected)
**Red Hat - Red Hat Virtualization 4 for Red Hat Enterprise Linux 8**
Affected versions:
- 0:4.15.5-13.el8_6 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Storage 3**
### References
1. [RHSA-2023:6209](https://access.redhat.com/errata/RHSA-2023:6209)
2. [RHSA-2023:6744](https://access.redhat.com/errata/RHSA-2023:6744)
3. [RHSA-2023:7371](https://access.redhat.com/errata/RHSA-2023:7371)
4. [RHSA-2023:7408](https://access.redhat.com/errata/RHSA-2023:7408)
5. [RHSA-2023:7464](https://access.redhat.com/errata/RHSA-2023:7464)
6. [RHSA-2023:7467](https://access.redhat.com/errata/RHSA-2023:7467)
7. [](https://access.redhat.com/security/cve/CVE-2023-4091)
8. [RHBZ#2241882](https://bugzilla.redhat.com/show_bug.cgi?id=2241882)
9. [](https://bugzilla.samba.org/show_bug.cgi?id=15439)
10. [](https://www.samba.org/samba/security/CVE-2023-4091.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-2125, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-2125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2125
- **State**: PUBLISHED
- **Published Date**: May 27, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:15 UTC
- **Reserved Date**: May 27, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in blackd.exe for BlackICE PC Protection 3.6 and other versions before 3.6.ccb, with application protection off, allows local users to gain system privileges by modifying the .INI file to contain a long packetLog.fileprefix value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [blackice-blackdexe-bo(14965)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14965)
2. [9514](http://www.securityfocus.com/bid/9514)
3. [3740](http://www.osvdb.org/3740)
4. [20040128 SRT2004-01-17-0227 - BlackICE allows local users to become SYSTEM](http://marc.info/?l=bugtraq&m=107530966524193&w=2)
5. [[ISSForum] 20040128 Third party BlackICE advisory](http://archives.neohapsis.com/archives/iss/2004-q1/0157.html)
6. [10739](http://secunia.com/advisories/10739)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-2528, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-2528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2528
- **State**: PUBLISHED
- **Published Date**: July 19, 2011 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 23:08 UTC
- **Reserved Date**: June 15, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Unspecified vulnerability in (1) Zope 2.12.x before 2.12.19 and 2.13.x before 2.13.8, as used in Plone 4.x and other products, and (2) PloneHotfix20110720 for Plone 3.x allows attackers to gain privileges via unspecified vectors, related to a "highly serious vulnerability." NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-0720.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45056](http://secunia.com/advisories/45056)
2. [](http://plone.org/products/plone/security/advisories/20110622)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=718824)
4. [[oss-security] 20110712 Re: CVE request: plone privilege escalation flaw](http://www.openwall.com/lists/oss-security/2011/07/12/9)
5. [[zone-announce] 20110628 Security Hotfix 20110622 released](https://mail.zope.org/pipermail/zope-announce/2011-June/002260.html)
6. [](http://plone.org/products/plone-hotfix/releases/20110622)
7. [45111](http://secunia.com/advisories/45111)
8. [[oss-security] 20110704 CVE request: plone privilege escalation flaw](http://www.openwall.com/lists/oss-security/2011/07/04/6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-23396, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-23396 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23396
- **State**: PUBLISHED
- **Published Date**: March 14, 2023 at 16:55 UTC
- **Last Updated**: February 28, 2025 at 20:05 UTC
- **Reserved Date**: January 11, 2023 at 22:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Microsoft - Microsoft Office Online Server**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office Web Apps Server 2013 Service Pack 1**
Affected versions:
- 15.0.1 (Status: affected)
### References
1. [Microsoft Excel Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23396)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-25422, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-25422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25422
- **State**: PUBLISHED
- **Published Date**: February 28, 2024 at 00:00 UTC
- **Last Updated**: March 28, 2025 at 23:42 UTC
- **Reserved Date**: February 07, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection vulnerability in SEMCMS v.4.8 allows a remote attacker to execute arbitrary code and obtain sensitive information via the SEMCMS_Menu.php component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/tzyyyyyyy/semcms)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-4959, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-4959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4959
- **State**: PUBLISHED
- **Published Date**: March 27, 2018 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 11:34 UTC
- **Reserved Date**: July 14, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
**DISPUTED** SQL injection vulnerability in SQLiteDatabase.java in the SQLi Api in Android allows remote attackers to execute arbitrary SQL commands via the delete method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [68912](http://www.securityfocus.com/bid/68912)
2. [](http://packetstormsecurity.com/files/127651/Android-SDK-SQL-Injection.html)
3. [20140726 SECV-07-1403 - Android SQLi Api - SQL Injection on delete() method](http://seclists.org/fulldisclosure/2014/Jul/138)
4. [20140726 SECV-07-1403 - Android SQLi Api - SQL Injection on delete() method ( link correction)](http://seclists.org/fulldisclosure/2014/Jul/139)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-58112, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-58112 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-58112
- **State**: PUBLISHED
- **Published Date**: April 07, 2025 at 03:37 UTC
- **Last Updated**: April 07, 2025 at 13:29 UTC
- **Reserved Date**: March 27, 2025 at 07:13 UTC
- **Assigned By**: huawei
### Vulnerability Description
Exception capture failure vulnerability in the SVG parsing module of the ArkUI framework
Impact: Successful exploitation of this vulnerability may affect availability.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-248: Security Weakness
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 5.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2025/4/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-1839, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-1839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1839
- **State**: PUBLISHED
- **Published Date**: April 13, 2017 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 04:54 UTC
- **Reserved Date**: February 17, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
modules/chef.py in SaltStack before 2014.7.4 does not properly handle files in /tmp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/saltstack/salt/commit/b49d0d4b5ca5c6f31f03e2caf97cef1088eeed81)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1212788)
3. [FEDORA-2016-105b3b8804](http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175568.html)
4. [](https://github.com/saltstack/salt/commit/22d2f7a1ec93300c34e8c42d14ec39d51e610b5c)
5. [](https://docs.saltstack.com/en/latest/topics/releases/2014.7.4.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-9132, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-9132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9132
- **State**: PUBLISHED
- **Published Date**: January 10, 2025 at 21:35 UTC
- **Last Updated**: January 13, 2025 at 17:49 UTC
- **Reserved Date**: September 23, 2024 at 22:01 UTC
- **Assigned By**: Arista
### Vulnerability Description
The administrator is able to configure an insecure captive portal script
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**Arista Networks - Arista Edge Threat Management**
Affected versions:
- 17.1.0 (Status: affected)
### References
1. [](https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105)
### Credits
- Mehmet INCE from PRODAFT.com
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-28381, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-28381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28381
- **State**: PUBLISHED
- **Published Date**: March 16, 2021 at 19:48 UTC
- **Last Updated**: August 03, 2024 at 21:40 UTC
- **Reserved Date**: March 15, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The vhs (aka VHS: Fluid ViewHelpers) extension before 5.1.1 for TYPO3 allows SQL injection via isLanguageViewHelper.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://typo3.org/security/advisory/typo3-ext-sa-2021-001)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-36334, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-36334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36334
- **State**: PUBLISHED
- **Published Date**: May 05, 2021 at 03:11 UTC
- **Last Updated**: August 04, 2024 at 17:23 UTC
- **Reserved Date**: May 05, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
themegrill-demo-importer before 1.6.3 allows CSRF, as demonstrated by wiping the database.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.webarxsecurity.com/critical-issue-in-themegrill-demo-importer/)
2. [](https://www.openwall.com/lists/oss-security/2020/02/19/1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-43997, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-43997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43997
- **State**: PUBLISHED
- **Published Date**: January 24, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 19:52 UTC
- **Reserved Date**: September 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Yoruichi hobby base mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/syz913/CVE-reports/blob/main/CVE-2023-43997.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-0780, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-0780 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0780
- **State**: PUBLISHED
- **Published Date**: March 20, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:28 UTC
- **Reserved Date**: March 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
paFileDB 3.1 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) auth.php, (2) login.php, (3) category.php, (4) file.php, (5) team.php, (6) license.php, (7) custom.php, (8) admins.php, or (9) backupdb.php, which reveal the path in a PHP error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050312 [SECURITYREASON.COM] Mass Full Path Disclosure in paFileDB](http://marc.info/?l=bugtraq&m=111066293914977&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-13843, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-13843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13843
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 15:26 UTC
- **Last Updated**: February 11, 2025 at 16:00 UTC
- **Reserved Date**: February 06, 2025 at 17:13 UTC
- **Assigned By**: ivanti
### Vulnerability Description
Cleartext storage of information in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a local authenticated attacker with admin privileges to read sensitive data.
### CVSS Metrics
- **CVSS Base Score**: 6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-312: Security Weakness
### Affected Products
**Ivanti - Connect Secure**
Affected versions:
- 22.7R2.6 (Status: unaffected)
**Ivanti - Policy Secure**
Affected versions:
- 22.7R1.3 (Status: unaffected)
### References
1. [](https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-24453, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-24453 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24453
- **State**: PUBLISHED
- **Published Date**: January 24, 2023 at 00:00 UTC
- **Last Updated**: April 02, 2025 at 13:39 UTC
- **Reserved Date**: January 23, 2023 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A missing check in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
### Affected Products
**Jenkins Project - Jenkins TestQuality Updater Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.3 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2800)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-0118, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-0118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0118
- **State**: PUBLISHED
- **Published Date**: April 16, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:10 UTC
- **Reserved Date**: February 03, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [O-114](http://www.ciac.org/ciac/bulletins/o-114.shtml)
2. [oval:org.mitre.oval:def:1718](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1718)
3. [VU#783748](http://www.kb.cert.org/vuls/id/783748)
4. [win-vdm-gain-privileges(15714)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15714)
5. [AD20040413E](http://www.eeye.com/html/Research/Advisories/AD20040413E.html)
6. [MS04-011](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011)
7. [10117](http://www.securityfocus.com/bid/10117)
8. [TA04-104A](http://www.us-cert.gov/cas/techalerts/TA04-104A.html)
9. [oval:org.mitre.oval:def:1512](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1512)
10. [20040413 EEYE: Windows VDM TIB Local Privilege Escalation](http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020070.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-0515, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-0515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0515
- **State**: PUBLISHED
- **Published Date**: January 20, 2011 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 21:58 UTC
- **Reserved Date**: January 20, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
KisKrnl.sys 2011.1.13.89 and earlier in Kingsoft AntiVirus 2011 SP5.2 allows local users to cause a denial of service (crash) via a crafted request that is not properly handled by the KiFastCallEntry hook.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20110116 Kingsoft AntiVirus 2011 SP5.2 KisKrnl.sys <= 2011.1.13.89 Local Kernel Mode D.O.S Exploit(3 lines of code)](http://www.securityfocus.com/archive/1/515767/100/0/threaded)
2. [kingsoft-kiskrnl-dos(64723)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64723)
3. [42937](http://secunia.com/advisories/42937)
4. [15998](http://www.exploit-db.com/exploits/15998)
5. [45821](http://www.securityfocus.com/bid/45821)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-6964, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-6964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6964
- **State**: PUBLISHED
- **Published Date**: October 16, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 12:31 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Hanyang University Admissions (aka kr.ac.hanyang.planner) application 2.1.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#589273](http://www.kb.cert.org/vuls/id/589273)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-2846, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-2846 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2846
- **State**: PUBLISHED
- **Published Date**: June 30, 2023 at 04:05 UTC
- **Last Updated**: March 05, 2025 at 18:55 UTC
- **Reserved Date**: May 23, 2023 at 07:15 UTC
- **Assigned By**: Mitsubishi
### Vulnerability Description
Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series main modules allows a remote unauthenticated attacker to cancel the password/keyword setting and login to the affected products by sending specially crafted packets.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-294: Security Weakness
### Affected Products
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-16MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-16MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-16MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-32MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-32MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-32MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-48MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-48MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-48MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-64MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-64MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-64MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-80MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-80MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-80MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-128MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-128MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-128MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-16MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-16MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-16MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-32MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-32MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-32MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-48MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-48MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-48MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-64MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-64MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-64MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-80MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-80MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-80MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-32MR/UA1**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-64MR/UA1**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-32MS/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-64MS/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-16MR/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-16MT/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-32MR/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-32MT/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-48MR/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-48MT/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-64MR/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-64MT/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-80MR/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-80MT/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-128MR/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3U-128MT/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-16MT/D**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-32MT/D**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-64MT/D**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-96MT/D**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-16MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-32MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-64MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-96MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-16MR/D-T**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-16MR/DS-T**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-32MT-LT**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-32MT-LT-2**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-16MT/D-P4**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3UC-16MT/DSS-P4**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-14MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-14MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-14MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-24MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-24MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-24MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-40MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-40MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-40MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-60MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-60MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-60MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-14MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-14MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-14MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-24MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-24MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-24MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-40MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-40MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-40MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-60MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-60MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-60MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-14MR/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-14MT/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-24MR/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-24MT/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-40MR/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-40MT/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-60MR/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3G-60MT/ES-A**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GC-32MT/D**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GC-32MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GE-24MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GE-24MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GE-24MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GE-40MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GE-40MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GE-40MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GE-24MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GE-24MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GE-24MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GE-40MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GE-40MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GE-40MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GA-24MR-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GA-24MT-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GA-40MR-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GA-40MT-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GA-60MR-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3GA-60MT-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-10MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-10MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-10MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-10MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-10MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-10MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-14MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-14MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-14MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-14MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-14MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-14MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-20MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-20MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-20MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-20MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-20MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-20MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-30MR/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-30MR/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-30MT/DS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-30MT/DSS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-30MT/ES**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-30MT/ESS**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-30MR/ES-2AD**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-30MT/ES-2AD**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3S-30MT/ESS-2AD**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3SA-10MR-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3SA-10MT-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3SA-14MR-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3SA-14MT-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3SA-20MR-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3SA-20MT-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3SA-30MR-CM**
Affected versions:
- all versions (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-F Series FX3SA-30MT-CM**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-005_en.pdf)
2. [](https://jvn.jp/vu/JVNVU94519952)
3. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-04)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-3804, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-3804 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3804
- **State**: PUBLISHED
- **Published Date**: August 16, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 05:56 UTC
- **Reserved Date**: May 07, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
FontParser in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-5756 and CVE-2015-5775.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/kb/HT205030)
2. [1033275](http://www.securitytracker.com/id/1033275)
3. [APPLE-SA-2015-08-13-2](http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html)
4. [APPLE-SA-2015-08-13-3](http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html)
5. [](https://support.apple.com/kb/HT205031)
6. [76343](http://www.securityfocus.com/bid/76343)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-41763, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-41763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41763
- **State**: PUBLISHED
- **Published Date**: January 04, 2025 at 14:38 UTC
- **Last Updated**: January 06, 2025 at 14:26 UTC
- **Reserved Date**: July 22, 2024 at 12:02 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-327: Security Weakness
### Affected Products
**IBM - Engineering Lifecycle Optimization Publishing**
Affected versions:
- 7.0.2, 7.0.3 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7180204)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-19924, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-19924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-19924
- **State**: PUBLISHED
- **Published Date**: May 18, 2021 at 19:38 UTC
- **Last Updated**: August 04, 2024 at 14:15 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Boostnote 0.12.1, exporting to PDF contains opportunities for XSS attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BoostIO/Boostnote/issues/3178)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-28280, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-28280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28280
- **State**: PUBLISHED
- **Published Date**: December 29, 2020 at 17:10 UTC
- **Last Updated**: August 04, 2024 at 16:33 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: Mend
### Vulnerability Description
Prototype pollution vulnerability in 'predefine' versions 0.0.0 through 0.1.2 allows an attacker to cause a denial of service and may lead to remote code execution.
### Affected Products
**n/a - predefine**
Affected versions:
- 0.0.0, 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.1.0, 0.1.1, 0.1.2 (Status: affected)
### References
1. [](https://github.com/bigpipe/predefine/blob/238137e3d1b8288ff5d7529c3cbcdd371888c26b/index.js#L284)
2. [](https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28280)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-2024, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-2024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2024
- **State**: PUBLISHED
- **Published Date**: March 14, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 09:58 UTC
- **Reserved Date**: February 19, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in classes/controller/error.php in Open Classifieds 2 before 2.1.3 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to shared-apartments-rooms/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/open-classifieds/openclassifieds2/issues/556)
2. [20140312 Cross-Site Scripting (XSS) in Open Classifieds](http://www.securityfocus.com/archive/1/531428/100/0/threaded)
3. [](https://www.htbridge.com/advisory/HTB23204)
4. [](https://github.com/open-classifieds/openclassifieds2/commit/45ee8fb601a91b8a4238229580a32a4fd8d96ef9)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-23297, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-23297 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23297
- **State**: PUBLISHED
- **Published Date**: March 09, 2022 at 17:07 UTC
- **Last Updated**: January 02, 2025 at 18:35 UTC
- **Reserved Date**: January 15, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23297)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-6106, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-6106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6106
- **State**: REJECTED
- **Last Updated**: November 13, 2023 at 23:36 UTC
- **Reserved Date**: November 13, 2023 at 15:24 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-25523, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-25523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25523
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 00:00 UTC
- **Last Updated**: February 13, 2025 at 17:38 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow vulnerability in Trendnet TEG-40128 Web Smart Switch v1(1.00.023) due to the lack of length verification, which is related to the mobile access point setup operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/XiaoCurry/cb190038c9402c9f89681a0e116996f6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-7144, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-7144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7144
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 16, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-3066, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-3066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3066
- **State**: PUBLISHED
- **Published Date**: October 17, 2022 at 00:00 UTC
- **Last Updated**: May 13, 2025 at 16:18 UTC
- **Reserved Date**: August 30, 2022 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab affecting all versions starting from 10.0 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. It was possible for an unauthorised user to create issues in a project.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=15.4, <15.4.1 (Status: affected)
- >=15.3, <15.3.4 (Status: affected)
- >=10.0, <15.2.5 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/372149)
2. [](https://hackerone.com/reports/1685105)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3066.json)
### Credits
- Thanks [vakzz](https://hackerone.com/vakzz) for reporting this vulnerability through our HackerOne bug bounty program
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-1938, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-1938 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1938
- **State**: REJECTED
- **Published Date**: June 29, 2005 at 04:00 UTC
- **Last Updated**: November 02, 2005 at 10:00 UTC
- **Reserved Date**: June 13, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-0019, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-0019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0019
- **State**: PUBLISHED
- **Published Date**: February 04, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 08:58 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2014-1795](http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html)
2. [MDVSA-2014:033](http://www.mandriva.com/security/advisories?name=MDVSA-2014:033)
3. [65201](http://www.securityfocus.com/bid/65201)
4. [102612](http://osvdb.org/102612)
5. [[oss-security] 20140128 Socat security advisory 5 - PROXY-CONNECT address overflow](http://seclists.org/oss-sec/2014/q1/159)
6. [](http://www.dest-unreach.org/socat)
7. [](http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt)
8. [openSUSE-SU-2015:0760](http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html)
9. [FEDORA-2014-1811](http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-15511, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-15511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15511
- **State**: REJECTED
- **Published Date**: January 23, 2018 at 17:00 UTC
- **Last Updated**: January 23, 2018 at 16:57 UTC
- **Reserved Date**: October 17, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-0414, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-0414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0414
- **State**: PUBLISHED
- **Published Date**: September 18, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:21 UTC
- **Reserved Date**: May 24, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long readvar argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2001:045](http://www.redhat.com/support/errata/RHSA-2001-045.html)
2. [SuSE-SA:2001:10](http://lists.suse.com/archives/suse-security-announce/2001-Apr/0000.html)
3. [20010409 [ESA-20010409-01] xntp buffer overflow](http://archives.neohapsis.com/archives/bugtraq/2001-04/0127.html)
4. [20010409 ntp-4.99k23.tar.gz is available](http://marc.info/?l=bugtraq&m=98683952401753&w=2)
5. [SSE073](ftp://ftp.sco.com/SSE/sse073.ltr)
6. [MDKSA-2001:036](http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-036.php3)
7. [NetBSD-SA2001-004](ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2001-004.txt.asc)
8. [SSE074](ftp://ftp.sco.com/SSE/sse074.ltr)
9. [20010404 ntpd =< 4.0.99k remote buffer overflow](http://marc.info/?l=bugtraq&m=98642418618512&w=2)
10. [CLA-2001:392](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000392)
11. [805](http://www.osvdb.org/805)
12. [20010409 ntpd - new Debian 2.2 (potato) version is also vulnerable](http://marc.info/?l=bugtraq&m=98684532921941&w=2)
13. [2540](http://www.securityfocus.com/bid/2540)
14. [oval:org.mitre.oval:def:3831](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3831)
15. [20010406 Immunix OS Security update for ntp and xntp3](http://marc.info/?l=bugtraq&m=98659782815613&w=2)
16. [20010405 Re: ntpd =< 4.0.99k remote buffer overflow]](http://marc.info/?l=bugtraq&m=98654963328381&w=2)
17. [20010413 PROGENY-SA-2001-02A: [UPDATE] ntpd remote buffer overflow](http://archives.neohapsis.com/archives/bugtraq/2001-04/0225.html)
18. [20010408 [slackware-security] buffer overflow fix for NTP](http://marc.info/?l=bugtraq&m=98679815917014&w=2)
19. [20010418 IBM MSS Outside Advisory Redistribution: IBM AIX: Buffer Overflow Vulnerability in (x)ntp](http://archives.neohapsis.com/archives/bugtraq/2001-04/0314.html)
20. [FreeBSD-SA-01:31](ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:31.ntpd.asc)
21. [20010409 PROGENY-SA-2001-02: ntpd remote buffer overflow](http://marc.info/?l=bugtraq&m=98684202610470&w=2)
22. [DSA-045](https://www.debian.org/security/2001/dsa-045)
23. [ntpd-remote-bo(6321)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6321)
24. [CSSA-2001-013](http://www.calderasystems.com/support/security/advisories/CSSA-2001-013.0.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-5179, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-5179 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5179
- **State**: PUBLISHED
- **Published Date**: September 20, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 06:41 UTC
- **Reserved Date**: July 01, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
FreeIPA might display user data improperly via vectors involving non-printable characters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1252567)
2. [](https://pagure.io/freeipa/issue/5153)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-3905, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-3905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3905
- **State**: PUBLISHED
- **Published Date**: November 30, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:31 UTC
- **Reserved Date**: November 30, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in reflection APIs in Java SDK and JRE 1.3.1_15 and earlier, 1.4.2_08 and earlier, and JDK and JRE 5.0 Update 3 and earlier allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors, a different vulnerability than CVE-2005-3906. NOTE: this is associated with the "first issue" identified in SUNALERT:102003.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17847](http://secunia.com/advisories/17847)
2. [18503](http://secunia.com/advisories/18503)
3. [18435](http://secunia.com/advisories/18435)
4. [15615](http://www.securityfocus.com/bid/15615)
5. [102003](http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102003-1)
6. [ADV-2005-2946](http://www.vupen.com/english/advisories/2005/2946)
7. [ADV-2005-2675](http://www.vupen.com/english/advisories/2005/2675)
8. [](http://www-1.ibm.com/support/docview.wss?uid=swg21225628)
9. [ADV-2005-2636](http://www.vupen.com/english/advisories/2005/2636)
10. [GLSA-200601-10](http://www.gentoo.org/security/en/glsa/glsa-200601-10.xml)
11. [VU#974188](http://www.kb.cert.org/vuls/id/974188)
12. [1015280](http://securitytracker.com/id?1015280)
13. [APPLE-SA-2005-11-30](http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html)
14. [sun-reflection-api-elevate-privileges(23251)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23251)
15. [17748](http://secunia.com/advisories/17748)
16. [18092](http://secunia.com/advisories/18092)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-40712, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-40712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40712
- **State**: PUBLISHED
- **Published Date**: September 12, 2023 at 11:05 UTC
- **Last Updated**: September 25, 2024 at 15:23 UTC
- **Reserved Date**: August 20, 2023 at 19:29 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated users who have access to see the task/dag in the UI, to craft a URL, which could lead to unmasking the secret configuration of the task that otherwise would be masked in the UI.
Users are strongly advised to upgrade to version 2.7.1 or later which has removed the vulnerability.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Apache Software Foundation - Apache Airflow**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/apache/airflow/pull/33512)
2. [](https://github.com/apache/airflow/pull/33516)
3. [](https://lists.apache.org/thread/jw1yv4lt6hpowqbb0x4o3tdp0jhx2bts)
### Credits
- klexadoc
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-36235, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-36235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36235
- **State**: PUBLISHED
- **Published Date**: September 01, 2021 at 00:19 UTC
- **Last Updated**: August 04, 2024 at 00:54 UTC
- **Reserved Date**: July 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Ivanti Workspace Control before 10.6.30.0. A locally authenticated user with low privileges can bypass File and Folder Security by leveraging an unspecified attack vector. As a result, the attacker can start applications with elevated privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/A-locally-authenticated-user-with-low-privileges-can-bypass-the-File-and-Folder-Security-by-leveraging-an-unspecified-attack-vector)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-0681, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-0681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0681
- **State**: PUBLISHED
- **Published Date**: July 24, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 04:17 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The TFTP server in Cisco IOS 12.2(44)SQ1, 12.2(33)XN1, 12.4(25e)JAM1, 12.4(25e)JAO5m, 12.4(23)JY, 15.0(2)ED1, 15.0(2)EY3, 15.1(3)SVF4a, and 15.2(2)JB1 and IOS XE 2.5.x, 2.6.x, 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, and 3.5.xS before 3.6.0S; 3.1.xSG, 3.2.xSG, and 3.3.xSG before 3.4.0SG; 3.2.xSE before 3.3.0SE; 3.2.xXO before 3.3.0XO; 3.2.xSQ; 3.3.xSQ; and 3.4.xSQ allows remote attackers to cause a denial of service (device hang or reload) via multiple requests that trigger improper memory management, aka Bug ID CSCts66733.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-tftp/cvrf/cisco-sa-20150722-tftp_cvrf.xml)
2. [20150722 Cisco IOS Software TFTP Server Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-tftp)
3. [1033023](http://www.securitytracker.com/id/1033023)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-24552, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-24552 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24552
- **State**: PUBLISHED
- **Published Date**: February 06, 2022 at 20:18 UTC
- **Last Updated**: August 03, 2024 at 04:13 UTC
- **Reserved Date**: February 06, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A flaw was found in the REST API in StarWind Stack. REST command, which manipulates a virtual disk, doesn’t check input parameters. Some of them go directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges. This affects StarWind SAN and NAS v0.2 build 1633.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.starwindsoftware.com/security/sw-20220203-0001/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-41800, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-41800 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41800
- **State**: PUBLISHED
- **Published Date**: October 02, 2023 at 08:24 UTC
- **Last Updated**: September 20, 2024 at 15:22 UTC
- **Reserved Date**: September 01, 2023 at 11:55 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in UniConsent UniConsent CMP for GDPR CPRA GPP TCF plugin <= 1.4.2 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**UniConsent - UniConsent CMP for GDPR CPRA GPP TCF**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/uniconsent-cmp/wordpress-uniconsent-cookie-consent-cmp-for-gdpr-ccpa-plugin-1-4-2-cross-site-scripting-xss?_s_id=cve)
### Credits
- Rio Darmawan (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-2617, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-2617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2617
- **State**: PUBLISHED
- **Published Date**: August 17, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:30 UTC
- **Reserved Date**: August 17, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The syscall32_setup_pages function in syscall32.c for Linux kernel 2.6.12 and later, on the 64-bit x86 platform, does not check the return value of the insert_vm_struct function, which allows local users to trigger a memory leak via a 32-bit application with crafted ELF headers.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9fb1759a3102c26cd8f64254a7c3e532782c2bb8)
2. [](http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=9fb1759a3102c26cd8f64254a7c3e532782c2bb8)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-20270, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-20270 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20270
- **State**: PUBLISHED
- **Published Date**: January 17, 2024 at 16:53 UTC
- **Last Updated**: June 02, 2025 at 15:05 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Cisco - Cisco BroadWorks**
Affected versions:
- 24.0 ap375672 (Status: affected)
- 24.0 ap375655 (Status: affected)
- 24.0 ap376979 (Status: affected)
- 24.0 ap379112 (Status: affected)
- 24.0 ap379588 (Status: affected)
- 24.0 ap378485 (Status: affected)
- 24.0 ap376934 (Status: affected)
- 24.0 ap379533 (Status: affected)
- 24.0 ap374230 (Status: affected)
- 24.0 ap378382 (Status: affected)
- 24.0 ap375720 (Status: affected)
- 24.0 ap378575 (Status: affected)
- 24.0 ap378248 (Status: affected)
- 24.0 ap378990 (Status: affected)
- 24.0 ap378425 (Status: affected)
- 24.0 ap377319 (Status: affected)
- 24.0 ap378818 (Status: affected)
- 24.0 ap375453 (Status: affected)
- 24.0 ap376317 (Status: affected)
- 24.0 ap376677 (Status: affected)
- 24.0 ap375688 (Status: affected)
- 24.0 ap377147 (Status: affected)
- 24.0 ap376945 (Status: affected)
- 24.0 ap377517 (Status: affected)
- 24.0 ap376205 (Status: affected)
- 24.0 ap378257 (Status: affected)
- 24.0 ap378471 (Status: affected)
- 24.0 ap376669 (Status: affected)
- 24.0 ap375756 (Status: affected)
- 24.0 ap378440 (Status: affected)
- 24.0 ap376486 (Status: affected)
- 24.0 ap378920 (Status: affected)
- 24.0 ap375734 (Status: affected)
- 24.0 ap378144 (Status: affected)
- 24.0 ap375036 (Status: affected)
- 24.0 ap375624 (Status: affected)
- 24.0 ap378882 (Status: affected)
- 24.0 ap376531 (Status: affected)
- 24.0 ap375804 (Status: affected)
- 24.0 ap376137 (Status: affected)
- 24.0 ap377378 (Status: affected)
- 24.0 ap376844 (Status: affected)
- 24.0 ap376696 (Status: affected)
- 24.0 ap378599 (Status: affected)
- 24.0 ap378880 (Status: affected)
- 24.0 ap374530 (Status: affected)
- 24.0 ap375369 (Status: affected)
- 24.0 ap376147 (Status: affected)
- 24.0 ap376140 (Status: affected)
- 24.0 ap379501 (Status: affected)
- 24.0 ap378150 (Status: affected)
- 24.0 ap375100 (Status: affected)
- 24.0 ap376622 (Status: affected)
- 24.0 ap379339 (Status: affected)
- 24.0 ap377163 (Status: affected)
- 24.0 ap375464 (Status: affected)
- 24.0 ap376023 (Status: affected)
- 24.0 ap378164 (Status: affected)
- 24.0 ap378154 (Status: affected)
- 24.0 ap377068 (Status: affected)
- 24.0 ap377177 (Status: affected)
- 24.0 ap377091 (Status: affected)
- 24.0 ap377515 (Status: affected)
- 24.0 ap379190 (Status: affected)
- 24.0 ap378595 (Status: affected)
- 24.0 ap374832 (Status: affected)
- 24.0 ap367206 (Status: affected)
- 24.0 ap377868 (Status: affected)
- 24.0 ap378902 (Status: affected)
- 24.0 ap375210 (Status: affected)
- 24.0 ap375353 (Status: affected)
- 24.0 ap376098 (Status: affected)
- 24.0 ap378383 (Status: affected)
- 24.0 ap379122 (Status: affected)
- 24.0 ap376710 (Status: affected)
- 24.0 ap376602 (Status: affected)
- 24.0 ap378535 (Status: affected)
- 24.0 ap377729 (Status: affected)
- 24.0 ap375990 (Status: affected)
- 24.0 ap375748 (Status: affected)
- 24.0 ap376935 (Status: affected)
- 24.0 ap376426 (Status: affected)
- 24.0 ap375743 (Status: affected)
- 24.0 ap379109 (Status: affected)
- 24.0 ap378080 (Status: affected)
- 24.0 ap375449 (Status: affected)
- 24.0 ap375922 (Status: affected)
- 24.0 ap377984 (Status: affected)
- 24.0 ap379391 (Status: affected)
- 24.0 ap379378 (Status: affected)
- 24.0 ap376512 (Status: affected)
- 24.0 ap376956 (Status: affected)
- 24.0 ap369855 (Status: affected)
- 24.0 ap379098 (Status: affected)
- 24.0 ap376736 (Status: affected)
- 24.0 ap377674 (Status: affected)
- 24.0 ap375625 (Status: affected)
- 24.0 ap378393 (Status: affected)
- 24.0 ap376620 (Status: affected)
- 24.0 ap372799 (Status: affected)
- 24.0 ap378976 (Status: affected)
- 24.0 ap376989 (Status: affected)
- 24.0 ap378862 (Status: affected)
- 24.0 ap378242 (Status: affected)
- 24.0 ap375489 (Status: affected)
- 24.0 ap379475 (Status: affected)
- 24.0 ap376820 (Status: affected)
- 24.0 ap375533 (Status: affected)
- 24.0 ap376308 (Status: affected)
- 24.0 ap376798 (Status: affected)
- 24.0 ap375661 (Status: affected)
- 24.0 ap378953 (Status: affected)
- 24.0 ap371233 (Status: affected)
- 24.0 ap377628 (Status: affected)
- 24.0 ap375266 (Status: affected)
- 24.0 ap376984 (Status: affected)
- 24.0 ap375021 (Status: affected)
- 24.0 ap377966 (Status: affected)
- 24.0 ap375484 (Status: affected)
- 24.0 ap378436 (Status: affected)
- 24.0 ap378886 (Status: affected)
- 24.0 ap375709 (Status: affected)
- 24.0 ap376267 (Status: affected)
- 24.0 ap375514 (Status: affected)
- 24.0 ap377743 (Status: affected)
- 24.0 ap377878 (Status: affected)
- 24.0 ap378308 (Status: affected)
- 24.0 ap379487 (Status: affected)
- 24.0 ap376038 (Status: affected)
- 24.0 ap377802 (Status: affected)
- 24.0 ap376507 (Status: affected)
- 24.0 ap377630 (Status: affected)
- 24.0 ap378913 (Status: affected)
- 24.0 ap376252 (Status: affected)
- 24.0 ap376407 (Status: affected)
- 24.0 ap376410 (Status: affected)
- 24.0 ap376523 (Status: affected)
- 24.0 ap375342 (Status: affected)
- 24.0 ap375304 (Status: affected)
- 24.0 ap378553 (Status: affected)
- 24.0 ap375205 (Status: affected)
- 24.0 ap376889 (Status: affected)
- 24.0 ap376529 (Status: affected)
- 24.0 ap375214 (Status: affected)
- 24.0 ap377888 (Status: affected)
- 24.0 ap377913 (Status: affected)
- 24.0 ap376024 (Status: affected)
- 24.0 ap378390 (Status: affected)
- 24.0 ap375382 (Status: affected)
- 24.0 ap379395 (Status: affected)
- 24.0 ap377120 (Status: affected)
- 24.0 ap378400 (Status: affected)
- 24.0 ap376878 (Status: affected)
- 24.0 ap377723 (Status: affected)
- 24.0 ap374691 (Status: affected)
- 24.0 ap379346 (Status: affected)
- 24.0 ap378218 (Status: affected)
- 24.0 ap376842 (Status: affected)
- 24.0 ap374270 (Status: affected)
- 24.0 ap376000 (Status: affected)
- 24.0 ap376702 (Status: affected)
- 24.0 ap377497 (Status: affected)
- 24.0 ap375018 (Status: affected)
- 24.0 ap378506 (Status: affected)
- 24.0 ap377412 (Status: affected)
- 24.0 ap375959 (Status: affected)
- 24.0 ap379016 (Status: affected)
- 24.0 ap379438 (Status: affected)
- 24.0 ap378995 (Status: affected)
- 24.0 ap378258 (Status: affected)
- 24.0 ap378574 (Status: affected)
- 24.0 ap375711 (Status: affected)
- 24.0 ap376809 (Status: affected)
- 24.0 ap375634 (Status: affected)
- 24.0 ap375646 (Status: affected)
- 24.0 ap375488 (Status: affected)
- 24.0 ap377555 (Status: affected)
- 24.0 ap375293 (Status: affected)
- 24.0 ap378322 (Status: affected)
- 24.0 ap378029 (Status: affected)
- 24.0 ap379373 (Status: affected)
- 24.0 ap377737 (Status: affected)
- 24.0 ap378010 (Status: affected)
- 24.0 ap378481 (Status: affected)
- 24.0 ap376721 (Status: affected)
- 24.0 ap375860 (Status: affected)
- 24.0 ap378332 (Status: affected)
- 24.0 ap379389 (Status: affected)
- 24.0 ap377983 (Status: affected)
- 24.0 ap378866 (Status: affected)
- 24.0 ap377399 (Status: affected)
- 24.0 ap376722 (Status: affected)
- 24.0 ap379474 (Status: affected)
- 24.0 ap378070 (Status: affected)
- 24.0 ap376670 (Status: affected)
- 24.0 ap375207 (Status: affected)
- 24.0 ap376100 (Status: affected)
- 24.0 ap378122 (Status: affected)
- 24.0 ap376012 (Status: affected)
- 24.0 ap375828 (Status: affected)
- 24.0 ap378827 (Status: affected)
- 24.0 ap376787 (Status: affected)
- 24.0 ap376414 (Status: affected)
- 24.0 ap377786 (Status: affected)
- 24.0 ap376485 (Status: affected)
- 24.0 ap379069 (Status: affected)
- 24.0 ap378863 (Status: affected)
- 24.0 ap376298 (Status: affected)
- 24.0 ap373564 (Status: affected)
- 24.0 ap376429 (Status: affected)
- 24.0 ap379449 (Status: affected)
- 24.0 ap377485 (Status: affected)
- 24.0 ap378051 (Status: affected)
- 24.0 ap375849 (Status: affected)
- 24.0 ap376099 (Status: affected)
- 24.0 ap378234 (Status: affected)
- 24.0 ap377033 (Status: affected)
- 24.0 ap377079 (Status: affected)
- 24.0 ap375950 (Status: affected)
- 24.0 ap375412 (Status: affected)
- 24.0 ap375757 (Status: affected)
- 24.0 ap376762 (Status: affected)
- 24.0 ap376445 (Status: affected)
- 24.0 ap379515 (Status: affected)
- 24.0 ap375351 (Status: affected)
- 24.0 ap375273 (Status: affected)
- 24.0 ap378896 (Status: affected)
- 24.0 ap379199 (Status: affected)
- 24.0 ap374803 (Status: affected)
- 24.0 ap375685 (Status: affected)
- 24.0 ap375270 (Status: affected)
- 24.0 ap370326 (Status: affected)
- 24.0 ap375603 (Status: affected)
- 24.0 ap376802 (Status: affected)
- 24.0 ap376704 (Status: affected)
- 24.0 ap379423 (Status: affected)
- 24.0 ap376001 (Status: affected)
- 24.0 ap377508 (Status: affected)
- 24.0 ap375989 (Status: affected)
- 24.0 ap376699 (Status: affected)
- 24.0 ap377012 (Status: affected)
- 24.0 ap379532 (Status: affected)
- 24.0 ap378141 (Status: affected)
- 24.0 ap375949 (Status: affected)
- 24.0 ap375996 (Status: affected)
- 24.0 ap378087 (Status: affected)
- 24.0 ap378178 (Status: affected)
- 24.0 ap375862 (Status: affected)
- 24.0 ap376042 (Status: affected)
- 24.0 ap378079 (Status: affected)
- 24.0 ap379390 (Status: affected)
- 24.0 ap378970 (Status: affected)
- 24.0 ap375908 (Status: affected)
- 24.0 ap378019 (Status: affected)
- 24.0 ap377329 (Status: affected)
- 24.0 ap376356 (Status: affected)
- 24.0 ap377908 (Status: affected)
- 24.0 ap377751 (Status: affected)
- 24.0 ap377581 (Status: affected)
- 24.0 ap375902 (Status: affected)
- 24.0 (Status: affected)
- 24.0 ap356141 (Status: affected)
- 24.0 ap358290 (Status: affected)
- 24.0 ap362693 (Status: affected)
- 24.0 ap370935 (Status: affected)
- 24.0 ap372508 (Status: affected)
- 24.0 ap372932 (Status: affected)
- 24.0 ap375289 (Status: affected)
- 24.0 ap375291 (Status: affected)
- 24.0 ap375317 (Status: affected)
- 24.0 ap375370 (Status: affected)
- 24.0 ap375398 (Status: affected)
- 24.0 ap375409 (Status: affected)
- 24.0 ap375430 (Status: affected)
- 24.0 ap375432 (Status: affected)
- 24.0 ap375465 (Status: affected)
- 24.0 ap375466 (Status: affected)
- 24.0 ap375469 (Status: affected)
- 24.0 ap375502 (Status: affected)
- 24.0 ap375518 (Status: affected)
- 24.0 ap375522 (Status: affected)
- 24.0 ap375539 (Status: affected)
- 24.0 ap375785 (Status: affected)
- 24.0 ap375920 (Status: affected)
- 24.0 ap376156 (Status: affected)
- 24.0 ap376189 (Status: affected)
- 24.0 ap376213 (Status: affected)
- 24.0 ap376218 (Status: affected)
- 24.0 ap376340 (Status: affected)
- 24.0 ap376384 (Status: affected)
- 24.0 ap376541 (Status: affected)
- 24.0 ap376652 (Status: affected)
- 24.0 ap376666 (Status: affected)
- 24.0 ap376668 (Status: affected)
- 24.0 ap376682 (Status: affected)
- 24.0 ap376689 (Status: affected)
- 24.0 ap376695 (Status: affected)
- 24.0 ap376752 (Status: affected)
- 24.0 ap376818 (Status: affected)
- 24.0 ap376873 (Status: affected)
- 24.0 ap377023 (Status: affected)
- 24.0 ap377037 (Status: affected)
- 24.0 ap377050 (Status: affected)
- 24.0 ap377175 (Status: affected)
- 24.0 ap377229 (Status: affected)
- 24.0 ap377384 (Status: affected)
- 24.0 ap377423 (Status: affected)
- 24.0 ap377496 (Status: affected)
- 24.0 ap377516 (Status: affected)
- 24.0 ap377538 (Status: affected)
- 24.0 ap377569 (Status: affected)
- 24.0 ap377651 (Status: affected)
- 24.0 ap377687 (Status: affected)
- 24.0 ap377718 (Status: affected)
- 24.0 ap377727 (Status: affected)
- 24.0 ap377757 (Status: affected)
- 24.0 ap377779 (Status: affected)
- 24.0 ap377792 (Status: affected)
- 24.0 ap377799 (Status: affected)
- 24.0 ap378014 (Status: affected)
- 24.0 ap378119 (Status: affected)
- 24.0 ap378140 (Status: affected)
- 24.0 ap378142 (Status: affected)
- 24.0 ap378153 (Status: affected)
- 24.0 ap378165 (Status: affected)
- 24.0 ap378168 (Status: affected)
- 24.0 ap378227 (Status: affected)
- 24.0 ap378259 (Status: affected)
- 24.0 ap378372 (Status: affected)
- 24.0 ap378415 (Status: affected)
- 24.0 ap378419 (Status: affected)
- 24.0 ap378437 (Status: affected)
- 24.0 ap378509 (Status: affected)
- 24.0 ap378545 (Status: affected)
- 24.0 ap378581 (Status: affected)
- 24.0 ap378585 (Status: affected)
- 24.0 ap378823 (Status: affected)
- 24.0 ap378904 (Status: affected)
- 24.0 ap378952 (Status: affected)
- 24.0 ap378966 (Status: affected)
- 24.0 ap378987 (Status: affected)
- 24.0 ap379080 (Status: affected)
- 24.0 ap379085 (Status: affected)
- 24.0 ap379091 (Status: affected)
- 24.0 ap379140 (Status: affected)
- 24.0 ap379152 (Status: affected)
- 24.0 ap379167 (Status: affected)
- 24.0 ap379168 (Status: affected)
- 24.0 ap379187 (Status: affected)
- 24.0 ap379331 (Status: affected)
- 24.0 ap379411 (Status: affected)
- 24.0 ap379427 (Status: affected)
- 24.0 ap379482 (Status: affected)
- 24.0 ap379531 (Status: affected)
- 24.0 ap379535 (Status: affected)
- 24.0 ap379565 (Status: affected)
- 24.0 ap379587 (Status: affected)
- 24.0 ap379600 (Status: affected)
- 24.0 ap379606 (Status: affected)
- 24.0 ap379608 (Status: affected)
- 24.0 ap379611 (Status: affected)
- 24.0 ap379616 (Status: affected)
- 24.0 ap379627 (Status: affected)
- 24.0 ap379635 (Status: affected)
- 24.0 ap379694 (Status: affected)
- 24.0 ap379701 (Status: affected)
- 24.0 ap379752 (Status: affected)
- 24.0 ap379760 (Status: affected)
- 24.0 ap379762 (Status: affected)
- 24.0 ap379764 (Status: affected)
- 24.0 ap379780 (Status: affected)
- 24.0 ap379781 (Status: affected)
- 24.0 ap379782 (Status: affected)
- 24.0 ap379830 (Status: affected)
- 24.0 ap379839 (Status: affected)
- 24.0 ap379848 (Status: affected)
- 24.0 ap379855 (Status: affected)
- 24.0 ap379874 (Status: affected)
- 24.0 ap379884 (Status: affected)
- 24.0 ap379889 (Status: affected)
- 24.0 ap379892 (Status: affected)
- 24.0 ap379903 (Status: affected)
- 24.0 ap378203 (Status: affected)
- 24.0 ap379008 (Status: affected)
- 24.0 ap379795 (Status: affected)
- 24.0 ap379838 (Status: affected)
- 24.0 ap379847 (Status: affected)
- 24.0 ap379890 (Status: affected)
- 24.0 ap379921 (Status: affected)
- 24.0 ap379925 (Status: affected)
- 24.0 ap379934 (Status: affected)
- 24.0 ap379957 (Status: affected)
- 24.0 ap379963 (Status: affected)
- 24.0 ap379972 (Status: affected)
- 24.0 ap380059 (Status: affected)
- 24.0 ap380099 (Status: affected)
- 24.0 ap380109 (Status: affected)
- 24.0 ap380137 (Status: affected)
- 24.0 ap380143 (Status: affected)
- 24.0 ap380161 (Status: affected)
- 24.0 ap380176 (Status: affected)
- 24.0 ap380180 (Status: affected)
- 24.0 ap380181 (Status: affected)
- 24.0 ap380187 (Status: affected)
- 24.0 ap380196 (Status: affected)
- 24.0 ap380204 (Status: affected)
- 24.0 ap380239 (Status: affected)
- 24.0 ap380249 (Status: affected)
- 24.0 ap380256 (Status: affected)
- 24.0 ap380264 (Status: affected)
- 24.0 ap380269 (Status: affected)
- 24.0 ap380270 (Status: affected)
- 24.0 ap380281 (Status: affected)
- 24.0 ap380282 (Status: affected)
- 24.0 ap380355 (Status: affected)
- 24.0 ap380371 (Status: affected)
- 24.0 ap380375 (Status: affected)
- 24.0 ap380396 (Status: affected)
- 24.0 ap380450 (Status: affected)
- 24.0 ap380465 (Status: affected)
- 24.0 ap380473 (Status: affected)
- 24.0 ap380501 (Status: affected)
- 24.0 ap380506 (Status: affected)
- 24.0 ap380543 (Status: affected)
- 24.0 ap380581 (Status: affected)
- 24.0 ap380595 (Status: affected)
- 24.0 ap380637 (Status: affected)
- 24.0 ap380692 (Status: affected)
- 24.0 ap380758 (Status: affected)
- 24.0 ap380762 (Status: affected)
- 24.0 ap380766 (Status: affected)
- 24.0 ap381358 (Status: affected)
- 24.0 ap382200 (Status: affected)
- 24.0 ap381767 (Status: affected)
- 24.0 ap382744 (Status: affected)
- 24.0 ap381657 (Status: affected)
- 24.0 ap381609 (Status: affected)
- 24.0 ap382951 (Status: affected)
- 24.0 ap381848 (Status: affected)
- 24.0 ap380849 (Status: affected)
- 24.0 ap381809 (Status: affected)
- 24.0 ap381826 (Status: affected)
- 24.0 ap381622 (Status: affected)
- 24.0 ap381654 (Status: affected)
- 24.0 ap374211 (Status: affected)
- 24.0 ap381002 (Status: affected)
- 24.0 ap382750 (Status: affected)
- 24.0 ap382039 (Status: affected)
- 24.0 ap381874 (Status: affected)
- 24.0 ap383534 (Status: affected)
- 24.0 ap381775 (Status: affected)
- 24.0 ap382916 (Status: affected)
- 24.0 ap380939 (Status: affected)
- 24.0 ap383002 (Status: affected)
- 24.0 ap382206 (Status: affected)
- 24.0 ap381247 (Status: affected)
- 24.0 ap381666 (Status: affected)
- 24.0 ap381825 (Status: affected)
- 24.0 ap381952 (Status: affected)
- 24.0 ap382277 (Status: affected)
- 24.0 ap380936 (Status: affected)
- 24.0 ap380985 (Status: affected)
- 24.0 ap382468 (Status: affected)
- 24.0 ap382094 (Status: affected)
- 24.0 ap381971 (Status: affected)
- 24.0 ap383536 (Status: affected)
- 24.0 ap381970 (Status: affected)
- 24.0 ap381271 (Status: affected)
- 24.0 ap381292 (Status: affected)
- 24.0 ap381621 (Status: affected)
- 24.0 ap379049 (Status: affected)
- 24.0 ap380840 (Status: affected)
- 24.0 ap381600 (Status: affected)
- 24.0 ap382526 (Status: affected)
- 24.0 ap382462 (Status: affected)
- 24.0 ap380613 (Status: affected)
- 24.0 ap381596 (Status: affected)
- 24.0 ap380779 (Status: affected)
- 24.0 ap382615 (Status: affected)
- 24.0 ap382170 (Status: affected)
- 24.0 ap382164 (Status: affected)
- 24.0 ap382189 (Status: affected)
- 24.0 ap381357 (Status: affected)
- 24.0 ap381348 (Status: affected)
- 24.0 ap382495 (Status: affected)
- 24.0 ap382042 (Status: affected)
- 24.0 ap382441 (Status: affected)
- 24.0 ap381575 (Status: affected)
- 24.0 ap381936 (Status: affected)
- 24.0 ap382994 (Status: affected)
- 24.0 ap381623 (Status: affected)
- 24.0 ap382236 (Status: affected)
- 24.0 ap382676 (Status: affected)
- 24.0 ap382673 (Status: affected)
- 24.0 ap380998 (Status: affected)
- 24.0 ap382045 (Status: affected)
- 24.0 ap382167 (Status: affected)
- 24.0 ap381975 (Status: affected)
- 24.0 ap382668 (Status: affected)
- 24.0 ap382053 (Status: affected)
- 24.0 ap383710 (Status: affected)
- 24.0 ap382740 (Status: affected)
- 24.0 ap383459 (Status: affected)
- 24.0 ap382692 (Status: affected)
- 24.0 ap383737 (Status: affected)
- 24.0 ap380045 (Status: affected)
- 24.0 ap382195 (Status: affected)
- 24.0 ap382057 (Status: affected)
- 24.0 ap381243 (Status: affected)
- 24.0 ap382160 (Status: affected)
- 24.0 ap382445 (Status: affected)
- 24.0 ap382246 (Status: affected)
- 24.0 ap382958 (Status: affected)
- 24.0 ap381854 (Status: affected)
- 24.0 ap381604 (Status: affected)
- 24.0 ap381091 (Status: affected)
- 24.0 ap381079 (Status: affected)
- 24.0 ap381527 (Status: affected)
- 24.0 ap383772 (Status: affected)
- 24.0 ap381004 (Status: affected)
- 24.0 ap380737 (Status: affected)
- 24.0 ap382253 (Status: affected)
- 24.0 ap381721 (Status: affected)
- 24.0 ap381322 (Status: affected)
- 24.0 ap382098 (Status: affected)
- 24.0 ap382677 (Status: affected)
- 24.0 ap382169 (Status: affected)
- 24.0 ap383696 (Status: affected)
- 24.0 ap382258 (Status: affected)
- 24.0 ap380751 (Status: affected)
- 24.0 ap382262 (Status: affected)
- 24.0 ap382267 (Status: affected)
- 24.0 ap382192 (Status: affected)
- 24.0 ap380128 (Status: affected)
- 24.0 ap382656 (Status: affected)
- 24.0 ap383779 (Status: affected)
- 24.0 ap382194 (Status: affected)
- 24.0 ap382691 (Status: affected)
- 24.0 ap382372 (Status: affected)
- 24.0 ap380771 (Status: affected)
- 24.0 ap382155 (Status: affected)
- 24.0 ap382484 (Status: affected)
- 24.0 ap383902 (Status: affected)
- 24.0 ap382362 (Status: affected)
- 24.0 ap383788 (Status: affected)
- 24.0 ap383771 (Status: affected)
- 24.0 ap382836 (Status: affected)
- 24.0 ap382240 (Status: affected)
- 24.0 ap383700 (Status: affected)
- 24.0 ap383597 (Status: affected)
- 24.0 ap381108 (Status: affected)
- 24.0 ap379012 (Status: affected)
- 24.0 ap382709 (Status: affected)
- 24.0 ap381078 (Status: affected)
- 24.0 ap383505 (Status: affected)
- 24.0 ap382977 (Status: affected)
- 24.0 ap382912 (Status: affected)
- 24.0 ap383569 (Status: affected)
- 24.0 ap383105 (Status: affected)
- 24.0 ap380537 (Status: affected)
- 24.0 ap382935 (Status: affected)
- 24.0 ap381616 (Status: affected)
- 24.0 ap383519 (Status: affected)
- 24.0 ap381410 (Status: affected)
- 24.0 ap383573 (Status: affected)
- 24.0 ap382959 (Status: affected)
- 24.0 ap376010 (Status: affected)
- 24.0 ap380051 (Status: affected)
- 24.0 ap381506 (Status: affected)
- 24.0 ap381732 (Status: affected)
- 24.0 ap383492 (Status: affected)
- 24.0 ap383089 (Status: affected)
- 24.0 ap383172 (Status: affected)
- 24.0 ap381624 (Status: affected)
- 24.0 ap383547 (Status: affected)
- 24.0 ap381584 (Status: affected)
- 24.0 ap382945 (Status: affected)
- 24.0 ap382594 (Status: affected)
- 24.0 ap383494 (Status: affected)
- 24.0 ap381611 (Status: affected)
- 24.0 ap380739 (Status: affected)
- 24.0 ap381574 (Status: affected)
- 24.0 ap383390 (Status: affected)
- 24.0 ap383538 (Status: affected)
- 24.0 ap382838 (Status: affected)
- 24.0 ap382252 (Status: affected)
- 24.0 ap383518 (Status: affected)
- 24.0 ap383326 (Status: affected)
- 24.0 ap383463 (Status: affected)
- 24.0 ap383391 (Status: affected)
- 24.0 ap380052 (Status: affected)
- 24.0 ap383352 (Status: affected)
- 24.0 ap383064 (Status: affected)
- 24.0 ap382488 (Status: affected)
- 24.0 ap381615 (Status: affected)
- 24.0 ap382952 (Status: affected)
- 24.0 ap381055 (Status: affected)
- 24.0 ap383466 (Status: affected)
- 24.0 ap383178 (Status: affected)
- 24.0 ap383515 (Status: affected)
- 24.0 ap383681 (Status: affected)
- 24.0 ap383377 (Status: affected)
- 24.0 ap383327 (Status: affected)
- 24.0 ap383123 (Status: affected)
- 24.0 ap383346 (Status: affected)
- 24.0 ap383331 (Status: affected)
- 24.0 ap382993 (Status: affected)
- 24.0 ap383147 (Status: affected)
- 24.0 ap382487 (Status: affected)
- 24.0 ap383170 (Status: affected)
- 24.0 ap382929 (Status: affected)
- 24.0 ap383717 (Status: affected)
- 24.0 ap380782 (Status: affected)
- 24.0 ap382954 (Status: affected)
- 24.0 ap382527 (Status: affected)
- 24.0 ap383754 (Status: affected)
- 24.0 ap382969 (Status: affected)
- 24.0 ap382965 (Status: affected)
- 24.0 ap380970 (Status: affected)
- 24.0 ap382515 (Status: affected)
- 24.0 ap382463 (Status: affected)
- 24.0 ap382976 (Status: affected)
- 24.0 ap380837 (Status: affected)
- 24.0 ap381878 (Status: affected)
- 24.0 ap381031 (Status: affected)
- 24.0 ap383338 (Status: affected)
- 24.0 ap383119 (Status: affected)
- 24.0 ap380802 (Status: affected)
- 24.0 ap383168 (Status: affected)
- 24.0 ap383297 (Status: affected)
- 24.0 ap383188 (Status: affected)
- 24.0 ap381285 (Status: affected)
- 24.0 ap381257 (Status: affected)
- 24.0 ap383247 (Status: affected)
- 24.0 ap382186 (Status: affected)
- 24.0 ap381418 (Status: affected)
- 24.0 ap381515 (Status: affected)
- 24.0 ap381570 (Status: affected)
- 24.0 ap383511 (Status: affected)
- 24.0 ap381367 (Status: affected)
- 24.0 ap378603 (Status: affected)
- 24.0 ap381366 (Status: affected)
- 24.0 ap382456 (Status: affected)
- 24.0 ap381412 (Status: affected)
- 24.0 ap383567 (Status: affected)
- 24.0 ap381548 (Status: affected)
- 24.0 ap379397 (Status: affected)
- 24.0 ap381518 (Status: affected)
- 24.0 ap381341 (Status: affected)
- 24.0 ap381498 (Status: affected)
- 24.0 ap381507 (Status: affected)
- 24.0 ap381339 (Status: affected)
- 24.0 ap383302 (Status: affected)
- 24.0 ap381398 (Status: affected)
- 24.0 ap380775 (Status: affected)
- 24.0 ap381526 (Status: affected)
- 24.0 ap383908 (Status: affected)
- 24.0 ap383821 (Status: affected)
- 24.0 ap383781 (Status: affected)
- 24.0 ap381334 (Status: affected)
- 24.0 ap382689 (Status: affected)
- 24.0 ap381215 (Status: affected)
- 24.0 ap382646 (Status: affected)
- 24.0 ap382493 (Status: affected)
- 24.0 ap382300 (Status: affected)
- 24.0 ap381001 (Status: affected)
- 24.0 ap380697 (Status: affected)
- 24.0 ap382412 (Status: affected)
- 24.0 ap381305 (Status: affected)
- 24.0 ap381523 (Status: affected)
- 24.0 ap380535 (Status: affected)
- 24.0 ap381543 (Status: affected)
- 24.0 ap381088 (Status: affected)
- 24.0 ap382631 (Status: affected)
- 24.0 ap379046 (Status: affected)
- 24.0 ap380167 (Status: affected)
- 24.0 ap381308 (Status: affected)
- 24.0 ap381340 (Status: affected)
- 24.0 ap380783 (Status: affected)
- 24.0 ap383603 (Status: affected)
- 24.0 ap381300 (Status: affected)
- 24.0 ap381805 (Status: affected)
- 24.0 ap381733 (Status: affected)
- 24.0 ap381384 (Status: affected)
- 24.0 ap373571 (Status: affected)
- 24.0 ap380042 (Status: affected)
- 24.0 ap381840 (Status: affected)
- 24.0 ap381951 (Status: affected)
- 24.0 ap382856 (Status: affected)
- 24.0 ap383524 (Status: affected)
- 24.0 ap380047 (Status: affected)
- 24.0 ap381857 (Status: affected)
- 24.0 ap383520 (Status: affected)
- 24.0 ap381956 (Status: affected)
- 24.0 ap381655 (Status: affected)
- 24.0 ap381569 (Status: affected)
- 24.0 ap379954 (Status: affected)
- 24.0 ap383716 (Status: affected)
- 24.0 ap383775 (Status: affected)
- 24.0 ap383838 (Status: affected)
- 24.0 ap383905 (Status: affected)
- 24.0 ap383909 (Status: affected)
- 24.0 ap383933 (Status: affected)
- 24.0 ap383943 (Status: affected)
- 24.0 ap383952 (Status: affected)
- 24.0 ap383955 (Status: affected)
- 24.0 ap383968 (Status: affected)
- 24.0 ap383979 (Status: affected)
- 24.0 ap384000 (Status: affected)
- 24.0 ap384115 (Status: affected)
- 24.0 ap383989 (Status: affected)
- 24.0 ap384002 (Status: affected)
- 24.0 ap383782 (Status: affected)
- 24.0 ap383992 (Status: affected)
- 24.0 ap383973 (Status: affected)
- 24.0 ap383309 (Status: affected)
- 24.0 ap383514 (Status: affected)
- 24.0 ap383815 (Status: affected)
- 24.0 ap383899 (Status: affected)
- 24.0 ap383983 (Status: affected)
- 24.0 ap383994 (Status: affected)
- 24.0 ap383998 (Status: affected)
- 24.0 ap384015 (Status: affected)
- 24.0 ap384023 (Status: affected)
- 24.0 ap384034 (Status: affected)
- 24.0 ap384120 (Status: affected)
- 24.0 ap384127 (Status: affected)
- 24.0 ap384129 (Status: affected)
- 24.0 ap384134 (Status: affected)
- 24.0 ap384137 (Status: affected)
- 24.0 ap384138 (Status: affected)
- 24.0 ap384145 (Status: affected)
- 24.0 ap384151 (Status: affected)
- 24.0 ap384163 (Status: affected)
- 24.0 ap384173 (Status: affected)
- 24.0 ap384177 (Status: affected)
- 24.0 ap384179 (Status: affected)
- 24.0 ap384185 (Status: affected)
- 24.0 ap384191 (Status: affected)
- 24.0 ap384194 (Status: affected)
- 24.0 ap384209 (Status: affected)
- 24.0 ap384211 (Status: affected)
- 24.0 ap384220 (Status: affected)
- 24.0 ap384234 (Status: affected)
- 24.0 ap384309 (Status: affected)
- 24.0 ap384317 (Status: affected)
- 24.0 ap381051 (Status: affected)
- 24.0 ap381081 (Status: affected)
- 24.0 ap382225 (Status: affected)
- 24.0 ap382717 (Status: affected)
- 24.0 ap382824 (Status: affected)
- 24.0 ap382841 (Status: affected)
- 24.0 ap382857 (Status: affected)
- 24.0 ap382873 (Status: affected)
- 24.0 ap382894 (Status: affected)
- 24.0 ap384232 (Status: affected)
- 24.0 ap384239 (Status: affected)
- 24.0 ap384320 (Status: affected)
- 24.0 ap384339 (Status: affected)
- 24.0 ap384342 (Status: affected)
- 24.0 ap384344 (Status: affected)
- 24.0 ap384345 (Status: affected)
- 24.0 ap384351 (Status: affected)
- 24.0 ap384357 (Status: affected)
- 24.0 ap384358 (Status: affected)
- 24.0 ap384361 (Status: affected)
- 24.0 ap384365 (Status: affected)
- 24.0 ap384367 (Status: affected)
- 24.0 ap384372 (Status: affected)
- 24.0 ap384374 (Status: affected)
- 24.0 ap384377 (Status: affected)
- 24.0 ap384386 (Status: affected)
- 24.0 ap384389 (Status: affected)
- 24.0 ap384395 (Status: affected)
- 24.0 ap384423 (Status: affected)
- 24.0 ap384428 (Status: affected)
- 24.0 ap384429 (Status: affected)
- 24.0 ap384430 (Status: affected)
- 24.0 ap384431 (Status: affected)
- 24.0 ap384434 (Status: affected)
- 24.0 ap384439 (Status: affected)
- 24.0 ap384441 (Status: affected)
- 24.0 ap384446 (Status: affected)
- 24.0 ap384448 (Status: affected)
- 24.0 ap384449 (Status: affected)
- 24.0 ap384455 (Status: affected)
- 24.0 ap384462 (Status: affected)
- 24.0 ap384468 (Status: affected)
- 24.0 ap384471 (Status: affected)
- 24.0 ap384474 (Status: affected)
- 24.0 ap384480 (Status: affected)
- 24.0 ap384543 (Status: affected)
- 24.0 ap384589 (Status: affected)
- 24.0 ap384594 (Status: affected)
- 24.0 ap384620 (Status: affected)
- 24.0 ap384622 (Status: affected)
- 24.0 ap384627 (Status: affected)
- 24.0 ap384629 (Status: affected)
- 24.0 ap384636 (Status: affected)
- 24.0 ap384641 (Status: affected)
- 24.0 ap384643 (Status: affected)
- 24.0 ap384650 (Status: affected)
- 24.0 ap375650 (Status: affected)
- 24.0 ap384382 (Status: affected)
- 24.0 ap384383 (Status: affected)
- 24.0 ap384457 (Status: affected)
- 24.0 ap384591 (Status: affected)
- 24.0 ap384653 (Status: affected)
- 24.0 ap384654 (Status: affected)
- 24.0 ap384656 (Status: affected)
- 24.0 ap384658 (Status: affected)
- 24.0 ap384740 (Status: affected)
- 24.0 ap384745 (Status: affected)
- 24.0 ap384747 (Status: affected)
- 24.0 ap384755 (Status: affected)
- 24.0 ap384772 (Status: affected)
- 24.0 ap384781 (Status: affected)
- 24.0 ap384793 (Status: affected)
- 24.0 ap384800 (Status: affected)
- 24.0 ap384801 (Status: affected)
- 24.0 ap384870 (Status: affected)
- 24.0 ap384874 (Status: affected)
- 24.0 ap384876 (Status: affected)
- 24.0 ap384879 (Status: affected)
- 24.0 ap384884 (Status: affected)
- 24.0 ap384898 (Status: affected)
- 24.0 ap384901 (Status: affected)
- 24.0 ap384908 (Status: affected)
- 24.0 ap384921 (Status: affected)
- 24.0 ap384925 (Status: affected)
- 24.0 ap384930 (Status: affected)
- 24.0 ap384931 (Status: affected)
- 24.0 ap384942 (Status: affected)
- 24.0 ap384947 (Status: affected)
- 24.0 ap384957 (Status: affected)
- 24.0 ap384962 (Status: affected)
- 24.0 ap385048 (Status: affected)
- 24.0 ap385054 (Status: affected)
- 24.0 ap385057 (Status: affected)
- 24.0 ap385058 (Status: affected)
- 24.0 ap385071 (Status: affected)
- 24.0 ap385085 (Status: affected)
- 24.0 ap385088 (Status: affected)
- 24.0 ap385104 (Status: affected)
- 24.0 ap385107 (Status: affected)
- 24.0 ap385111 (Status: affected)
- 24.0 ap385114 (Status: affected)
- 24.0 ap385115 (Status: affected)
- 24.0 ap385134 (Status: affected)
- 24.0 ap385136 (Status: affected)
- 24.0 ap385146 (Status: affected)
- 24.0 ap385149 (Status: affected)
- 24.0 ap385233 (Status: affected)
- 24.0 ap385235 (Status: affected)
- 24.0 ap385238 (Status: affected)
- 24.0 ap385240 (Status: affected)
- 24.0 ap385241 (Status: affected)
- 24.0 ap385242 (Status: affected)
- 24.0 ap385244 (Status: affected)
- 24.0 ap385247 (Status: affected)
- 24.0 ap385249 (Status: affected)
- 24.0 ap385250 (Status: affected)
- 24.0 ap385251 (Status: affected)
- 24.0 ap385252 (Status: affected)
- 24.0 ap385253 (Status: affected)
- 24.0 ap385254 (Status: affected)
- 24.0 ap385255 (Status: affected)
- 24.0 ap385256 (Status: affected)
- 24.0 ap385259 (Status: affected)
- 24.0 ap385265 (Status: affected)
- 24.0 ap385266 (Status: affected)
- 24.0 ap385267 (Status: affected)
- 24.0 ap385268 (Status: affected)
- 24.0 ap385269 (Status: affected)
- 24.0 ap385272 (Status: affected)
- 24.0 ap385275 (Status: affected)
- 24.0 ap385276 (Status: affected)
- 24.0 ap385277 (Status: affected)
- 24.0 ap385278 (Status: affected)
- 24.0 ap385280 (Status: affected)
- 24.0 ap385282 (Status: affected)
- 24.0 ap385274 (Status: affected)
- 24.0 ap385281 (Status: affected)
- 24.0 ap385286 (Status: affected)
- 24.0 ap385287 (Status: affected)
- 24.0 ap385289 (Status: affected)
- 24.0 ap385295 (Status: affected)
- 24.0 ap385298 (Status: affected)
- 24.0 ap385299 (Status: affected)
- 24.0 ap385302 (Status: affected)
- 24.0 ap385303 (Status: affected)
- 24.0 ap385304 (Status: affected)
- 24.0 ap385305 (Status: affected)
- 24.0 ap385309 (Status: affected)
- 24.0 ap385313 (Status: affected)
- 24.0 ap385315 (Status: affected)
- 24.0 ap385312 (Status: affected)
- 24.0 ap385317 (Status: affected)
- 24.0 ap385310 (Status: affected)
- 24.0 ap385283 (Status: affected)
- 24.0 ap385314 (Status: affected)
- 24.0 ap385316 (Status: affected)
- 24.0 ap385322 (Status: affected)
- 24.0 ap385323 (Status: affected)
- 24.0 ap385324 (Status: affected)
- 24.0 ap385326 (Status: affected)
- 24.0 ap385334 (Status: affected)
- 24.0 ap385336 (Status: affected)
- 24.0 ap385342 (Status: affected)
- 24.0 ap385422 (Status: affected)
- 24.0 ap385390 (Status: affected)
- 24.0 ap385393 (Status: affected)
- 24.0 ap385370 (Status: affected)
- 24.0 ap385353 (Status: affected)
- 24.0 ap385369 (Status: affected)
- 24.0 ap385337 (Status: affected)
- 24.0 ap385408 (Status: affected)
- 24.0 ap385395 (Status: affected)
- 24.0 ap385378 (Status: affected)
- 24.0 ap385399 (Status: affected)
- 24.0 ap385368 (Status: affected)
- 24.0 ap385354 (Status: affected)
- 24.0 ap385394 (Status: affected)
- 24.0 ap385364 (Status: affected)
- 24.0 ap385371 (Status: affected)
- 24.0 ap385338 (Status: affected)
- 24.0 ap385363 (Status: affected)
- 24.0 ap385360 (Status: affected)
- 24.0 ap385379 (Status: affected)
- 24.0 ap385366 (Status: affected)
- 24.0 ap385396 (Status: affected)
- 24.0 ap385384 (Status: affected)
- 24.0 ap385416 (Status: affected)
- 24.0 ap385373 (Status: affected)
- 24.0 ap385365 (Status: affected)
- 24.0 ap385382 (Status: affected)
- 24.0 ap385386 (Status: affected)
- 24.0 ap385329 (Status: affected)
- 24.0 ap385351 (Status: affected)
- 24.0 ap385344 (Status: affected)
- 24.0 ap385401 (Status: affected)
- 24.0 ap385376 (Status: affected)
- 24.0 ap385405 (Status: affected)
- 24.0 ap385380 (Status: affected)
- 24.0 ap385345 (Status: affected)
- 24.0 ap385361 (Status: affected)
- 24.0 ap385339 (Status: affected)
- 24.0 ap385372 (Status: affected)
- 24.0 ap385352 (Status: affected)
- 24.0 ap385375 (Status: affected)
- 24.0 ap385391 (Status: affected)
- 24.0 ap385349 (Status: affected)
- 24.0 ap385348 (Status: affected)
- 24.0 ap385355 (Status: affected)
- 24.0 ap385389 (Status: affected)
- 24.0 ap385397 (Status: affected)
- 24.0 ap385419 (Status: affected)
- 24.0 ap385410 (Status: affected)
- 24.0 ap385340 (Status: affected)
- 24.0 ap385356 (Status: affected)
- 24.0 ap385402 (Status: affected)
- 24.0 ap385374 (Status: affected)
- 24.0 ap385404 (Status: affected)
- 24.0 ap385412 (Status: affected)
- 24.0 ap385414 (Status: affected)
- 24.0 ap385330 (Status: affected)
- 24.0 ap385413 (Status: affected)
- 24.0 ap385333 (Status: affected)
- 24.0 ap385406 (Status: affected)
- 23.0 (Status: affected)
- 23.0 ap380204 (Status: affected)
- 23.0 ap380281 (Status: affected)
- 23.0 ap380355 (Status: affected)
- 23.0 ap380375 (Status: affected)
- 23.0 ap380391 (Status: affected)
- 23.0 ap380396 (Status: affected)
- 23.0 ap366748 (Status: affected)
- 23.0 ap374310 (Status: affected)
- 23.0 ap375293 (Status: affected)
- 23.0 ap371233 (Status: affected)
- 23.0 ap381051 (Status: affected)
- 23.0 ap365558 (Status: affected)
- 23.0 ap379795 (Status: affected)
- 23.0 ap373098 (Status: affected)
- 23.0 ap382864 (Status: affected)
- 23.0 ap364705 (Status: affected)
- 23.0 ap375539 (Status: affected)
- 23.0 ap382358 (Status: affected)
- 23.0 ap374143 (Status: affected)
- 23.0 ap367292 (Status: affected)
- 23.0 ap375289 (Status: affected)
- 23.0 ap375624 (Status: affected)
- 23.0 ap375317 (Status: affected)
- 23.0 ap362261 (Status: affected)
- 23.0 ap382281 (Status: affected)
- 23.0 ap367434 (Status: affected)
- 23.0 ap363641 (Status: affected)
- 23.0 ap376661 (Status: affected)
- 23.0 ap382262 (Status: affected)
- 23.0 ap380691 (Status: affected)
- 23.0 ap383569 (Status: affected)
- 23.0 ap368179 (Status: affected)
- 23.0 ap375601 (Status: affected)
- 23.0 ap382206 (Status: affected)
- 23.0 ap383829 (Status: affected)
- 23.0 ap377319 (Status: affected)
- 23.0 ap381081 (Status: affected)
- 23.0 ap363869 (Status: affected)
- 23.0 ap367895 (Status: affected)
- 23.0 ap383902 (Status: affected)
- 23.0 ap372017 (Status: affected)
- 23.0 ap383519 (Status: affected)
- 23.0 ap375345 (Status: affected)
- 23.0 ap374085 (Status: affected)
- 23.0 ap367488 (Status: affected)
- 23.0 ap382236 (Status: affected)
- 23.0 ap363192 (Status: affected)
- 23.0 ap371974 (Status: affected)
- 23.0 ap367223 (Status: affected)
- 23.0 ap373017 (Status: affected)
- 23.0 ap373752 (Status: affected)
- 23.0 ap373882 (Status: affected)
- 23.0 ap373861 (Status: affected)
- 23.0 ap365531 (Status: affected)
- 23.0 ap373870 (Status: affected)
- 23.0 ap372929 (Status: affected)
- 23.0 ap373952 (Status: affected)
- 23.0 ap374037 (Status: affected)
- 23.0 ap368214 (Status: affected)
- 23.0 ap366264 (Status: affected)
- 23.0 ap373769 (Status: affected)
- 23.0 ap383779 (Status: affected)
- 23.0 ap374583 (Status: affected)
- 23.0 ap373009 (Status: affected)
- 23.0 ap371300 (Status: affected)
- 23.0 ap374125 (Status: affected)
- 23.0 ap367985 (Status: affected)
- 23.0 ap364367 (Status: affected)
- 23.0 ap362578 (Status: affected)
- 23.0 ap373871 (Status: affected)
- 23.0 ap383785 (Status: affected)
- 23.0 ap380766 (Status: affected)
- 23.0 ap365598 (Status: affected)
- 23.0 ap380849 (Status: affected)
- 23.0 ap373912 (Status: affected)
- 23.0 ap366334 (Status: affected)
- 23.0 ap374421 (Status: affected)
- 23.0 ap380692 (Status: affected)
- 23.0 ap380758 (Status: affected)
- 23.0 ap374305 (Status: affected)
- 23.0 ap380771 (Status: affected)
- 23.0 ap367992 (Status: affected)
- 23.0 ap374055 (Status: affected)
- 23.0 ap367547 (Status: affected)
- 23.0 ap368000 (Status: affected)
- 23.0 ap366366 (Status: affected)
- 23.0 ap365227 (Status: affected)
- 23.0 ap372015 (Status: affected)
- 23.0 ap372012 (Status: affected)
- 23.0 ap374668 (Status: affected)
- 23.0 ap383788 (Status: affected)
- 23.0 ap351263 (Status: affected)
- 23.0 ap374715 (Status: affected)
- 23.0 ap374691 (Status: affected)
- 23.0 ap370792 (Status: affected)
- 23.0 ap364467 (Status: affected)
- 23.0 ap365701 (Status: affected)
- 23.0 ap374255 (Status: affected)
- 23.0 ap381357 (Status: affected)
- 23.0 ap374311 (Status: affected)
- 23.0 ap374162 (Status: affected)
- 23.0 ap363644 (Status: affected)
- 23.0 ap373754 (Status: affected)
- 23.0 ap373301 (Status: affected)
- 23.0 ap373182 (Status: affected)
- 23.0 ap374226 (Status: affected)
- 23.0 ap377423 (Status: affected)
- 23.0 ap369489 (Status: affected)
- 23.0 ap373294 (Status: affected)
- 23.0 ap383524 (Status: affected)
- 23.0 ap383302 (Status: affected)
- 23.0 ap375902 (Status: affected)
- 23.0 ap376010 (Status: affected)
- 23.0 ap382487 (Status: affected)
- 23.0 ap371314 (Status: affected)
- 23.0 ap371327 (Status: affected)
- 23.0 ap371285 (Status: affected)
- 23.0 ap371368 (Status: affected)
- 23.0 ap371167 (Status: affected)
- 23.0 ap374454 (Status: affected)
- 23.0 ap383538 (Status: affected)
- 23.0 ap374109 (Status: affected)
- 23.0 ap374639 (Status: affected)
- 23.0 ap371099 (Status: affected)
- 23.0 ap369731 (Status: affected)
- 23.0 ap371310 (Status: affected)
- 23.0 ap383490 (Status: affected)
- 23.0 ap374315 (Status: affected)
- 23.0 ap374249 (Status: affected)
- 23.0 ap374493 (Status: affected)
- 23.0 ap374165 (Status: affected)
- 23.0 ap374361 (Status: affected)
- 23.0 ap373330 (Status: affected)
- 23.0 ap369928 (Status: affected)
- 23.0 ap374296 (Status: affected)
- 23.0 ap371319 (Status: affected)
- 23.0 ap374210 (Status: affected)
- 23.0 ap372116 (Status: affected)
- 23.0 ap371748 (Status: affected)
- 23.0 ap374472 (Status: affected)
- 23.0 ap372453 (Status: affected)
- 23.0 ap371432 (Status: affected)
- 23.0 ap372345 (Status: affected)
- 23.0 ap371868 (Status: affected)
- 23.0 ap372121 (Status: affected)
- 23.0 ap383710 (Status: affected)
- 23.0 ap372995 (Status: affected)
- 23.0 ap373511 (Status: affected)
- 23.0 ap372873 (Status: affected)
- 23.0 ap370427 (Status: affected)
- 23.0 ap371209 (Status: affected)
- 23.0 ap355298 (Status: affected)
- 23.0 ap371811 (Status: affected)
- 23.0 ap373589 (Status: affected)
- 23.0 ap366525 (Status: affected)
- 23.0 ap381596 (Status: affected)
- 23.0 ap383567 (Status: affected)
- 23.0 ap372533 (Status: affected)
- 23.0 ap372922 (Status: affected)
- 23.0 ap370538 (Status: affected)
- 23.0 ap371268 (Status: affected)
- 23.0 ap383681 (Status: affected)
- 23.0 ap374498 (Status: affected)
- 23.0 ap373004 (Status: affected)
- 23.0 ap371269 (Status: affected)
- 23.0 ap371456 (Status: affected)
- 23.0 ap366201 (Status: affected)
- 23.0 ap360464 (Status: affected)
- 23.0 ap362035 (Status: affected)
- 23.0 ap375383 (Status: affected)
- 23.0 ap375770 (Status: affected)
- 23.0 ap372607 (Status: affected)
- 23.0 ap371259 (Status: affected)
- 23.0 ap374794 (Status: affected)
- 23.0 ap366296 (Status: affected)
- 23.0 ap374892 (Status: affected)
- 23.0 ap367007 (Status: affected)
- 23.0 ap365754 (Status: affected)
- 23.0 ap374785 (Status: affected)
- 23.0 ap352402 (Status: affected)
- 23.0 ap372079 (Status: affected)
- 23.0 ap375309 (Status: affected)
- 23.0 ap366797 (Status: affected)
- 23.0 ap366335 (Status: affected)
- 23.0 ap375465 (Status: affected)
- 23.0 ap374609 (Status: affected)
- 23.0 ap381366 (Status: affected)
- 23.0 ap370383 (Status: affected)
- 23.0 ap371722 (Status: affected)
- 23.0 ap362749 (Status: affected)
- 23.0 ap367323 (Status: affected)
- 23.0 ap374820 (Status: affected)
- 23.0 ap369763 (Status: affected)
- 23.0 ap381657 (Status: affected)
- 23.0 ap368517 (Status: affected)
- 23.0 ap372455 (Status: affected)
- 23.0 ap365058 (Status: affected)
- 23.0 ap370362 (Status: affected)
- 23.0 ap381358 (Status: affected)
- 23.0 ap374723 (Status: affected)
- 23.0 ap375353 (Status: affected)
- 23.0 ap375370 (Status: affected)
- 23.0 ap380201 (Status: affected)
- 23.0 ap380041 (Status: affected)
- 23.0 ap361414 (Status: affected)
- 23.0 ap380507 (Status: affected)
- 23.0 ap368643 (Status: affected)
- 23.0 ap379140 (Status: affected)
- 23.0 ap379461 (Status: affected)
- 23.0 ap379501 (Status: affected)
- 23.0 ap377147 (Status: affected)
- 23.0 ap376261 (Status: affected)
- 23.0 ap379417 (Status: affected)
- 23.0 ap372207 (Status: affected)
- 23.0 ap368743 (Status: affected)
- 23.0 ap370464 (Status: affected)
- 23.0 ap353137 (Status: affected)
- 23.0 ap373016 (Status: affected)
- 23.0 ap364518 (Status: affected)
- 23.0 ap361651 (Status: affected)
- 23.0 ap379339 (Status: affected)
- 23.0 ap374711 (Status: affected)
- 23.0 ap371091 (Status: affected)
- 23.0 ap370763 (Status: affected)
- 23.0 ap366610 (Status: affected)
- 23.0 ap371021 (Status: affected)
- 23.0 ap366275 (Status: affected)
- 23.0 ap370909 (Status: affected)
- 23.0 ap381243 (Status: affected)
- 23.0 ap381271 (Status: affected)
- 23.0 ap379449 (Status: affected)
- 23.0 ap371052 (Status: affected)
- 23.0 ap381247 (Status: affected)
- 23.0 ap383603 (Status: affected)
- 23.0 ap380249 (Status: affected)
- 23.0 ap382195 (Status: affected)
- 23.0 ap380130 (Status: affected)
- 23.0 ap373571 (Status: affected)
- 23.0 ap382668 (Status: affected)
- 23.0 ap382493 (Status: affected)
- 23.0 ap380269 (Status: affected)
- 23.0 ap380232 (Status: affected)
- 23.0 ap364371 (Status: affected)
- 23.0 ap377483 (Status: affected)
- 23.0 ap383716 (Status: affected)
- 23.0 ap383775 (Status: affected)
- 23.0 ap383909 (Status: affected)
- 23.0 ap383913 (Status: affected)
- 23.0 ap383943 (Status: affected)
- 23.0 ap383952 (Status: affected)
- 23.0 ap383955 (Status: affected)
- 23.0 ap383979 (Status: affected)
- 23.0 ap383838 (Status: affected)
- 23.0 ap384023 (Status: affected)
- 23.0 ap381781 (Status: affected)
- 23.0 ap383717 (Status: affected)
- 23.0 ap383797 (Status: affected)
- 23.0 ap383815 (Status: affected)
- 23.0 ap383998 (Status: affected)
- 23.0 ap384015 (Status: affected)
- 23.0 ap384127 (Status: affected)
- 23.0 ap384131 (Status: affected)
- 23.0 ap384151 (Status: affected)
- 23.0 ap384173 (Status: affected)
- 23.0 ap384179 (Status: affected)
- 23.0 ap384185 (Status: affected)
- 23.0 ap384211 (Status: affected)
- 23.0 ap384220 (Status: affected)
- 23.0 ap384227 (Status: affected)
- 23.0 ap384245 (Status: affected)
- 23.0 ap384344 (Status: affected)
- 23.0 ap363366 (Status: affected)
- 23.0 ap364258 (Status: affected)
- 23.0 ap364844 (Status: affected)
- 23.0 ap365170 (Status: affected)
- 23.0 ap365576 (Status: affected)
- 23.0 ap365858 (Status: affected)
- 23.0 ap366221 (Status: affected)
- 23.0 ap366294 (Status: affected)
- 23.0 ap365801 (Status: affected)
- 23.0 ap366170 (Status: affected)
- 23.0 ap364925 (Status: affected)
- 23.0 ap366295 (Status: affected)
- 23.0 ap366346 (Status: affected)
- 23.0 ap366348 (Status: affected)
- 23.0 ap365171 (Status: affected)
- 23.0 ap364295 (Status: affected)
- 23.0 ap364559 (Status: affected)
- 23.0 ap366118 (Status: affected)
- 23.0 ap366252 (Status: affected)
- 23.0 ap363815 (Status: affected)
- 23.0 ap363729 (Status: affected)
- 23.0 ap365390 (Status: affected)
- 23.0 ap364932 (Status: affected)
- 23.0 ap365239 (Status: affected)
- 23.0 ap365759 (Status: affected)
- 23.0 ap366211 (Status: affected)
- 23.0 ap366290 (Status: affected)
- 23.0 ap365223 (Status: affected)
- 23.0 ap366117 (Status: affected)
- 23.0 ap365730 (Status: affected)
- 23.0 ap366299 (Status: affected)
- 23.0 ap366261 (Status: affected)
- 23.0 ap365889 (Status: affected)
- 23.0 ap366181 (Status: affected)
- 23.0 ap365115 (Status: affected)
- 23.0 ap364048 (Status: affected)
- 23.0 ap366298 (Status: affected)
- 23.0 ap364699 (Status: affected)
- 23.0 ap345032 (Status: affected)
- 23.0 ap362683 (Status: affected)
- 23.0 ap363361 (Status: affected)
- 23.0 ap352969 (Status: affected)
- 23.0 ap359103 (Status: affected)
- 23.0 ap366375 (Status: affected)
- 23.0 ap366870 (Status: affected)
- 23.0 ap366912 (Status: affected)
- 23.0 ap366624 (Status: affected)
- 23.0 ap367109 (Status: affected)
- 23.0 ap366397 (Status: affected)
- 23.0 ap354354 (Status: affected)
- 23.0 ap349850 (Status: affected)
- 23.0 ap366880 (Status: affected)
- 23.0 ap360007 (Status: affected)
- 23.0 ap366744 (Status: affected)
- 23.0 ap366747 (Status: affected)
- 23.0 ap366656 (Status: affected)
- 23.0 ap367206 (Status: affected)
- 23.0 ap362771 (Status: affected)
- 23.0 ap367291 (Status: affected)
- 23.0 ap366916 (Status: affected)
- 23.0 ap367207 (Status: affected)
- 23.0 ap363363 (Status: affected)
- 23.0 ap366959 (Status: affected)
- 23.0 ap351530 (Status: affected)
- 23.0 ap361116 (Status: affected)
- 23.0 ap366898 (Status: affected)
- 23.0 ap357608 (Status: affected)
- 23.0 ap361533 (Status: affected)
- 23.0 ap366827 (Status: affected)
- 23.0 ap352962 (Status: affected)
- 23.0 ap366412 (Status: affected)
- 23.0 ap369295 (Status: affected)
- 23.0 ap366358 (Status: affected)
- 23.0 ap366677 (Status: affected)
- 23.0 ap366882 (Status: affected)
- 23.0 ap366972 (Status: affected)
- 23.0 ap366486 (Status: affected)
- 23.0 ap366803 (Status: affected)
- 23.0 ap358290 (Status: affected)
- 23.0 ap363265 (Status: affected)
- 23.0 ap363128 (Status: affected)
- 23.0 ap366701 (Status: affected)
- 23.0 ap366373 (Status: affected)
- 23.0 ap369674 (Status: affected)
- 23.0 ap369206 (Status: affected)
- 23.0 ap369065 (Status: affected)
- 23.0 ap368327 (Status: affected)
- 23.0 ap368308 (Status: affected)
- 23.0 ap368632 (Status: affected)
- 23.0 ap367290 (Status: affected)
- 23.0 ap369302 (Status: affected)
- 23.0 ap368419 (Status: affected)
- 23.0 ap369501 (Status: affected)
- 23.0 ap369219 (Status: affected)
- 23.0 ap368601 (Status: affected)
- 23.0 ap368604 (Status: affected)
- 23.0 ap368706 (Status: affected)
- 23.0 ap368461 (Status: affected)
- 23.0 ap368612 (Status: affected)
- 23.0 ap368552 (Status: affected)
- 23.0 ap369529 (Status: affected)
- 23.0 ap369748 (Status: affected)
- 23.0 ap368218 (Status: affected)
- 23.0 ap368913 (Status: affected)
- 23.0 ap369607 (Status: affected)
- 23.0 ap369693 (Status: affected)
- 23.0 ap368957 (Status: affected)
- 23.0 ap368510 (Status: affected)
- 23.0 ap368445 (Status: affected)
- 23.0 ap369106 (Status: affected)
- 23.0 ap369257 (Status: affected)
- 23.0 ap368987 (Status: affected)
- 23.0 ap369150 (Status: affected)
- 23.0 ap368695 (Status: affected)
- 23.0 ap368167 (Status: affected)
- 23.0 ap370361 (Status: affected)
- 23.0 ap367969 (Status: affected)
- 23.0 ap367367 (Status: affected)
- 23.0 ap369434 (Status: affected)
- 23.0 ap369132 (Status: affected)
- 23.0 ap367678 (Status: affected)
- 23.0 ap367517 (Status: affected)
- 23.0 ap369863 (Status: affected)
- 23.0 ap369227 (Status: affected)
- 23.0 ap368970 (Status: affected)
- 23.0 ap369454 (Status: affected)
- 23.0 ap367332 (Status: affected)
- 23.0 ap368067 (Status: affected)
- 23.0 ap369641 (Status: affected)
- 23.0 ap367794 (Status: affected)
- 23.0 ap369934 (Status: affected)
- 23.0 ap370196 (Status: affected)
- 23.0 ap367358 (Status: affected)
- 23.0 ap367453 (Status: affected)
- 23.0 ap369881 (Status: affected)
- 23.0 ap367732 (Status: affected)
- 23.0 ap367294 (Status: affected)
- 23.0 ap367646 (Status: affected)
- 23.0 ap367874 (Status: affected)
- 23.0 ap370344 (Status: affected)
- 23.0 ap367524 (Status: affected)
- 23.0 ap368153 (Status: affected)
- 23.0 ap368087 (Status: affected)
- 23.0 ap367820 (Status: affected)
- 23.0 ap368180 (Status: affected)
- 23.0 ap367726 (Status: affected)
- 23.0 ap370103 (Status: affected)
- 23.0 ap367974 (Status: affected)
- 23.0 ap367396 (Status: affected)
- 23.0 ap367340 (Status: affected)
- 23.0 ap367293 (Status: affected)
- 23.0 ap369855 (Status: affected)
- 23.0 ap368140 (Status: affected)
- 23.0 ap367298 (Status: affected)
- 23.0 ap367998 (Status: affected)
- 23.0 ap372337 (Status: affected)
- 23.0 ap372706 (Status: affected)
- 23.0 ap368032 (Status: affected)
- 23.0 ap367906 (Status: affected)
- 23.0 ap370138 (Status: affected)
- 23.0 ap372380 (Status: affected)
- 23.0 ap372246 (Status: affected)
- 23.0 ap370193 (Status: affected)
- 23.0 ap372643 (Status: affected)
- 23.0 ap372560 (Status: affected)
- 23.0 ap367513 (Status: affected)
- 23.0 ap369931 (Status: affected)
- 23.0 ap368195 (Status: affected)
- 23.0 ap372243 (Status: affected)
- 23.0 ap368216 (Status: affected)
- 23.0 ap369929 (Status: affected)
- 23.0 ap367365 (Status: affected)
- 23.0 ap367782 (Status: affected)
- 23.0 ap367675 (Status: affected)
- 23.0 ap372757 (Status: affected)
- 23.0 ap372389 (Status: affected)
- 23.0 ap372799 (Status: affected)
- 23.0 ap372641 (Status: affected)
- 23.0 ap371050 (Status: affected)
- 23.0 ap372338 (Status: affected)
- 23.0 ap372623 (Status: affected)
- 23.0 ap372422 (Status: affected)
- 23.0 ap372033 (Status: affected)
- 23.0 ap372178 (Status: affected)
- 23.0 ap371516 (Status: affected)
- 23.0 ap372351 (Status: affected)
- 23.0 ap372708 (Status: affected)
- 23.0 ap372100 (Status: affected)
- 23.0 ap372504 (Status: affected)
- 23.0 ap371961 (Status: affected)
- 23.0 ap370590 (Status: affected)
- 23.0 ap370544 (Status: affected)
- 23.0 ap372599 (Status: affected)
- 23.0 ap371610 (Status: affected)
- 23.0 ap371836 (Status: affected)
- 23.0 ap371343 (Status: affected)
- 23.0 ap372674 (Status: affected)
- 23.0 ap371202 (Status: affected)
- 23.0 ap370911 (Status: affected)
- 23.0 ap370817 (Status: affected)
- 23.0 ap372043 (Status: affected)
- 23.0 ap370802 (Status: affected)
- 23.0 ap371725 (Status: affected)
- 23.0 ap370437 (Status: affected)
- 23.0 ap370926 (Status: affected)
- 23.0 ap370884 (Status: affected)
- 23.0 ap371681 (Status: affected)
- 23.0 ap371366 (Status: affected)
- 23.0 ap370952 (Status: affected)
- 23.0 ap371281 (Status: affected)
- 23.0 ap371436 (Status: affected)
- 23.0 ap371153 (Status: affected)
- 23.0 ap371033 (Status: affected)
- 23.0 ap371977 (Status: affected)
- 23.0 ap371627 (Status: affected)
- 23.0 ap371155 (Status: affected)
- 23.0 ap371134 (Status: affected)
- 23.0 ap371295 (Status: affected)
- 23.0 ap372152 (Status: affected)
- 23.0 ap371760 (Status: affected)
- 23.0 ap370627 (Status: affected)
- 23.0 ap371583 (Status: affected)
- 23.0 ap371546 (Status: affected)
- 23.0 ap371770 (Status: affected)
- 23.0 ap371437 (Status: affected)
- 23.0 ap372091 (Status: affected)
- 23.0 ap372163 (Status: affected)
- 23.0 ap370737 (Status: affected)
- 23.0 ap370908 (Status: affected)
- 23.0 ap370465 (Status: affected)
- 23.0 ap371587 (Status: affected)
- 23.0 ap375133 (Status: affected)
- 23.0 ap371682 (Status: affected)
- 23.0 ap375266 (Status: affected)
- 23.0 ap372099 (Status: affected)
- 23.0 ap375254 (Status: affected)
- 23.0 ap372016 (Status: affected)
- 23.0 ap372177 (Status: affected)
- 23.0 ap375242 (Status: affected)
- 23.0 ap375206 (Status: affected)
- 23.0 ap375291 (Status: affected)
- 23.0 ap371775 (Status: affected)
- 23.0 ap375196 (Status: affected)
- 23.0 ap375688 (Status: affected)
- 23.0 ap375382 (Status: affected)
- 23.0 ap375634 (Status: affected)
- 23.0 ap375654 (Status: affected)
- 23.0 ap375449 (Status: affected)
- 23.0 ap375321 (Status: affected)
- 23.0 ap375685 (Status: affected)
- 23.0 ap375509 (Status: affected)
- 23.0 ap375719 (Status: affected)
- 23.0 ap375720 (Status: affected)
- 23.0 ap375464 (Status: affected)
- 23.0 ap375625 (Status: affected)
- 23.0 ap375441 (Status: affected)
- 23.0 ap375709 (Status: affected)
- 23.0 ap375343 (Status: affected)
- 23.0 ap375533 (Status: affected)
- 23.0 ap375672 (Status: affected)
- 23.0 ap375545 (Status: affected)
- 23.0 ap375264 (Status: affected)
- 23.0 ap375661 (Status: affected)
- 23.0 ap375646 (Status: affected)
- 23.0 ap375238 (Status: affected)
- 23.0 ap375304 (Status: affected)
- 23.0 ap375097 (Status: affected)
- 23.0 ap373664 (Status: affected)
- 23.0 ap373562 (Status: affected)
- 23.0 ap372932 (Status: affected)
- 23.0 ap374339 (Status: affected)
- 23.0 ap374265 (Status: affected)
- 23.0 ap374230 (Status: affected)
- 23.0 ap374430 (Status: affected)
- 23.0 ap373102 (Status: affected)
- 23.0 ap375655 (Status: affected)
- 23.0 ap373777 (Status: affected)
- 23.0 ap374113 (Status: affected)
- 23.0 ap373015 (Status: affected)
- 23.0 ap374971 (Status: affected)
- 23.0 ap374803 (Status: affected)
- 23.0 ap374677 (Status: affected)
- 23.0 ap372974 (Status: affected)
- 23.0 ap373117 (Status: affected)
- 23.0 ap374312 (Status: affected)
- 23.0 ap374354 (Status: affected)
- 23.0 ap375018 (Status: affected)
- 23.0 ap373018 (Status: affected)
- 23.0 ap374506 (Status: affected)
- 23.0 ap374588 (Status: affected)
- 23.0 ap373950 (Status: affected)
- 23.0 ap375038 (Status: affected)
- 23.0 ap373480 (Status: affected)
- 23.0 ap374238 (Status: affected)
- 23.0 ap372845 (Status: affected)
- 23.0 ap373564 (Status: affected)
- 23.0 ap373482 (Status: affected)
- 23.0 ap372994 (Status: affected)
- 23.0 ap373137 (Status: affected)
- 23.0 ap373108 (Status: affected)
- 23.0 ap374977 (Status: affected)
- 23.0 ap373034 (Status: affected)
- 23.0 ap374324 (Status: affected)
- 23.0 ap374031 (Status: affected)
- 23.0 ap374093 (Status: affected)
- 23.0 ap373732 (Status: affected)
- 23.0 ap374507 (Status: affected)
- 23.0 ap373684 (Status: affected)
- 23.0 ap374356 (Status: affected)
- 23.0 ap373820 (Status: affected)
- 23.0 ap373104 (Status: affected)
- 23.0 ap373954 (Status: affected)
- 23.0 ap373644 (Status: affected)
- 23.0 ap373899 (Status: affected)
- 23.0 ap374822 (Status: affected)
- 23.0 ap374254 (Status: affected)
- 23.0 ap375069 (Status: affected)
- 23.0 ap373918 (Status: affected)
- 23.0 ap374557 (Status: affected)
- 23.0 ap372854 (Status: affected)
- 23.0 ap373647 (Status: affected)
- 23.0 ap374838 (Status: affected)
- 23.0 ap374330 (Status: affected)
- 23.0 ap374799 (Status: affected)
- 23.0 ap374428 (Status: affected)
- 23.0 ap373008 (Status: affected)
- 23.0 ap375936 (Status: affected)
- 23.0 ap375862 (Status: affected)
- 23.0 ap374994 (Status: affected)
- 23.0 ap376041 (Status: affected)
- 23.0 ap374895 (Status: affected)
- 23.0 ap375793 (Status: affected)
- 23.0 ap376088 (Status: affected)
- 23.0 ap373046 (Status: affected)
- 23.0 ap375937 (Status: affected)
- 23.0 ap374680 (Status: affected)
- 23.0 ap376181 (Status: affected)
- 23.0 ap375797 (Status: affected)
- 23.0 ap375003 (Status: affected)
- 23.0 ap373763 (Status: affected)
- 23.0 ap373539 (Status: affected)
- 23.0 ap373111 (Status: affected)
- 23.0 ap375734 (Status: affected)
- 23.0 ap376117 (Status: affected)
- 23.0 ap375743 (Status: affected)
- 23.0 ap376087 (Status: affected)
- 23.0 ap376179 (Status: affected)
- 23.0 ap376100 (Status: affected)
- 23.0 ap373299 (Status: affected)
- 23.0 ap373303 (Status: affected)
- 23.0 ap375908 (Status: affected)
- 23.0 ap376356 (Status: affected)
- 23.0 ap375984 (Status: affected)
- 23.0 ap373318 (Status: affected)
- 23.0 ap375865 (Status: affected)
- 23.0 ap373196 (Status: affected)
- 23.0 ap376038 (Status: affected)
- 23.0 ap373257 (Status: affected)
- 23.0 ap373285 (Status: affected)
- 23.0 ap376218 (Status: affected)
- 23.0 ap373438 (Status: affected)
- 23.0 ap373212 (Status: affected)
- 23.0 ap373391 (Status: affected)
- 23.0 ap373315 (Status: affected)
- 23.0 ap373271 (Status: affected)
- 23.0 ap376509 (Status: affected)
- 23.0 ap376252 (Status: affected)
- 23.0 ap376602 (Status: affected)
- 23.0 ap376752 (Status: affected)
- 23.0 ap373452 (Status: affected)
- 23.0 ap376429 (Status: affected)
- 23.0 ap376860 (Status: affected)
- 23.0 ap376710 (Status: affected)
- 23.0 ap376410 (Status: affected)
- 23.0 ap376577 (Status: affected)
- 23.0 ap376633 (Status: affected)
- 23.0 ap376298 (Status: affected)
- 23.0 ap373189 (Status: affected)
- 23.0 ap376426 (Status: affected)
- 23.0 ap376873 (Status: affected)
- 23.0 ap376668 (Status: affected)
- 23.0 ap376407 (Status: affected)
- 23.0 ap376670 (Status: affected)
- 23.0 ap376485 (Status: affected)
- 23.0 ap376642 (Status: affected)
- 23.0 ap376652 (Status: affected)
- 23.0 ap376523 (Status: affected)
- 23.0 ap376656 (Status: affected)
- 23.0 ap376620 (Status: affected)
- 23.0 ap376531 (Status: affected)
- 23.0 ap378025 (Status: affected)
- 23.0 ap377412 (Status: affected)
- 23.0 ap376504 (Status: affected)
- 23.0 ap376762 (Status: affected)
- 23.0 ap376541 (Status: affected)
- 23.0 ap376671 (Status: affected)
- 23.0 ap376844 (Status: affected)
- 23.0 ap376701 (Status: affected)
- 23.0 ap376614 (Status: affected)
- 23.0 ap377578 (Status: affected)
- 23.0 ap377496 (Status: affected)
- 23.0 ap377715 (Status: affected)
- 23.0 ap377508 (Status: affected)
- 23.0 ap376416 (Status: affected)
- 23.0 ap377409 (Status: affected)
- 23.0 ap377778 (Status: affected)
- 23.0 ap376355 (Status: affected)
- 23.0 ap377866 (Status: affected)
- 23.0 ap377516 (Status: affected)
- 23.0 ap377644 (Status: affected)
- 23.0 ap377755 (Status: affected)
- 23.0 ap377540 (Status: affected)
- 23.0 ap377497 (Status: affected)
- 23.0 ap377523 (Status: affected)
- 23.0 ap377581 (Status: affected)
- 23.0 ap377727 (Status: affected)
- 23.0 ap378436 (Status: affected)
- 23.0 ap377515 (Status: affected)
- 23.0 ap377674 (Status: affected)
- 23.0 ap378400 (Status: affected)
- 23.0 ap377566 (Status: affected)
- 23.0 ap377494 (Status: affected)
- 23.0 ap377799 (Status: affected)
- 23.0 ap377779 (Status: affected)
- 23.0 ap378165 (Status: affected)
- 23.0 ap378332 (Status: affected)
- 23.0 ap377757 (Status: affected)
- 23.0 ap377908 (Status: affected)
- 23.0 ap377802 (Status: affected)
- 23.0 ap377999 (Status: affected)
- 23.0 ap377984 (Status: affected)
- 23.0 ap378134 (Status: affected)
- 23.0 ap378545 (Status: affected)
- 23.0 ap378863 (Status: affected)
- 23.0 ap378882 (Status: affected)
- 23.0 ap379016 (Status: affected)
- 23.0 ap378599 (Status: affected)
- 23.0 ap378218 (Status: affected)
- 23.0 ap378164 (Status: affected)
- 23.0 ap379085 (Status: affected)
- 23.0 ap378880 (Status: affected)
- 23.0 ap378334 (Status: affected)
- 23.0 ap378862 (Status: affected)
- 23.0 ap378425 (Status: affected)
- 23.0 ap378259 (Status: affected)
- 23.0 ap378970 (Status: affected)
- 23.0 ap378153 (Status: affected)
- 23.0 ap378585 (Status: affected)
- 23.0 ap378509 (Status: affected)
- 23.0 ap378393 (Status: affected)
- 23.0 ap378079 (Status: affected)
- 23.0 ap378404 (Status: affected)
- 23.0 ap378471 (Status: affected)
- 23.0 ap378966 (Status: affected)
- 23.0 ap379049 (Status: affected)
- 23.0 ap379012 (Status: affected)
- 23.0 ap379080 (Status: affected)
- 23.0 ap378865 (Status: affected)
- 23.0 ap378140 (Status: affected)
- 23.0 ap378574 (Status: affected)
- 23.0 ap378440 (Status: affected)
- 23.0 ap378055 (Status: affected)
- 23.0 ap378823 (Status: affected)
- 23.0 ap378603 (Status: affected)
- 23.0 ap379397 (Status: affected)
- 23.0 ap379153 (Status: affected)
- 23.0 ap378953 (Status: affected)
- 23.0 ap378866 (Status: affected)
- 23.0 ap379008 (Status: affected)
- 23.0 ap378924 (Status: affected)
- 23.0 ap378581 (Status: affected)
- 23.0 ap378999 (Status: affected)
- 23.0 ap378161 (Status: affected)
- 23.0 ap378080 (Status: affected)
- 23.0 ap379493 (Status: affected)
- 23.0 ap380161 (Status: affected)
- 23.0 ap379046 (Status: affected)
- 23.0 ap379874 (Status: affected)
- 23.0 ap378391 (Status: affected)
- 23.0 ap380239 (Status: affected)
- 23.0 ap379951 (Status: affected)
- 23.0 ap379772 (Status: affected)
- 23.0 ap378419 (Status: affected)
- 23.0 ap378257 (Status: affected)
- 23.0 ap379775 (Status: affected)
- 23.0 ap379838 (Status: affected)
- 23.0 ap379531 (Status: affected)
- 23.0 ap379888 (Status: affected)
- 23.0 ap379167 (Status: affected)
- 23.0 ap378485 (Status: affected)
- 23.0 ap380167 (Status: affected)
- 23.0 ap380099 (Status: affected)
- 23.0 ap379847 (Status: affected)
- 23.0 ap379098 (Status: affected)
- 23.0 ap379972 (Status: affected)
- 23.0 ap379438 (Status: affected)
- 23.0 ap380143 (Status: affected)
- 23.0 ap380187 (Status: affected)
- 23.0 ap379326 (Status: affected)
- 23.0 ap379427 (Status: affected)
- 23.0 ap380045 (Status: affected)
- 23.0 ap379848 (Status: affected)
- 23.0 ap377384 (Status: affected)
- 23.0 ap376984 (Status: affected)
- 23.0 ap377042 (Status: affected)
- 23.0 ap379890 (Status: affected)
- 23.0 ap380128 (Status: affected)
- 23.0 ap377149 (Status: affected)
- 23.0 ap380446 (Status: affected)
- 23.0 ap379694 (Status: affected)
- 23.0 ap376988 (Status: affected)
- 23.0 ap380270 (Status: affected)
- 23.0 ap379780 (Status: affected)
- 23.0 ap380371 (Status: affected)
- 23.0 ap377225 (Status: affected)
- 23.0 ap379752 (Status: affected)
- 23.0 ap380137 (Status: affected)
- 23.0 ap377045 (Status: affected)
- 23.0 ap376989 (Status: affected)
- 23.0 ap380180 (Status: affected)
- 23.0 ap380042 (Status: affected)
- 23.0 ap376935 (Status: affected)
- 23.0 ap379487 (Status: affected)
- 23.0 ap379934 (Status: affected)
- 23.0 ap377023 (Status: affected)
- 23.0 ap377327 (Status: affected)
- 23.0 ap379833 (Status: affected)
- 23.0 ap376953 (Status: affected)
- 23.0 ap380473 (Status: affected)
- 23.0 ap380535 (Status: affected)
- 23.0 ap377068 (Status: affected)
- 23.0 ap379853 (Status: affected)
- 23.0 ap379350 (Status: affected)
- 23.0 ap380998 (Status: affected)
- 23.0 ap380626 (Status: affected)
- 23.0 ap377079 (Status: affected)
- 23.0 ap379151 (Status: affected)
- 23.0 ap377329 (Status: affected)
- 23.0 ap381091 (Status: affected)
- 23.0 ap380751 (Status: affected)
- 23.0 ap380543 (Status: affected)
- 23.0 ap381270 (Status: affected)
- 23.0 ap380817 (Status: affected)
- 23.0 ap381055 (Status: affected)
- 23.0 ap380506 (Status: affected)
- 23.0 ap381275 (Status: affected)
- 23.0 ap380739 (Status: affected)
- 23.0 ap380783 (Status: affected)
- 23.0 ap380970 (Status: affected)
- 23.0 ap380537 (Status: affected)
- 23.0 ap381140 (Status: affected)
- 23.0 ap380697 (Status: affected)
- 23.0 ap380936 (Status: affected)
- 23.0 ap380486 (Status: affected)
- 23.0 ap380512 (Status: affected)
- 23.0 ap380737 (Status: affected)
- 23.0 ap381118 (Status: affected)
- 23.0 ap380555 (Status: affected)
- 23.0 ap381072 (Status: affected)
- 23.0 ap381584 (Status: affected)
- 23.0 ap381088 (Status: affected)
- 23.0 ap381137 (Status: affected)
- 23.0 ap382053 (Status: affected)
- 23.0 ap381523 (Status: affected)
- 23.0 ap381732 (Status: affected)
- 23.0 ap382372 (Status: affected)
- 23.0 ap382252 (Status: affected)
- 23.0 ap383002 (Status: affected)
- 23.0 ap382857 (Status: affected)
- 23.0 ap383512 (Status: affected)
- 23.0 ap382846 (Status: affected)
- 23.0 ap382253 (Status: affected)
- 23.0 ap381322 (Status: affected)
- 23.0 ap382057 (Status: affected)
- 23.0 ap382386 (Status: affected)
- 23.0 ap382709 (Status: affected)
- 23.0 ap382954 (Status: affected)
- 23.0 ap382505 (Status: affected)
- 23.0 ap382225 (Status: affected)
- 23.0 ap382717 (Status: affected)
- 23.0 ap381840 (Status: affected)
- 23.0 ap381594 (Status: affected)
- 23.0 ap381410 (Status: affected)
- 23.0 ap382463 (Status: affected)
- 23.0 ap382198 (Status: affected)
- 23.0 ap381526 (Status: affected)
- 23.0 ap381498 (Status: affected)
- 23.0 ap381418 (Status: affected)
- 23.0 ap383573 (Status: affected)
- 23.0 ap382838 (Status: affected)
- 23.0 ap381609 (Status: affected)
- 23.0 ap381548 (Status: affected)
- 23.0 ap382409 (Status: affected)
- 23.0 ap383706 (Status: affected)
- 23.0 ap382945 (Status: affected)
- 23.0 ap382300 (Status: affected)
- 23.0 ap382615 (Status: affected)
- 23.0 ap382977 (Status: affected)
- 23.0 ap384345 (Status: affected)
- 23.0 ap383547 (Status: affected)
- 23.0 ap382158 (Status: affected)
- 23.0 ap382240 (Status: affected)
- 23.0 ap383515 (Status: affected)
- 23.0 ap383754 (Status: affected)
- 23.0 ap381961 (Status: affected)
- 23.0 ap382526 (Status: affected)
- 23.0 ap382951 (Status: affected)
- 23.0 ap382824 (Status: affected)
- 23.0 ap382993 (Status: affected)
- 23.0 ap383536 (Status: affected)
- 23.0 ap383247 (Status: affected)
- 23.0 ap381504 (Status: affected)
- 23.0 ap383170 (Status: affected)
- 23.0 ap382032 (Status: affected)
- 23.0 ap382992 (Status: affected)
- 23.0 ap383594 (Status: affected)
- 23.0 ap383365 (Status: affected)
- 23.0 ap383772 (Status: affected)
- 23.0 ap381569 (Status: affected)
- 23.0 ap381348 (Status: affected)
- 23.0 ap382192 (Status: affected)
- 23.0 ap381367 (Status: affected)
- 23.0 ap383352 (Status: affected)
- 23.0 ap383597 (Status: affected)
- 23.0 ap381622 (Status: affected)
- 23.0 ap383518 (Status: affected)
- 23.0 ap383492 (Status: affected)
- 23.0 ap383309 (Status: affected)
- 23.0 ap383064 (Status: affected)
- 23.0 ap383168 (Status: affected)
- 23.0 ap382362 (Status: affected)
- 23.0 ap382251 (Status: affected)
- 23.0 ap383319 (Status: affected)
- 23.0 ap382434 (Status: affected)
- 23.0 ap384431 (Status: affected)
- 23.0 ap383514 (Status: affected)
- 23.0 ap384441 (Status: affected)
- 23.0 ap383994 (Status: affected)
- 23.0 ap384034 (Status: affected)
- 23.0 ap384120 (Status: affected)
- 23.0 ap384134 (Status: affected)
- 23.0 ap384191 (Status: affected)
- 23.0 ap384234 (Status: affected)
- 23.0 ap384309 (Status: affected)
- 23.0 ap384317 (Status: affected)
- 23.0 ap342846 (Status: affected)
- 23.0 ap352264 (Status: affected)
- 23.0 ap352954 (Status: affected)
- 23.0 ap355907 (Status: affected)
- 23.0 ap356141 (Status: affected)
- 23.0 ap356752 (Status: affected)
- 23.0 ap358046 (Status: affected)
- 23.0 ap359922 (Status: affected)
- 23.0 ap361443 (Status: affected)
- 23.0 ap361930 (Status: affected)
- 23.0 ap362693 (Status: affected)
- 23.0 ap363247 (Status: affected)
- 23.0 ap363431 (Status: affected)
- 23.0 ap363672 (Status: affected)
- 23.0 ap363710 (Status: affected)
- 23.0 ap364519 (Status: affected)
- 23.0 ap364532 (Status: affected)
- 23.0 ap364634 (Status: affected)
- 23.0 ap364753 (Status: affected)
- 23.0 ap364956 (Status: affected)
- 23.0 ap365040 (Status: affected)
- 23.0 ap365155 (Status: affected)
- 23.0 ap365646 (Status: affected)
- 23.0 ap365661 (Status: affected)
- 23.0 ap365689 (Status: affected)
- 23.0 ap365744 (Status: affected)
- 23.0 ap365770 (Status: affected)
- 23.0 ap365773 (Status: affected)
- 23.0 ap365798 (Status: affected)
- 23.0 ap365886 (Status: affected)
- 23.0 ap365900 (Status: affected)
- 23.0 ap365946 (Status: affected)
- 23.0 ap365979 (Status: affected)
- 23.0 ap365983 (Status: affected)
- 23.0 ap365984 (Status: affected)
- 23.0 ap366120 (Status: affected)
- 23.0 ap366247 (Status: affected)
- 23.0 ap366395 (Status: affected)
- 23.0 ap366398 (Status: affected)
- 23.0 ap366411 (Status: affected)
- 23.0 ap366443 (Status: affected)
- 23.0 ap366661 (Status: affected)
- 23.0 ap366684 (Status: affected)
- 23.0 ap366835 (Status: affected)
- 23.0 ap366836 (Status: affected)
- 23.0 ap366842 (Status: affected)
- 23.0 ap366879 (Status: affected)
- 23.0 ap366905 (Status: affected)
- 23.0 ap366940 (Status: affected)
- 23.0 ap366967 (Status: affected)
- 23.0 ap366968 (Status: affected)
- 23.0 ap366982 (Status: affected)
- 23.0 ap366984 (Status: affected)
- 23.0 ap366986 (Status: affected)
- 23.0 ap367006 (Status: affected)
- 23.0 ap367014 (Status: affected)
- 23.0 ap367112 (Status: affected)
- 23.0 ap367113 (Status: affected)
- 23.0 ap367129 (Status: affected)
- 23.0 ap367196 (Status: affected)
- 23.0 ap367222 (Status: affected)
- 23.0 ap367227 (Status: affected)
- 23.0 ap367233 (Status: affected)
- 23.0 ap367263 (Status: affected)
- 23.0 ap367307 (Status: affected)
- 23.0 ap367325 (Status: affected)
- 23.0 ap367356 (Status: affected)
- 23.0 ap367366 (Status: affected)
- 23.0 ap367413 (Status: affected)
- 23.0 ap367419 (Status: affected)
- 23.0 ap367436 (Status: affected)
- 23.0 ap367487 (Status: affected)
- 23.0 ap367647 (Status: affected)
- 23.0 ap367781 (Status: affected)
- 23.0 ap367810 (Status: affected)
- 23.0 ap367827 (Status: affected)
- 23.0 ap367893 (Status: affected)
- 23.0 ap367991 (Status: affected)
- 23.0 ap368352 (Status: affected)
- 23.0 ap368437 (Status: affected)
- 23.0 ap368458 (Status: affected)
- 23.0 ap368485 (Status: affected)
- 23.0 ap368590 (Status: affected)
- 23.0 ap368605 (Status: affected)
- 23.0 ap368634 (Status: affected)
- 23.0 ap368651 (Status: affected)
- 23.0 ap368682 (Status: affected)
- 23.0 ap368725 (Status: affected)
- 23.0 ap368827 (Status: affected)
- 23.0 ap368830 (Status: affected)
- 23.0 ap368854 (Status: affected)
- 23.0 ap368933 (Status: affected)
- 23.0 ap369012 (Status: affected)
- 23.0 ap369047 (Status: affected)
- 23.0 ap369048 (Status: affected)
- 23.0 ap369052 (Status: affected)
- 23.0 ap369078 (Status: affected)
- 23.0 ap369103 (Status: affected)
- 23.0 ap369127 (Status: affected)
- 23.0 ap369136 (Status: affected)
- 23.0 ap369179 (Status: affected)
- 23.0 ap369211 (Status: affected)
- 23.0 ap369276 (Status: affected)
- 23.0 ap369300 (Status: affected)
- 23.0 ap369316 (Status: affected)
- 23.0 ap369469 (Status: affected)
- 23.0 ap369521 (Status: affected)
- 23.0 ap369535 (Status: affected)
- 23.0 ap369580 (Status: affected)
- 23.0 ap369595 (Status: affected)
- 23.0 ap369619 (Status: affected)
- 23.0 ap369623 (Status: affected)
- 23.0 ap369624 (Status: affected)
- 23.0 ap369675 (Status: affected)
- 23.0 ap369680 (Status: affected)
- 23.0 ap369702 (Status: affected)
- 23.0 ap369710 (Status: affected)
- 23.0 ap369724 (Status: affected)
- 23.0 ap369757 (Status: affected)
- 23.0 ap369770 (Status: affected)
- 23.0 ap369775 (Status: affected)
- 23.0 ap369779 (Status: affected)
- 23.0 ap369783 (Status: affected)
- 23.0 ap369784 (Status: affected)
- 23.0 ap369877 (Status: affected)
- 23.0 ap369878 (Status: affected)
- 23.0 ap369883 (Status: affected)
- 23.0 ap369884 (Status: affected)
- 23.0 ap369885 (Status: affected)
- 23.0 ap369899 (Status: affected)
- 23.0 ap369902 (Status: affected)
- 23.0 ap369903 (Status: affected)
- 23.0 ap369991 (Status: affected)
- 23.0 ap369997 (Status: affected)
- 23.0 ap370017 (Status: affected)
- 23.0 ap370036 (Status: affected)
- 23.0 ap370040 (Status: affected)
- 23.0 ap370085 (Status: affected)
- 23.0 ap370093 (Status: affected)
- 23.0 ap370147 (Status: affected)
- 23.0 ap370194 (Status: affected)
- 23.0 ap370199 (Status: affected)
- 23.0 ap370218 (Status: affected)
- 23.0 ap370222 (Status: affected)
- 23.0 ap370244 (Status: affected)
- 23.0 ap370249 (Status: affected)
- 23.0 ap370300 (Status: affected)
- 23.0 ap370307 (Status: affected)
- 23.0 ap370326 (Status: affected)
- 23.0 ap370328 (Status: affected)
- 23.0 ap370347 (Status: affected)
- 23.0 ap370479 (Status: affected)
- 23.0 ap370537 (Status: affected)
- 23.0 ap370539 (Status: affected)
- 23.0 ap370578 (Status: affected)
- 23.0 ap370620 (Status: affected)
- 23.0 ap370662 (Status: affected)
- 23.0 ap370720 (Status: affected)
- 23.0 ap370735 (Status: affected)
- 23.0 ap370801 (Status: affected)
- 23.0 ap370907 (Status: affected)
- 23.0 ap370918 (Status: affected)
- 23.0 ap370935 (Status: affected)
- 23.0 ap371056 (Status: affected)
- 23.0 ap371080 (Status: affected)
- 23.0 ap371125 (Status: affected)
- 23.0 ap371151 (Status: affected)
- 23.0 ap371254 (Status: affected)
- 23.0 ap371301 (Status: affected)
- 23.0 ap371423 (Status: affected)
- 23.0 ap371490 (Status: affected)
- 23.0 ap371506 (Status: affected)
- 23.0 ap371529 (Status: affected)
- 23.0 ap371539 (Status: affected)
- 23.0 ap371547 (Status: affected)
- 23.0 ap371557 (Status: affected)
- 23.0 ap371565 (Status: affected)
- 23.0 ap371582 (Status: affected)
- 23.0 ap371634 (Status: affected)
- 23.0 ap371680 (Status: affected)
- 23.0 ap371687 (Status: affected)
- 23.0 ap371721 (Status: affected)
- 23.0 ap371733 (Status: affected)
- 23.0 ap371768 (Status: affected)
- 23.0 ap371772 (Status: affected)
- 23.0 ap371829 (Status: affected)
- 23.0 ap371886 (Status: affected)
- 23.0 ap371917 (Status: affected)
- 23.0 ap371922 (Status: affected)
- 23.0 ap371945 (Status: affected)
- 23.0 ap371996 (Status: affected)
- 23.0 ap372011 (Status: affected)
- 23.0 ap372077 (Status: affected)
- 23.0 ap372286 (Status: affected)
- 23.0 ap372293 (Status: affected)
- 23.0 ap372343 (Status: affected)
- 23.0 ap372432 (Status: affected)
- 23.0 ap372436 (Status: affected)
- 23.0 ap372475 (Status: affected)
- 23.0 ap372502 (Status: affected)
- 23.0 ap372505 (Status: affected)
- 23.0 ap372508 (Status: affected)
- 23.0 ap372510 (Status: affected)
- 23.0 ap372516 (Status: affected)
- 23.0 ap372561 (Status: affected)
- 23.0 ap372610 (Status: affected)
- 23.0 ap372617 (Status: affected)
- 23.0 ap372633 (Status: affected)
- 23.0 ap372655 (Status: affected)
- 23.0 ap372692 (Status: affected)
- 23.0 ap372796 (Status: affected)
- 23.0 ap372890 (Status: affected)
- 23.0 ap372910 (Status: affected)
- 23.0 ap372942 (Status: affected)
- 23.0 ap372943 (Status: affected)
- 23.0 ap372989 (Status: affected)
- 23.0 ap373001 (Status: affected)
- 23.0 ap373047 (Status: affected)
- 23.0 ap373097 (Status: affected)
- 23.0 ap373146 (Status: affected)
- 23.0 ap373172 (Status: affected)
- 23.0 ap373180 (Status: affected)
- 23.0 ap373197 (Status: affected)
- 23.0 ap373239 (Status: affected)
- 23.0 ap373261 (Status: affected)
- 23.0 ap373284 (Status: affected)
- 23.0 ap373300 (Status: affected)
- 23.0 ap373332 (Status: affected)
- 23.0 ap373336 (Status: affected)
- 23.0 ap373339 (Status: affected)
- 23.0 ap373340 (Status: affected)
- 23.0 ap373392 (Status: affected)
- 23.0 ap373412 (Status: affected)
- 23.0 ap373521 (Status: affected)
- 23.0 ap373534 (Status: affected)
- 23.0 ap373565 (Status: affected)
- 23.0 ap373584 (Status: affected)
- 23.0 ap373649 (Status: affected)
- 23.0 ap373711 (Status: affected)
- 23.0 ap373717 (Status: affected)
- 23.0 ap373783 (Status: affected)
- 23.0 ap373821 (Status: affected)
- 23.0 ap373872 (Status: affected)
- 23.0 ap373881 (Status: affected)
- 23.0 ap373914 (Status: affected)
- 23.0 ap373924 (Status: affected)
- 23.0 ap374144 (Status: affected)
- 23.0 ap374145 (Status: affected)
- 23.0 ap374211 (Status: affected)
- 23.0 ap374270 (Status: affected)
- 23.0 ap374286 (Status: affected)
- 23.0 ap374414 (Status: affected)
- 23.0 ap374530 (Status: affected)
- 23.0 ap374548 (Status: affected)
- 23.0 ap374600 (Status: affected)
- 23.0 ap374605 (Status: affected)
- 23.0 ap374641 (Status: affected)
- 23.0 ap374643 (Status: affected)
- 23.0 ap374695 (Status: affected)
- 23.0 ap374786 (Status: affected)
- 23.0 ap374829 (Status: affected)
- 23.0 ap374832 (Status: affected)
- 23.0 ap374869 (Status: affected)
- 23.0 ap374917 (Status: affected)
- 23.0 ap374935 (Status: affected)
- 23.0 ap374943 (Status: affected)
- 23.0 ap374956 (Status: affected)
- 23.0 ap375004 (Status: affected)
- 23.0 ap375021 (Status: affected)
- 23.0 ap375036 (Status: affected)
- 23.0 ap375039 (Status: affected)
- 23.0 ap375041 (Status: affected)
- 23.0 ap375125 (Status: affected)
- 23.0 ap375153 (Status: affected)
- 23.0 ap375205 (Status: affected)
- 23.0 ap375207 (Status: affected)
- 23.0 ap375210 (Status: affected)
- 23.0 ap375214 (Status: affected)
- 23.0 ap375240 (Status: affected)
- 23.0 ap375260 (Status: affected)
- 23.0 ap375270 (Status: affected)
- 23.0 ap375273 (Status: affected)
- 23.0 ap375335 (Status: affected)
- 23.0 ap375342 (Status: affected)
- 23.0 ap375351 (Status: affected)
- 23.0 ap375398 (Status: affected)
- 23.0 ap375409 (Status: affected)
- 23.0 ap375412 (Status: affected)
- 23.0 ap375414 (Status: affected)
- 23.0 ap375421 (Status: affected)
- 23.0 ap375425 (Status: affected)
- 23.0 ap375430 (Status: affected)
- 23.0 ap375432 (Status: affected)
- 23.0 ap375453 (Status: affected)
- 23.0 ap375466 (Status: affected)
- 23.0 ap375469 (Status: affected)
- 23.0 ap375476 (Status: affected)
- 23.0 ap375484 (Status: affected)
- 23.0 ap375488 (Status: affected)
- 23.0 ap375489 (Status: affected)
- 23.0 ap375502 (Status: affected)
- 23.0 ap375514 (Status: affected)
- 23.0 ap375518 (Status: affected)
- 23.0 ap375603 (Status: affected)
- 23.0 ap375700 (Status: affected)
- 23.0 ap375711 (Status: affected)
- 23.0 ap375730 (Status: affected)
- 23.0 ap375748 (Status: affected)
- 23.0 ap375756 (Status: affected)
- 23.0 ap375757 (Status: affected)
- 23.0 ap375804 (Status: affected)
- 23.0 ap375828 (Status: affected)
- 23.0 ap375849 (Status: affected)
- 23.0 ap375860 (Status: affected)
- 23.0 ap375944 (Status: affected)
- 23.0 ap375949 (Status: affected)
- 23.0 ap375950 (Status: affected)
- 23.0 ap375959 (Status: affected)
- 23.0 ap375962 (Status: affected)
- 23.0 ap375982 (Status: affected)
- 23.0 ap375989 (Status: affected)
- 23.0 ap375990 (Status: affected)
- 23.0 ap375996 (Status: affected)
- 23.0 ap376000 (Status: affected)
- 23.0 ap376001 (Status: affected)
- 23.0 ap376012 (Status: affected)
- 23.0 ap376024 (Status: affected)
- 23.0 ap376042 (Status: affected)
- 23.0 ap376099 (Status: affected)
- 23.0 ap376140 (Status: affected)
- 23.0 ap376156 (Status: affected)
- 23.0 ap376189 (Status: affected)
- 23.0 ap376213 (Status: affected)
- 23.0 ap376220 (Status: affected)
- 23.0 ap376267 (Status: affected)
- 23.0 ap376308 (Status: affected)
- 23.0 ap376317 (Status: affected)
- 23.0 ap376340 (Status: affected)
- 23.0 ap376341 (Status: affected)
- 23.0 ap376384 (Status: affected)
- 23.0 ap376414 (Status: affected)
- 23.0 ap376445 (Status: affected)
- 23.0 ap376450 (Status: affected)
- 23.0 ap376486 (Status: affected)
- 23.0 ap376507 (Status: affected)
- 23.0 ap376512 (Status: affected)
- 23.0 ap376529 (Status: affected)
- 23.0 ap376613 (Status: affected)
- 23.0 ap376622 (Status: affected)
- 23.0 ap376664 (Status: affected)
- 23.0 ap376666 (Status: affected)
- 23.0 ap376695 (Status: affected)
- 23.0 ap376696 (Status: affected)
- 23.0 ap376699 (Status: affected)
- 23.0 ap376702 (Status: affected)
- 23.0 ap376704 (Status: affected)
- 23.0 ap376721 (Status: affected)
- 23.0 ap376722 (Status: affected)
- 23.0 ap376736 (Status: affected)
- 23.0 ap376787 (Status: affected)
- 23.0 ap376798 (Status: affected)
- 23.0 ap376802 (Status: affected)
- 23.0 ap376809 (Status: affected)
- 23.0 ap376818 (Status: affected)
- 23.0 ap376820 (Status: affected)
- 23.0 ap376842 (Status: affected)
- 23.0 ap376878 (Status: affected)
- 23.0 ap376889 (Status: affected)
- 23.0 ap376934 (Status: affected)
- 23.0 ap376945 (Status: affected)
- 23.0 ap376956 (Status: affected)
- 23.0 ap376979 (Status: affected)
- 23.0 ap377012 (Status: affected)
- 23.0 ap377033 (Status: affected)
- 23.0 ap377050 (Status: affected)
- 23.0 ap377091 (Status: affected)
- 23.0 ap377109 (Status: affected)
- 23.0 ap377120 (Status: affected)
- 23.0 ap377163 (Status: affected)
- 23.0 ap377175 (Status: affected)
- 23.0 ap377177 (Status: affected)
- 23.0 ap377229 (Status: affected)
- 23.0 ap377378 (Status: affected)
- 23.0 ap377399 (Status: affected)
- 23.0 ap377485 (Status: affected)
- 23.0 ap377517 (Status: affected)
- 23.0 ap377538 (Status: affected)
- 23.0 ap377555 (Status: affected)
- 23.0 ap377569 (Status: affected)
- 23.0 ap377628 (Status: affected)
- 23.0 ap377630 (Status: affected)
- 23.0 ap377651 (Status: affected)
- 23.0 ap377667 (Status: affected)
- 23.0 ap377670 (Status: affected)
- 23.0 ap377687 (Status: affected)
- 23.0 ap377718 (Status: affected)
- 23.0 ap377723 (Status: affected)
- 23.0 ap377737 (Status: affected)
- 23.0 ap377743 (Status: affected)
- 23.0 ap377751 (Status: affected)
- 23.0 ap377868 (Status: affected)
- 23.0 ap377878 (Status: affected)
- 23.0 ap377888 (Status: affected)
- 23.0 ap377913 (Status: affected)
- 23.0 ap377966 (Status: affected)
- 23.0 ap377983 (Status: affected)
- 23.0 ap378010 (Status: affected)
- 23.0 ap378014 (Status: affected)
- 23.0 ap378019 (Status: affected)
- 23.0 ap378029 (Status: affected)
- 23.0 ap378051 (Status: affected)
- 23.0 ap378070 (Status: affected)
- 23.0 ap378087 (Status: affected)
- 23.0 ap378122 (Status: affected)
- 23.0 ap378141 (Status: affected)
- 23.0 ap378142 (Status: affected)
- 23.0 ap378144 (Status: affected)
- 23.0 ap378150 (Status: affected)
- 23.0 ap378154 (Status: affected)
- 23.0 ap378168 (Status: affected)
- 23.0 ap378178 (Status: affected)
- 23.0 ap378227 (Status: affected)
- 23.0 ap378234 (Status: affected)
- 23.0 ap378242 (Status: affected)
- 23.0 ap378248 (Status: affected)
- 23.0 ap378258 (Status: affected)
- 23.0 ap378372 (Status: affected)
- 23.0 ap378383 (Status: affected)
- 23.0 ap378390 (Status: affected)
- 23.0 ap378415 (Status: affected)
- 23.0 ap378437 (Status: affected)
- 23.0 ap378481 (Status: affected)
- 23.0 ap378506 (Status: affected)
- 23.0 ap378535 (Status: affected)
- 23.0 ap378553 (Status: affected)
- 23.0 ap378575 (Status: affected)
- 23.0 ap378595 (Status: affected)
- 23.0 ap378818 (Status: affected)
- 23.0 ap378827 (Status: affected)
- 23.0 ap378886 (Status: affected)
- 23.0 ap378902 (Status: affected)
- 23.0 ap378913 (Status: affected)
- 23.0 ap378920 (Status: affected)
- 23.0 ap378952 (Status: affected)
- 23.0 ap378976 (Status: affected)
- 23.0 ap378987 (Status: affected)
- 23.0 ap378995 (Status: affected)
- 23.0 ap379069 (Status: affected)
- 23.0 ap379091 (Status: affected)
- 23.0 ap379105 (Status: affected)
- 23.0 ap379112 (Status: affected)
- 23.0 ap379122 (Status: affected)
- 23.0 ap379152 (Status: affected)
- 23.0 ap379168 (Status: affected)
- 23.0 ap379187 (Status: affected)
- 23.0 ap379190 (Status: affected)
- 23.0 ap379199 (Status: affected)
- 23.0 ap379329 (Status: affected)
- 23.0 ap379331 (Status: affected)
- 23.0 ap379346 (Status: affected)
- 23.0 ap379373 (Status: affected)
- 23.0 ap379378 (Status: affected)
- 23.0 ap379389 (Status: affected)
- 23.0 ap379390 (Status: affected)
- 23.0 ap379391 (Status: affected)
- 23.0 ap379395 (Status: affected)
- 23.0 ap379411 (Status: affected)
- 23.0 ap379423 (Status: affected)
- 23.0 ap379474 (Status: affected)
- 23.0 ap379475 (Status: affected)
- 23.0 ap379482 (Status: affected)
- 23.0 ap379511 (Status: affected)
- 23.0 ap379515 (Status: affected)
- 23.0 ap379532 (Status: affected)
- 23.0 ap379533 (Status: affected)
- 23.0 ap379535 (Status: affected)
- 23.0 ap379565 (Status: affected)
- 23.0 ap379600 (Status: affected)
- 23.0 ap379616 (Status: affected)
- 23.0 ap379627 (Status: affected)
- 23.0 ap379635 (Status: affected)
- 23.0 ap379781 (Status: affected)
- 23.0 ap379782 (Status: affected)
- 23.0 ap379830 (Status: affected)
- 23.0 ap379839 (Status: affected)
- 23.0 ap379855 (Status: affected)
- 23.0 ap379889 (Status: affected)
- 23.0 ap379903 (Status: affected)
- 23.0 ap379921 (Status: affected)
- 23.0 ap379925 (Status: affected)
- 23.0 ap379957 (Status: affected)
- 23.0 ap379963 (Status: affected)
- 23.0 ap380109 (Status: affected)
- 23.0 ap380181 (Status: affected)
- 23.0 ap380196 (Status: affected)
- 23.0 ap380256 (Status: affected)
- 23.0 ap380264 (Status: affected)
- 23.0 ap380282 (Status: affected)
- 23.0 ap380465 (Status: affected)
- 23.0 ap380501 (Status: affected)
- 23.0 ap380581 (Status: affected)
- 23.0 ap380613 (Status: affected)
- 23.0 ap380620 (Status: affected)
- 23.0 ap380635 (Status: affected)
- 23.0 ap380637 (Status: affected)
- 23.0 ap380762 (Status: affected)
- 23.0 ap380775 (Status: affected)
- 23.0 ap380782 (Status: affected)
- 23.0 ap380802 (Status: affected)
- 23.0 ap380840 (Status: affected)
- 23.0 ap380939 (Status: affected)
- 23.0 ap381001 (Status: affected)
- 23.0 ap381004 (Status: affected)
- 23.0 ap381047 (Status: affected)
- 23.0 ap381078 (Status: affected)
- 23.0 ap381108 (Status: affected)
- 23.0 ap381128 (Status: affected)
- 23.0 ap381215 (Status: affected)
- 23.0 ap381257 (Status: affected)
- 23.0 ap381285 (Status: affected)
- 23.0 ap381292 (Status: affected)
- 23.0 ap381300 (Status: affected)
- 23.0 ap381305 (Status: affected)
- 23.0 ap381308 (Status: affected)
- 23.0 ap381334 (Status: affected)
- 23.0 ap381339 (Status: affected)
- 23.0 ap381384 (Status: affected)
- 23.0 ap381385 (Status: affected)
- 23.0 ap381398 (Status: affected)
- 23.0 ap381412 (Status: affected)
- 23.0 ap381507 (Status: affected)
- 23.0 ap381518 (Status: affected)
- 23.0 ap381527 (Status: affected)
- 23.0 ap381543 (Status: affected)
- 23.0 ap381570 (Status: affected)
- 23.0 ap381575 (Status: affected)
- 23.0 ap381600 (Status: affected)
- 23.0 ap381611 (Status: affected)
- 23.0 ap381615 (Status: affected)
- 23.0 ap381616 (Status: affected)
- 23.0 ap381621 (Status: affected)
- 23.0 ap381623 (Status: affected)
- 23.0 ap381624 (Status: affected)
- 23.0 ap381654 (Status: affected)
- 23.0 ap381666 (Status: affected)
- 23.0 ap381734 (Status: affected)
- 23.0 ap381775 (Status: affected)
- 23.0 ap381809 (Status: affected)
- 23.0 ap381825 (Status: affected)
- 23.0 ap381826 (Status: affected)
- 23.0 ap381854 (Status: affected)
- 23.0 ap381874 (Status: affected)
- 23.0 ap381878 (Status: affected)
- 23.0 ap381936 (Status: affected)
- 23.0 ap381952 (Status: affected)
- 23.0 ap381956 (Status: affected)
- 23.0 ap381970 (Status: affected)
- 23.0 ap381971 (Status: affected)
- 23.0 ap381975 (Status: affected)
- 23.0 ap382039 (Status: affected)
- 23.0 ap382042 (Status: affected)
- 23.0 ap382045 (Status: affected)
- 23.0 ap382098 (Status: affected)
- 23.0 ap382155 (Status: affected)
- 23.0 ap382160 (Status: affected)
- 23.0 ap382164 (Status: affected)
- 23.0 ap382167 (Status: affected)
- 23.0 ap382170 (Status: affected)
- 23.0 ap382189 (Status: affected)
- 23.0 ap382194 (Status: affected)
- 23.0 ap382231 (Status: affected)
- 23.0 ap382267 (Status: affected)
- 23.0 ap382277 (Status: affected)
- 23.0 ap382412 (Status: affected)
- 23.0 ap382441 (Status: affected)
- 23.0 ap382445 (Status: affected)
- 23.0 ap382474 (Status: affected)
- 23.0 ap382484 (Status: affected)
- 23.0 ap382488 (Status: affected)
- 23.0 ap382527 (Status: affected)
- 23.0 ap382594 (Status: affected)
- 23.0 ap382631 (Status: affected)
- 23.0 ap382656 (Status: affected)
- 23.0 ap382673 (Status: affected)
- 23.0 ap382676 (Status: affected)
- 23.0 ap382677 (Status: affected)
- 23.0 ap382691 (Status: affected)
- 23.0 ap382692 (Status: affected)
- 23.0 ap382703 (Status: affected)
- 23.0 ap382740 (Status: affected)
- 23.0 ap382750 (Status: affected)
- 23.0 ap382836 (Status: affected)
- 23.0 ap382841 (Status: affected)
- 23.0 ap382873 (Status: affected)
- 23.0 ap382894 (Status: affected)
- 23.0 ap382912 (Status: affected)
- 23.0 ap382929 (Status: affected)
- 23.0 ap382935 (Status: affected)
- 23.0 ap382965 (Status: affected)
- 23.0 ap382969 (Status: affected)
- 23.0 ap382976 (Status: affected)
- 23.0 ap382994 (Status: affected)
- 23.0 ap383105 (Status: affected)
- 23.0 ap383123 (Status: affected)
- 23.0 ap383147 (Status: affected)
- 23.0 ap383178 (Status: affected)
- 23.0 ap383188 (Status: affected)
- 23.0 ap383297 (Status: affected)
- 23.0 ap383326 (Status: affected)
- 23.0 ap383327 (Status: affected)
- 23.0 ap383331 (Status: affected)
- 23.0 ap383346 (Status: affected)
- 23.0 ap383377 (Status: affected)
- 23.0 ap383455 (Status: affected)
- 23.0 ap383459 (Status: affected)
- 23.0 ap383463 (Status: affected)
- 23.0 ap383494 (Status: affected)
- 23.0 ap383498 (Status: affected)
- 23.0 ap383511 (Status: affected)
- 23.0 ap383520 (Status: affected)
- 23.0 ap383700 (Status: affected)
- 23.0 ap383821 (Status: affected)
- 23.0 ap384239 (Status: affected)
- 23.0 ap384339 (Status: affected)
- 23.0 ap384351 (Status: affected)
- 23.0 ap384361 (Status: affected)
- 23.0 ap384367 (Status: affected)
- 23.0 ap384389 (Status: affected)
- 23.0 ap384395 (Status: affected)
- 23.0 ap384428 (Status: affected)
- 23.0 ap384429 (Status: affected)
- 23.0 ap384434 (Status: affected)
- 23.0 ap384448 (Status: affected)
- 23.0 ap384471 (Status: affected)
- 23.0 ap384474 (Status: affected)
- 23.0 ap384543 (Status: affected)
- 23.0 ap384622 (Status: affected)
- 23.0 ap384629 (Status: affected)
- 23.0 ap384639 (Status: affected)
- 23.0 ap384643 (Status: affected)
- 23.0 ap384650 (Status: affected)
- 23.0 ap384591 (Status: affected)
- 23.0 ap384745 (Status: affected)
- 23.0 ap384876 (Status: affected)
- 23.0 ap384901 (Status: affected)
- 23.0 ap384930 (Status: affected)
- 23.0 ap384931 (Status: affected)
- 23.0 ap385048 (Status: affected)
- 23.0 ap385072 (Status: affected)
- 23.0 ap384382 (Status: affected)
- 23.0 ap384383 (Status: affected)
- 23.0 ap384457 (Status: affected)
- 23.0 ap384753 (Status: affected)
- 23.0 ap384761 (Status: affected)
- 23.0 ap384772 (Status: affected)
- 23.0 ap384793 (Status: affected)
- 23.0 ap384800 (Status: affected)
- 23.0 ap384801 (Status: affected)
- 23.0 ap384879 (Status: affected)
- 23.0 ap384898 (Status: affected)
- 23.0 ap384908 (Status: affected)
- 23.0 ap384921 (Status: affected)
- 23.0 ap384947 (Status: affected)
- 23.0 ap384957 (Status: affected)
- 23.0 ap384963 (Status: affected)
- 23.0 ap385046 (Status: affected)
- 23.0 ap385054 (Status: affected)
- 23.0 ap385071 (Status: affected)
- 23.0 ap385085 (Status: affected)
- 23.0 ap385088 (Status: affected)
- 23.0 ap385104 (Status: affected)
- 23.0 ap385107 (Status: affected)
- 23.0 ap385111 (Status: affected)
- 23.0 ap385115 (Status: affected)
- 23.0 ap385117 (Status: affected)
- 23.0 ap385136 (Status: affected)
- 23.0 ap385146 (Status: affected)
- 23.0 ap385149 (Status: affected)
- 23.0 ap385233 (Status: affected)
- 23.0 ap385236 (Status: affected)
- 23.0 ap385238 (Status: affected)
- 23.0 ap385242 (Status: affected)
- 23.0 ap385244 (Status: affected)
- 23.0 ap385245 (Status: affected)
- 23.0 ap385247 (Status: affected)
- 23.0 ap385251 (Status: affected)
- 23.0 ap385252 (Status: affected)
- 23.0 ap385253 (Status: affected)
- 23.0 ap385254 (Status: affected)
- 23.0 ap385256 (Status: affected)
- 23.0 ap385266 (Status: affected)
- 23.0 ap385267 (Status: affected)
- 23.0 ap385268 (Status: affected)
- 23.0 ap385269 (Status: affected)
- 23.0 ap385270 (Status: affected)
- 23.0 ap385272 (Status: affected)
- 23.0 ap385275 (Status: affected)
- 23.0 ap385276 (Status: affected)
- 23.0 ap385277 (Status: affected)
- 23.0 ap385280 (Status: affected)
- 23.0 ap385282 (Status: affected)
- 23.0 ap385265 (Status: affected)
- 23.0 ap385286 (Status: affected)
- 23.0 ap385287 (Status: affected)
- 23.0 ap385295 (Status: affected)
- 23.0 ap385297 (Status: affected)
- 23.0 ap385298 (Status: affected)
- 23.0 ap385302 (Status: affected)
- 23.0 ap385304 (Status: affected)
- 23.0 ap385309 (Status: affected)
- 23.0 ap385311 (Status: affected)
- 23.0 ap385274 (Status: affected)
- 23.0 ap385317 (Status: affected)
- 23.0 ap385283 (Status: affected)
- 23.0 ap385314 (Status: affected)
- 23.0 ap385316 (Status: affected)
- 23.0 ap385334 (Status: affected)
- 23.0 ap385336 (Status: affected)
- 23.0 ap385329 (Status: affected)
- 23.0 ap385330 (Status: affected)
- 23.0 ap385333 (Status: affected)
- 23.0 ap385341 (Status: affected)
- 23.0 ap385344 (Status: affected)
- 23.0 ap385346 (Status: affected)
- 23.0 ap385351 (Status: affected)
- 23.0 ap385352 (Status: affected)
- 23.0 ap385355 (Status: affected)
- 23.0 ap385360 (Status: affected)
- 23.0 ap385366 (Status: affected)
- 23.0 ap385368 (Status: affected)
- 23.0 ap385370 (Status: affected)
- 23.0 ap385373 (Status: affected)
- 23.0 ap385374 (Status: affected)
- 23.0 ap385379 (Status: affected)
- 23.0 ap385380 (Status: affected)
- 23.0 ap385382 (Status: affected)
- 23.0 ap385384 (Status: affected)
- 23.0 ap385389 (Status: affected)
- 23.0 ap385390 (Status: affected)
- 23.0 ap385395 (Status: affected)
- 23.0 ap385396 (Status: affected)
- 23.0 ap385397 (Status: affected)
- 23.0 ap385399 (Status: affected)
- 23.0 ap385401 (Status: affected)
- 23.0 ap385407 (Status: affected)
- 23.0 ap385413 (Status: affected)
- 23.0 ap385405 (Status: affected)
- 23.0 ap385114 (Status: affected)
- 23.0 ap385376 (Status: affected)
- 23.0 ap385337 (Status: affected)
- 23.0 ap385414 (Status: affected)
- 23.0 ap385363 (Status: affected)
- 23.0 ap385404 (Status: affected)
- 23.0 ap385412 (Status: affected)
- 23.0 ap385354 (Status: affected)
- 23.0 ap385394 (Status: affected)
- 23.0 ap385342 (Status: affected)
- 23.0 ap385375 (Status: affected)
- 22.0 ap347303 (Status: affected)
- 22.0 (Status: affected)
- 22.0 ap352927 (Status: affected)
- 22.0 ap353464 (Status: affected)
- 22.0 ap375345 (Status: affected)
- 22.0 ap355095 (Status: affected)
- 22.0 ap352969 (Status: affected)
- 22.0 ap363049 (Status: affected)
- 22.0 ap349872 (Status: affected)
- 22.0 ap358026 (Status: affected)
- 22.0 ap375466 (Status: affected)
- 22.0 ap382358 (Status: affected)
- 22.0 ap383603 (Status: affected)
- 22.0 ap356705 (Status: affected)
- 22.0 ap362680 (Status: affected)
- 22.0 ap356797 (Status: affected)
- 22.0 ap353663 (Status: affected)
- 22.0 ap357146 (Status: affected)
- 22.0 ap357613 (Status: affected)
- 22.0 ap347741 (Status: affected)
- 22.0 ap371890 (Status: affected)
- 22.0 ap375601 (Status: affected)
- 22.0 ap356422 (Status: affected)
- 22.0 ap376340 (Status: affected)
- 22.0 ap362872 (Status: affected)
- 22.0 ap381970 (Status: affected)
- 22.0 ap377577 (Status: affected)
- 22.0 ap382057 (Status: affected)
- 22.0 ap339395 (Status: affected)
- 22.0 ap366268 (Status: affected)
- 22.0 ap372620 (Status: affected)
- 22.0 ap372243 (Status: affected)
- 22.0 ap377651 (Status: affected)
- 22.0 ap383459 (Status: affected)
- 22.0 ap376000 (Status: affected)
- 22.0 ap357856 (Status: affected)
- 22.0 ap380196 (Status: affected)
- 22.0 ap372607 (Status: affected)
- 22.0 ap362313 (Status: affected)
- 22.0 ap371974 (Status: affected)
- 22.0 ap372995 (Status: affected)
- 22.0 ap365170 (Status: affected)
- 22.0 ap372504 (Status: affected)
- 22.0 ap377628 (Status: affected)
- 22.0 ap365983 (Status: affected)
- 22.0 ap371721 (Status: affected)
- 22.0 ap352180 (Status: affected)
- 22.0 ap356317 (Status: affected)
- 22.0 ap358511 (Status: affected)
- 22.0 ap364753 (Status: affected)
- 22.0 ap373004 (Status: affected)
- 22.0 ap376634 (Status: affected)
- 22.0 ap382236 (Status: affected)
- 22.0 ap353419 (Status: affected)
- 22.0 ap372922 (Status: affected)
- 22.0 ap366181 (Status: affected)
- 22.0 ap382206 (Status: affected)
- 22.0 ap366290 (Status: affected)
- 22.0 ap383594 (Status: affected)
- 22.0 ap366609 (Status: affected)
- 22.0 ap380756 (Status: affected)
- 22.0 ap354474 (Status: affected)
- 22.0 ap349400 (Status: affected)
- 22.0 ap366395 (Status: affected)
- 22.0 ap366443 (Status: affected)
- 22.0 ap372455 (Status: affected)
- 22.0 ap347895 (Status: affected)
- 22.0 ap372533 (Status: affected)
- 22.0 ap353530 (Status: affected)
- 22.0 ap366842 (Status: affected)
- 22.0 ap353025 (Status: affected)
- 22.0 ap351936 (Status: affected)
- 22.0 ap353315 (Status: affected)
- 22.0 ap339206 (Status: affected)
- 22.0 ap352341 (Status: affected)
- 22.0 ap339584 (Status: affected)
- 22.0 ap352961 (Status: affected)
- 22.0 ap359922 (Status: affected)
- 22.0 ap353558 (Status: affected)
- 22.0 ap371725 (Status: affected)
- 22.0 ap371432 (Status: affected)
- 22.0 ap357819 (Status: affected)
- 22.0 ap358289 (Status: affected)
- 22.0 ap354719 (Status: affected)
- 22.0 ap367227 (Status: affected)
- 22.0 ap364519 (Status: affected)
- 22.0 ap367014 (Status: affected)
- 22.0 ap360797 (Status: affected)
- 22.0 ap366120 (Status: affected)
- 22.0 ap372207 (Status: affected)
- 22.0 ap365829 (Status: affected)
- 22.0 ap365979 (Status: affected)
- 22.0 ap366993 (Status: affected)
- 22.0 ap365124 (Status: affected)
- 22.0 ap366763 (Status: affected)
- 22.0 ap352238 (Status: affected)
- 22.0 ap383319 (Status: affected)
- 22.0 ap351160 (Status: affected)
- 22.0 ap366373 (Status: affected)
- 22.0 ap372071 (Status: affected)
- 22.0 ap354673 (Status: affected)
- 22.0 ap371868 (Status: affected)
- 22.0 ap353954 (Status: affected)
- 22.0 ap366800 (Status: affected)
- 22.0 ap357760 (Status: affected)
- 22.0 ap366298 (Status: affected)
- 22.0 ap366857 (Status: affected)
- 22.0 ap365886 (Status: affected)
- 22.0 ap372116 (Status: affected)
- 22.0 ap354726 (Status: affected)
- 22.0 ap364956 (Status: affected)
- 22.0 ap382703 (Status: affected)
- 22.0 ap367293 (Status: affected)
- 22.0 ap360116 (Status: affected)
- 22.0 ap366307 (Status: affected)
- 22.0 ap368497 (Status: affected)
- 22.0 ap368125 (Status: affected)
- 22.0 ap352359 (Status: affected)
- 22.0 ap364168 (Status: affected)
- 22.0 ap376001 (Status: affected)
- 22.0 ap366411 (Status: affected)
- 22.0 ap365773 (Status: affected)
- 22.0 ap362262 (Status: affected)
- 22.0 ap351205 (Status: affected)
- 22.0 ap383512 (Status: affected)
- 22.0 ap355020 (Status: affected)
- 22.0 ap352985 (Status: affected)
- 22.0 ap354580 (Status: affected)
- 22.0 ap373821 (Status: affected)
- 22.0 ap376308 (Status: affected)
- 22.0 ap368419 (Status: affected)
- 22.0 ap353140 (Status: affected)
- 22.0 ap374668 (Status: affected)
- 22.0 ap364925 (Status: affected)
- 22.0 ap367732 (Status: affected)
- 22.0 ap372079 (Status: affected)
- 22.0 ap357506 (Status: affected)
- 22.0 ap380486 (Status: affected)
- 22.0 ap366684 (Status: affected)
- 22.0 ap366398 (Status: affected)
- 22.0 ap358328 (Status: affected)
- 22.0 ap373016 (Status: affected)
- 22.0 ap358597 (Status: affected)
- 22.0 ap383346 (Status: affected)
- 22.0 ap374786 (Status: affected)
- 22.0 ap348687 (Status: affected)
- 22.0 ap352498 (Status: affected)
- 22.0 ap366247 (Status: affected)
- 22.0 ap351868 (Status: affected)
- 22.0 ap383494 (Status: affected)
- 22.0 ap367419 (Status: affected)
- 22.0 ap369731 (Status: affected)
- 22.0 ap379780 (Status: affected)
- 22.0 ap383511 (Status: affected)
- 22.0 ap359119 (Status: affected)
- 22.0 ap364384 (Status: affected)
- 22.0 ap351263 (Status: affected)
- 22.0 ap360568 (Status: affected)
- 22.0 ap382493 (Status: affected)
- 22.0 ap361308 (Status: affected)
- 22.0 ap364369 (Status: affected)
- 22.0 ap365030 (Status: affected)
- 22.0 ap372121 (Status: affected)
- 22.0 ap371748 (Status: affected)
- 22.0 ap372345 (Status: affected)
- 22.0 ap365341 (Status: affected)
- 22.0 ap365386 (Status: affected)
- 22.0 ap365017 (Status: affected)
- 22.0 ap383754 (Status: affected)
- 22.0 ap355740 (Status: affected)
- 22.0 ap364879 (Status: affected)
- 22.0 ap365014 (Status: affected)
- 22.0 ap365351 (Status: affected)
- 22.0 ap364843 (Status: affected)
- 22.0 ap374715 (Status: affected)
- 22.0 ap364718 (Status: affected)
- 22.0 ap363394 (Status: affected)
- 22.0 ap363366 (Status: affected)
- 22.0 ap364467 (Status: affected)
- 22.0 ap366916 (Status: affected)
- 22.0 ap363363 (Status: affected)
- 22.0 ap365348 (Status: affected)
- 22.0 ap359767 (Status: affected)
- 22.0 ap364754 (Status: affected)
- 22.0 ap365066 (Status: affected)
- 22.0 ap370147 (Status: affected)
- 22.0 ap365682 (Status: affected)
- 22.0 ap365246 (Status: affected)
- 22.0 ap374557 (Status: affected)
- 22.0 ap364863 (Status: affected)
- 22.0 ap365155 (Status: affected)
- 22.0 ap374507 (Status: affected)
- 22.0 ap381952 (Status: affected)
- 22.0 ap370792 (Status: affected)
- 22.0 ap363768 (Status: affected)
- 22.0 ap366606 (Status: affected)
- 22.0 ap363644 (Status: affected)
- 22.0 ap375533 (Status: affected)
- 22.0 ap376140 (Status: affected)
- 22.0 ap367446 (Status: affected)
- 22.0 ap372845 (Status: affected)
- 22.0 ap362261 (Status: affected)
- 22.0 ap373684 (Status: affected)
- 22.0 ap374188 (Status: affected)
- 22.0 ap376088 (Status: affected)
- 22.0 ap374069 (Status: affected)
- 22.0 ap374182 (Status: affected)
- 22.0 ap377012 (Status: affected)
- 22.0 ap382484 (Status: affected)
- 22.0 ap367794 (Status: affected)
- 22.0 ap366898 (Status: affected)
- 22.0 ap369778 (Status: affected)
- 22.0 ap373752 (Status: affected)
- 22.0 ap373912 (Status: affected)
- 22.0 ap374143 (Status: affected)
- 22.0 ap381654 (Status: affected)
- 22.0 ap350604 (Status: affected)
- 22.0 ap369749 (Status: affected)
- 22.0 ap368180 (Status: affected)
- 22.0 ap377378 (Status: affected)
- 22.0 ap360755 (Status: affected)
- 22.0 ap369991 (Status: affected)
- 22.0 ap379839 (Status: affected)
- 22.0 ap358894 (Status: affected)
- 22.0 ap366882 (Status: affected)
- 22.0 ap358889 (Status: affected)
- 22.0 ap360867 (Status: affected)
- 22.0 ap369774 (Status: affected)
- 22.0 ap359973 (Status: affected)
- 22.0 ap354412 (Status: affected)
- 22.0 ap348431 (Status: affected)
- 22.0 ap373871 (Status: affected)
- 22.0 ap377176 (Status: affected)
- 22.0 ap358699 (Status: affected)
- 22.0 ap348100 (Status: affected)
- 22.0 ap374125 (Status: affected)
- 22.0 ap358890 (Status: affected)
- 22.0 ap352126 (Status: affected)
- 22.0 ap351795 (Status: affected)
- 22.0 ap353184 (Status: affected)
- 22.0 ap349845 (Status: affected)
- 22.0 ap357595 (Status: affected)
- 22.0 ap352143 (Status: affected)
- 22.0 ap357736 (Status: affected)
- 22.0 ap352651 (Status: affected)
- 22.0 ap351682 (Status: affected)
- 22.0 ap348143 (Status: affected)
- 22.0 ap351798 (Status: affected)
- 22.0 ap352345 (Status: affected)
- 22.0 ap354685 (Status: affected)
- 22.0 ap352357 (Status: affected)
- 22.0 ap358338 (Status: affected)
- 22.0 ap351179 (Status: affected)
- 22.0 ap361155 (Status: affected)
- 22.0 ap356842 (Status: affected)
- 22.0 ap361590 (Status: affected)
- 22.0 ap357918 (Status: affected)
- 22.0 ap355907 (Status: affected)
- 22.0 ap358133 (Status: affected)
- 22.0 ap354314 (Status: affected)
- 22.0 ap371811 (Status: affected)
- 22.0 ap361516 (Status: affected)
- 22.0 ap357176 (Status: affected)
- 22.0 ap352386 (Status: affected)
- 22.0 ap358188 (Status: affected)
- 22.0 ap357562 (Status: affected)
- 22.0 ap360464 (Status: affected)
- 22.0 ap357623 (Status: affected)
- 22.0 ap366967 (Status: affected)
- 22.0 ap383520 (Status: affected)
- 22.0 ap369899 (Status: affected)
- 22.0 ap361651 (Status: affected)
- 22.0 ap356817 (Status: affected)
- 22.0 ap371565 (Status: affected)
- 22.0 ap355753 (Status: affected)
- 22.0 ap371547 (Status: affected)
- 22.0 ap350538 (Status: affected)
- 22.0 ap359791 (Status: affected)
- 22.0 ap372516 (Status: affected)
- 22.0 ap372692 (Status: affected)
- 22.0 ap357802 (Status: affected)
- 22.0 ap358089 (Status: affected)
- 22.0 ap371506 (Status: affected)
- 22.0 ap366335 (Status: affected)
- 22.0 ap362035 (Status: affected)
- 22.0 ap362749 (Status: affected)
- 22.0 ap353845 (Status: affected)
- 22.0 ap352293 (Status: affected)
- 22.0 ap381348 (Status: affected)
- 22.0 ap354736 (Status: affected)
- 22.0 ap350140 (Status: affected)
- 22.0 ap356375 (Status: affected)
- 22.0 ap381357 (Status: affected)
- 22.0 ap371634 (Status: affected)
- 22.0 ap371687 (Status: affected)
- 22.0 ap355298 (Status: affected)
- 22.0 ap373015 (Status: affected)
- 22.0 ap374269 (Status: affected)
- 22.0 ap372610 (Status: affected)
- 22.0 ap366525 (Status: affected)
- 22.0 ap374711 (Status: affected)
- 22.0 ap366201 (Status: affected)
- 22.0 ap373778 (Status: affected)
- 22.0 ap365239 (Status: affected)
- 22.0 ap367782 (Status: affected)
- 22.0 ap354129 (Status: affected)
- 22.0 ap369702 (Status: affected)
- 22.0 ap381384 (Status: affected)
- 22.0 ap352796 (Status: affected)
- 22.0 ap350990 (Status: affected)
- 22.0 ap358314 (Status: affected)
- 22.0 ap368827 (Status: affected)
- 22.0 ap372239 (Status: affected)
- 22.0 ap372796 (Status: affected)
- 22.0 ap349254 (Status: affected)
- 22.0 ap368682 (Status: affected)
- 22.0 ap366275 (Status: affected)
- 22.0 ap354690 (Status: affected)
- 22.0 ap365744 (Status: affected)
- 22.0 ap354779 (Status: affected)
- 22.0 ap368458 (Status: affected)
- 22.0 ap365223 (Status: affected)
- 22.0 ap366296 (Status: affected)
- 22.0 ap364518 (Status: affected)
- 22.0 ap352887 (Status: affected)
- 22.0 ap359972 (Status: affected)
- 22.0 ap360306 (Status: affected)
- 22.0 ap359433 (Status: affected)
- 22.0 ap374600 (Status: affected)
- 22.0 ap359991 (Status: affected)
- 22.0 ap351015 (Status: affected)
- 22.0 ap359729 (Status: affected)
- 22.0 ap371698 (Status: affected)
- 22.0 ap366610 (Status: affected)
- 22.0 ap358357 (Status: affected)
- 22.0 ap367647 (Status: affected)
- 22.0 ap371747 (Status: affected)
- 22.0 ap368352 (Status: affected)
- 22.0 ap375502 (Status: affected)
- 22.0 ap371829 (Status: affected)
- 22.0 ap372343 (Status: affected)
- 22.0 ap365889 (Status: affected)
- 22.0 ap364560 (Status: affected)
- 22.0 ap364622 (Status: affected)
- 22.0 ap359172 (Status: affected)
- 22.0 ap383821 (Status: affected)
- 22.0 ap353515 (Status: affected)
- 22.0 ap362960 (Status: affected)
- 22.0 ap369048 (Status: affected)
- 22.0 ap365626 (Status: affected)
- 22.0 ap364711 (Status: affected)
- 22.0 ap362364 (Status: affected)
- 22.0 ap360244 (Status: affected)
- 22.0 ap362149 (Status: affected)
- 22.0 ap362747 (Status: affected)
- 22.0 ap382164 (Status: affected)
- 22.0 ap358013 (Status: affected)
- 22.0 ap382170 (Status: affected)
- 22.0 ap368830 (Status: affected)
- 22.0 ap369931 (Status: affected)
- 22.0 ap364960 (Status: affected)
- 22.0 ap361024 (Status: affected)
- 22.0 ap362708 (Status: affected)
- 22.0 ap381874 (Status: affected)
- 22.0 ap371314 (Status: affected)
- 22.0 ap364009 (Status: affected)
- 22.0 ap367874 (Status: affected)
- 22.0 ap360966 (Status: affected)
- 22.0 ap361577 (Status: affected)
- 22.0 ap382155 (Status: affected)
- 22.0 ap361008 (Status: affected)
- 22.0 ap377079 (Status: affected)
- 22.0 ap371319 (Status: affected)
- 22.0 ap376710 (Status: affected)
- 22.0 ap364862 (Status: affected)
- 22.0 ap371530 (Status: affected)
- 22.0 ap364897 (Status: affected)
- 22.0 ap352835 (Status: affected)
- 22.0 ap365946 (Status: affected)
- 22.0 ap362964 (Status: affected)
- 22.0 ap360906 (Status: affected)
- 22.0 ap376702 (Status: affected)
- 22.0 ap371268 (Status: affected)
- 22.0 ap370017 (Status: affected)
- 22.0 ap380691 (Status: affected)
- 22.0 ap361354 (Status: affected)
- 22.0 ap361100 (Status: affected)
- 22.0 ap361507 (Status: affected)
- 22.0 ap378010 (Status: affected)
- 22.0 ap355126 (Status: affected)
- 22.0 ap360503 (Status: affected)
- 22.0 ap362963 (Status: affected)
- 22.0 ap357187 (Status: affected)
- 22.0 ap382864 (Status: affected)
- 22.0 ap353015 (Status: affected)
- 22.0 ap371456 (Status: affected)
- 22.0 ap371582 (Status: affected)
- 22.0 ap372012 (Status: affected)
- 22.0 ap383716 (Status: affected)
- 22.0 ap383909 (Status: affected)
- 22.0 ap383701 (Status: affected)
- 22.0 ap383797 (Status: affected)
- 22.0 ap384211 (Status: affected)
- 22.0 ap348078 (Status: affected)
- 22.0 ap342836 (Status: affected)
- 22.0 ap343616 (Status: affected)
- 22.0 ap346307 (Status: affected)
- 22.0 ap342175 (Status: affected)
- 22.0 ap345032 (Status: affected)
- 22.0 ap339371 (Status: affected)
- 22.0 ap353835 (Status: affected)
- 22.0 ap351023 (Status: affected)
- 22.0 ap354355 (Status: affected)
- 22.0 ap353903 (Status: affected)
- 22.0 ap354070 (Status: affected)
- 22.0 ap354354 (Status: affected)
- 22.0 ap349850 (Status: affected)
- 22.0 ap354027 (Status: affected)
- 22.0 ap354154 (Status: affected)
- 22.0 ap354069 (Status: affected)
- 22.0 ap353915 (Status: affected)
- 22.0 ap353865 (Status: affected)
- 22.0 ap348472 (Status: affected)
- 22.0 ap350800 (Status: affected)
- 22.0 ap350032 (Status: affected)
- 22.0 ap349201 (Status: affected)
- 22.0 ap350217 (Status: affected)
- 22.0 ap353841 (Status: affected)
- 22.0 ap350179 (Status: affected)
- 22.0 ap354313 (Status: affected)
- 22.0 ap354098 (Status: affected)
- 22.0 ap353975 (Status: affected)
- 22.0 ap348945 (Status: affected)
- 22.0 ap354090 (Status: affected)
- 22.0 ap352325 (Status: affected)
- 22.0 ap350176 (Status: affected)
- 22.0 ap352402 (Status: affected)
- 22.0 ap350405 (Status: affected)
- 22.0 ap352928 (Status: affected)
- 22.0 ap350573 (Status: affected)
- 22.0 ap353357 (Status: affected)
- 22.0 ap352516 (Status: affected)
- 22.0 ap352109 (Status: affected)
- 22.0 ap352330 (Status: affected)
- 22.0 ap353120 (Status: affected)
- 22.0 ap351250 (Status: affected)
- 22.0 ap353384 (Status: affected)
- 22.0 ap353490 (Status: affected)
- 22.0 ap352421 (Status: affected)
- 22.0 ap352766 (Status: affected)
- 22.0 ap351924 (Status: affected)
- 22.0 ap351817 (Status: affected)
- 22.0 ap353676 (Status: affected)
- 22.0 ap352178 (Status: affected)
- 22.0 ap352962 (Status: affected)
- 22.0 ap351721 (Status: affected)
- 22.0 ap352795 (Status: affected)
- 22.0 ap352703 (Status: affected)
- 22.0 ap353549 (Status: affected)
- 22.0 ap353418 (Status: affected)
- 22.0 ap353358 (Status: affected)
- 22.0 ap353179 (Status: affected)
- 22.0 ap351960 (Status: affected)
- 22.0 ap353162 (Status: affected)
- 22.0 ap353520 (Status: affected)
- 22.0 ap352304 (Status: affected)
- 22.0 ap353390 (Status: affected)
- 22.0 ap351700 (Status: affected)
- 22.0 ap351973 (Status: affected)
- 22.0 ap352372 (Status: affected)
- 22.0 ap352205 (Status: affected)
- 22.0 ap352515 (Status: affected)
- 22.0 ap353360 (Status: affected)
- 22.0 ap352932 (Status: affected)
- 22.0 ap354921 (Status: affected)
- 22.0 ap352726 (Status: affected)
- 22.0 ap352707 (Status: affected)
- 22.0 ap355000 (Status: affected)
- 22.0 ap352896 (Status: affected)
- 22.0 ap355757 (Status: affected)
- 22.0 ap352972 (Status: affected)
- 22.0 ap353577 (Status: affected)
- 22.0 ap352493 (Status: affected)
- 22.0 ap355636 (Status: affected)
- 22.0 ap356603 (Status: affected)
- 22.0 ap354784 (Status: affected)
- 22.0 ap354448 (Status: affected)
- 22.0 ap355894 (Status: affected)
- 22.0 ap355385 (Status: affected)
- 22.0 ap353458 (Status: affected)
- 22.0 ap352837 (Status: affected)
- 22.0 ap353311 (Status: affected)
- 22.0 ap354646 (Status: affected)
- 22.0 ap352337 (Status: affected)
- 22.0 ap355300 (Status: affected)
- 22.0 ap353372 (Status: affected)
- 22.0 ap355083 (Status: affected)
- 22.0 ap357047 (Status: affected)
- 22.0 ap353681 (Status: affected)
- 22.0 ap356164 (Status: affected)
- 22.0 ap355027 (Status: affected)
- 22.0 ap356412 (Status: affected)
- 22.0 ap356848 (Status: affected)
- 22.0 ap356706 (Status: affected)
- 22.0 ap355946 (Status: affected)
- 22.0 ap356474 (Status: affected)
- 22.0 ap354750 (Status: affected)
- 22.0 ap356799 (Status: affected)
- 22.0 ap356432 (Status: affected)
- 22.0 ap354927 (Status: affected)
- 22.0 ap353699 (Status: affected)
- 22.0 ap355443 (Status: affected)
- 22.0 ap356330 (Status: affected)
- 22.0 ap356512 (Status: affected)
- 22.0 ap357083 (Status: affected)
- 22.0 ap355647 (Status: affected)
- 22.0 ap356328 (Status: affected)
- 22.0 ap355774 (Status: affected)
- 22.0 ap354519 (Status: affected)
- 22.0 ap355343 (Status: affected)
- 22.0 ap355091 (Status: affected)
- 22.0 ap354785 (Status: affected)
- 22.0 ap354793 (Status: affected)
- 22.0 ap354374 (Status: affected)
- 22.0 ap355905 (Status: affected)
- 22.0 ap354764 (Status: affected)
- 22.0 ap355672 (Status: affected)
- 22.0 ap355080 (Status: affected)
- 22.0 ap356253 (Status: affected)
- 22.0 ap354528 (Status: affected)
- 22.0 ap355070 (Status: affected)
- 22.0 ap355365 (Status: affected)
- 22.0 ap355353 (Status: affected)
- 22.0 ap355286 (Status: affected)
- 22.0 ap356359 (Status: affected)
- 22.0 ap356434 (Status: affected)
- 22.0 ap355952 (Status: affected)
- 22.0 ap356000 (Status: affected)
- 22.0 ap354909 (Status: affected)
- 22.0 ap354964 (Status: affected)
- 22.0 ap355916 (Status: affected)
- 22.0 ap355555 (Status: affected)
- 22.0 ap355775 (Status: affected)
- 22.0 ap354936 (Status: affected)
- 22.0 ap356271 (Status: affected)
- 22.0 ap355285 (Status: affected)
- 22.0 ap355616 (Status: affected)
- 22.0 ap355674 (Status: affected)
- 22.0 ap356538 (Status: affected)
- 22.0 ap356749 (Status: affected)
- 22.0 ap356960 (Status: affected)
- 22.0 ap355922 (Status: affected)
- 22.0 ap357347 (Status: affected)
- 22.0 ap355812 (Status: affected)
- 22.0 ap354597 (Status: affected)
- 22.0 ap356458 (Status: affected)
- 22.0 ap353701 (Status: affected)
- 22.0 ap356140 (Status: affected)
- 22.0 ap356319 (Status: affected)
- 22.0 ap354413 (Status: affected)
- 22.0 ap357378 (Status: affected)
- 22.0 ap357395 (Status: affected)
- 22.0 ap357400 (Status: affected)
- 22.0 ap356774 (Status: affected)
- 22.0 ap356551 (Status: affected)
- 22.0 ap351262 (Status: affected)
- 22.0 ap357632 (Status: affected)
- 22.0 ap357040 (Status: affected)
- 22.0 ap356390 (Status: affected)
- 22.0 ap357607 (Status: affected)
- 22.0 ap357525 (Status: affected)
- 22.0 ap354769 (Status: affected)
- 22.0 ap357447 (Status: affected)
- 22.0 ap358893 (Status: affected)
- 22.0 ap357560 (Status: affected)
- 22.0 ap357645 (Status: affected)
- 22.0 ap359029 (Status: affected)
- 22.0 ap357768 (Status: affected)
- 22.0 ap357608 (Status: affected)
- 22.0 ap357655 (Status: affected)
- 22.0 ap357597 (Status: affected)
- 22.0 ap357859 (Status: affected)
- 22.0 ap358578 (Status: affected)
- 22.0 ap359145 (Status: affected)
- 22.0 ap358099 (Status: affected)
- 22.0 ap357471 (Status: affected)
- 22.0 ap358092 (Status: affected)
- 22.0 ap357571 (Status: affected)
- 22.0 ap359111 (Status: affected)
- 22.0 ap357523 (Status: affected)
- 22.0 ap357769 (Status: affected)
- 22.0 ap358469 (Status: affected)
- 22.0 ap357621 (Status: affected)
- 22.0 ap359525 (Status: affected)
- 22.0 ap357795 (Status: affected)
- 22.0 ap358399 (Status: affected)
- 22.0 ap358493 (Status: affected)
- 22.0 ap359049 (Status: affected)
- 22.0 ap358971 (Status: affected)
- 22.0 ap358246 (Status: affected)
- 22.0 ap358234 (Status: affected)
- 22.0 ap358345 (Status: affected)
- 22.0 ap359112 (Status: affected)
- 22.0 ap358291 (Status: affected)
- 22.0 ap358059 (Status: affected)
- 22.0 ap358582 (Status: affected)
- 22.0 ap359589 (Status: affected)
- 22.0 ap358453 (Status: affected)
- 22.0 ap359434 (Status: affected)
- 22.0 ap358290 (Status: affected)
- 22.0 ap357791 (Status: affected)
- 22.0 ap359156 (Status: affected)
- 22.0 ap358034 (Status: affected)
- 22.0 ap358119 (Status: affected)
- 22.0 ap359549 (Status: affected)
- 22.0 ap357718 (Status: affected)
- 22.0 ap358454 (Status: affected)
- 22.0 ap357775 (Status: affected)
- 22.0 ap358132 (Status: affected)
- 22.0 ap358603 (Status: affected)
- 22.0 ap358515 (Status: affected)
- 22.0 ap358563 (Status: affected)
- 22.0 ap359674 (Status: affected)
- 22.0 ap359121 (Status: affected)
- 22.0 ap359103 (Status: affected)
- 22.0 ap360250 (Status: affected)
- 22.0 ap360564 (Status: affected)
- 22.0 ap359227 (Status: affected)
- 22.0 ap359127 (Status: affected)
- 22.0 ap358887 (Status: affected)
- 22.0 ap359106 (Status: affected)
- 22.0 ap363144 (Status: affected)
- 22.0 ap359829 (Status: affected)
- 22.0 ap359649 (Status: affected)
- 22.0 ap358995 (Status: affected)
- 22.0 ap361101 (Status: affected)
- 22.0 ap359470 (Status: affected)
- 22.0 ap359218 (Status: affected)
- 22.0 ap359769 (Status: affected)
- 22.0 ap359465 (Status: affected)
- 22.0 ap360164 (Status: affected)
- 22.0 ap360007 (Status: affected)
- 22.0 ap359001 (Status: affected)
- 22.0 ap360365 (Status: affected)
- 22.0 ap359748 (Status: affected)
- 22.0 ap360495 (Status: affected)
- 22.0 ap360931 (Status: affected)
- 22.0 ap360817 (Status: affected)
- 22.0 ap360459 (Status: affected)
- 22.0 ap359911 (Status: affected)
- 22.0 ap363146 (Status: affected)
- 22.0 ap360201 (Status: affected)
- 22.0 ap360586 (Status: affected)
- 22.0 ap359974 (Status: affected)
- 22.0 ap361054 (Status: affected)
- 22.0 ap361153 (Status: affected)
- 22.0 ap360904 (Status: affected)
- 22.0 ap359644 (Status: affected)
- 22.0 ap360265 (Status: affected)
- 22.0 ap359765 (Status: affected)
- 22.0 ap363145 (Status: affected)
- 22.0 ap360816 (Status: affected)
- 22.0 ap361116 (Status: affected)
- 22.0 ap360600 (Status: affected)
- 22.0 ap360362 (Status: affected)
- 22.0 ap362247 (Status: affected)
- 22.0 ap360912 (Status: affected)
- 22.0 ap360960 (Status: affected)
- 22.0 ap360184 (Status: affected)
- 22.0 ap360740 (Status: affected)
- 22.0 ap361353 (Status: affected)
- 22.0 ap361696 (Status: affected)
- 22.0 ap361076 (Status: affected)
- 22.0 ap360531 (Status: affected)
- 22.0 ap362532 (Status: affected)
- 22.0 ap361520 (Status: affected)
- 22.0 ap361974 (Status: affected)
- 22.0 ap362771 (Status: affected)
- 22.0 ap361598 (Status: affected)
- 22.0 ap361445 (Status: affected)
- 22.0 ap361833 (Status: affected)
- 22.0 ap361560 (Status: affected)
- 22.0 ap362143 (Status: affected)
- 22.0 ap362367 (Status: affected)
- 22.0 ap362848 (Status: affected)
- 22.0 ap362610 (Status: affected)
- 22.0 ap361559 (Status: affected)
- 22.0 ap361820 (Status: affected)
- 22.0 ap360325 (Status: affected)
- 22.0 ap361835 (Status: affected)
- 22.0 ap362683 (Status: affected)
- 22.0 ap361533 (Status: affected)
- 22.0 ap361883 (Status: affected)
- 22.0 ap362150 (Status: affected)
- 22.0 ap362163 (Status: affected)
- 22.0 ap361854 (Status: affected)
- 22.0 ap362548 (Status: affected)
- 22.0 ap362001 (Status: affected)
- 22.0 ap362276 (Status: affected)
- 22.0 ap362825 (Status: affected)
- 22.0 ap362707 (Status: affected)
- 22.0 ap362298 (Status: affected)
- 22.0 ap362637 (Status: affected)
- 22.0 ap362619 (Status: affected)
- 22.0 ap362490 (Status: affected)
- 22.0 ap361934 (Status: affected)
- 22.0 ap363082 (Status: affected)
- 22.0 ap362373 (Status: affected)
- 22.0 ap362553 (Status: affected)
- 22.0 ap361154 (Status: affected)
- 22.0 ap362710 (Status: affected)
- 22.0 ap362799 (Status: affected)
- 22.0 ap362088 (Status: affected)
- 22.0 ap362122 (Status: affected)
- 22.0 ap364194 (Status: affected)
- 22.0 ap361834 (Status: affected)
- 22.0 ap361666 (Status: affected)
- 22.0 ap363430 (Status: affected)
- 22.0 ap362492 (Status: affected)
- 22.0 ap362713 (Status: affected)
- 22.0 ap363753 (Status: affected)
- 22.0 ap362182 (Status: affected)
- 22.0 ap362644 (Status: affected)
- 22.0 ap367820 (Status: affected)
- 22.0 ap363584 (Status: affected)
- 22.0 ap363815 (Status: affected)
- 22.0 ap362328 (Status: affected)
- 22.0 ap364223 (Status: affected)
- 22.0 ap363332 (Status: affected)
- 22.0 ap363867 (Status: affected)
- 22.0 ap362575 (Status: affected)
- 22.0 ap362831 (Status: affected)
- 22.0 ap363361 (Status: affected)
- 22.0 ap363760 (Status: affected)
- 22.0 ap368026 (Status: affected)
- 22.0 ap363521 (Status: affected)
- 22.0 ap364048 (Status: affected)
- 22.0 ap367675 (Status: affected)
- 22.0 ap364199 (Status: affected)
- 22.0 ap363233 (Status: affected)
- 22.0 ap363666 (Status: affected)
- 22.0 ap364256 (Status: affected)
- 22.0 ap363831 (Status: affected)
- 22.0 ap363568 (Status: affected)
- 22.0 ap367974 (Status: affected)
- 22.0 ap364278 (Status: affected)
- 22.0 ap363824 (Status: affected)
- 22.0 ap367969 (Status: affected)
- 22.0 ap363372 (Status: affected)
- 22.0 ap363759 (Status: affected)
- 22.0 ap368067 (Status: affected)
- 22.0 ap363976 (Status: affected)
- 22.0 ap363218 (Status: affected)
- 22.0 ap363596 (Status: affected)
- 22.0 ap368015 (Status: affected)
- 22.0 ap366118 (Status: affected)
- 22.0 ap364213 (Status: affected)
- 22.0 ap364275 (Status: affected)
- 22.0 ap364291 (Status: affected)
- 22.0 ap363213 (Status: affected)
- 22.0 ap366397 (Status: affected)
- 22.0 ap366624 (Status: affected)
- 22.0 ap363582 (Status: affected)
- 22.0 ap364125 (Status: affected)
- 22.0 ap366252 (Status: affected)
- 22.0 ap363234 (Status: affected)
- 22.0 ap363408 (Status: affected)
- 22.0 ap366701 (Status: affected)
- 22.0 ap366715 (Status: affected)
- 22.0 ap366221 (Status: affected)
- 22.0 ap366301 (Status: affected)
- 22.0 ap364214 (Status: affected)
- 22.0 ap366174 (Status: affected)
- 22.0 ap363846 (Status: affected)
- 22.0 ap364258 (Status: affected)
- 22.0 ap365970 (Status: affected)
- 22.0 ap363729 (Status: affected)
- 22.0 ap363265 (Status: affected)
- 22.0 ap363770 (Status: affected)
- 22.0 ap366784 (Status: affected)
- 22.0 ap366348 (Status: affected)
- 22.0 ap366803 (Status: affected)
- 22.0 ap366358 (Status: affected)
- 22.0 ap366744 (Status: affected)
- 22.0 ap366180 (Status: affected)
- 22.0 ap366649 (Status: affected)
- 22.0 ap364500 (Status: affected)
- 22.0 ap365172 (Status: affected)
- 22.0 ap365995 (Status: affected)
- 22.0 ap366486 (Status: affected)
- 22.0 ap366430 (Status: affected)
- 22.0 ap366261 (Status: affected)
- 22.0 ap366490 (Status: affected)
- 22.0 ap366375 (Status: affected)
- 22.0 ap366211 (Status: affected)
- 22.0 ap365115 (Status: affected)
- 22.0 ap366295 (Status: affected)
- 22.0 ap364778 (Status: affected)
- 22.0 ap366656 (Status: affected)
- 22.0 ap364834 (Status: affected)
- 22.0 ap364670 (Status: affected)
- 22.0 ap364521 (Status: affected)
- 22.0 ap366117 (Status: affected)
- 22.0 ap364905 (Status: affected)
- 22.0 ap364471 (Status: affected)
- 22.0 ap364699 (Status: affected)
- 22.0 ap364922 (Status: affected)
- 22.0 ap364844 (Status: affected)
- 22.0 ap364745 (Status: affected)
- 22.0 ap364781 (Status: affected)
- 22.0 ap365146 (Status: affected)
- 22.0 ap366747 (Status: affected)
- 22.0 ap364898 (Status: affected)
- 22.0 ap364635 (Status: affected)
- 22.0 ap364797 (Status: affected)
- 22.0 ap364651 (Status: affected)
- 22.0 ap364932 (Status: affected)
- 22.0 ap364860 (Status: affected)
- 22.0 ap366677 (Status: affected)
- 22.0 ap367298 (Status: affected)
- 22.0 ap365545 (Status: affected)
- 22.0 ap367513 (Status: affected)
- 22.0 ap365390 (Status: affected)
- 22.0 ap364805 (Status: affected)
- 22.0 ap365800 (Status: affected)
- 22.0 ap365173 (Status: affected)
- 22.0 ap365171 (Status: affected)
- 22.0 ap364761 (Status: affected)
- 22.0 ap364924 (Status: affected)
- 22.0 ap365167 (Status: affected)
- 22.0 ap364473 (Status: affected)
- 22.0 ap365584 (Status: affected)
- 22.0 ap365400 (Status: affected)
- 22.0 ap367396 (Status: affected)
- 22.0 ap365632 (Status: affected)
- 22.0 ap365905 (Status: affected)
- 22.0 ap367109 (Status: affected)
- 22.0 ap365449 (Status: affected)
- 22.0 ap367338 (Status: affected)
- 22.0 ap365515 (Status: affected)
- 22.0 ap367001 (Status: affected)
- 22.0 ap365577 (Status: affected)
- 22.0 ap365685 (Status: affected)
- 22.0 ap367207 (Status: affected)
- 22.0 ap367434 (Status: affected)
- 22.0 ap365597 (Status: affected)
- 22.0 ap365801 (Status: affected)
- 22.0 ap365815 (Status: affected)
- 22.0 ap365759 (Status: affected)
- 22.0 ap365730 (Status: affected)
- 22.0 ap365662 (Status: affected)
- 22.0 ap365758 (Status: affected)
- 22.0 ap365920 (Status: affected)
- 22.0 ap365556 (Status: affected)
- 22.0 ap367290 (Status: affected)
- 22.0 ap367517 (Status: affected)
- 22.0 ap367183 (Status: affected)
- 22.0 ap370911 (Status: affected)
- 22.0 ap367340 (Status: affected)
- 22.0 ap371050 (Status: affected)
- 22.0 ap371313 (Status: affected)
- 22.0 ap371436 (Status: affected)
- 22.0 ap367291 (Status: affected)
- 22.0 ap371654 (Status: affected)
- 22.0 ap365727 (Status: affected)
- 22.0 ap371470 (Status: affected)
- 22.0 ap371703 (Status: affected)
- 22.0 ap365511 (Status: affected)
- 22.0 ap367524 (Status: affected)
- 22.0 ap365576 (Status: affected)
- 22.0 ap370802 (Status: affected)
- 22.0 ap365379 (Status: affected)
- 22.0 ap365944 (Status: affected)
- 22.0 ap371587 (Status: affected)
- 22.0 ap366959 (Status: affected)
- 22.0 ap365372 (Status: affected)
- 22.0 ap367453 (Status: affected)
- 22.0 ap371202 (Status: affected)
- 22.0 ap365601 (Status: affected)
- 22.0 ap371836 (Status: affected)
- 22.0 ap365779 (Status: affected)
- 22.0 ap365858 (Status: affected)
- 22.0 ap371919 (Status: affected)
- 22.0 ap367294 (Status: affected)
- 22.0 ap366972 (Status: affected)
- 22.0 ap372163 (Status: affected)
- 22.0 ap371871 (Status: affected)
- 22.0 ap367461 (Status: affected)
- 22.0 ap371343 (Status: affected)
- 22.0 ap370948 (Status: affected)
- 22.0 ap371437 (Status: affected)
- 22.0 ap367206 (Status: affected)
- 22.0 ap372043 (Status: affected)
- 22.0 ap372016 (Status: affected)
- 22.0 ap371999 (Status: affected)
- 22.0 ap370817 (Status: affected)
- 22.0 ap367367 (Status: affected)
- 22.0 ap372072 (Status: affected)
- 22.0 ap372338 (Status: affected)
- 22.0 ap371134 (Status: affected)
- 22.0 ap372177 (Status: affected)
- 22.0 ap370952 (Status: affected)
- 22.0 ap371455 (Status: affected)
- 22.0 ap372178 (Status: affected)
- 22.0 ap371926 (Status: affected)
- 22.0 ap372351 (Status: affected)
- 22.0 ap372017 (Status: affected)
- 22.0 ap370884 (Status: affected)
- 22.0 ap371361 (Status: affected)
- 22.0 ap371681 (Status: affected)
- 22.0 ap372354 (Status: affected)
- 22.0 ap372100 (Status: affected)
- 22.0 ap371262 (Status: affected)
- 22.0 ap371775 (Status: affected)
- 22.0 ap371613 (Status: affected)
- 22.0 ap371656 (Status: affected)
- 22.0 ap372192 (Status: affected)
- 22.0 ap371610 (Status: affected)
- 22.0 ap371895 (Status: affected)
- 22.0 ap371155 (Status: affected)
- 22.0 ap371546 (Status: affected)
- 22.0 ap371516 (Status: affected)
- 22.0 ap371281 (Status: affected)
- 22.0 ap371770 (Status: affected)
- 22.0 ap371033 (Status: affected)
- 22.0 ap370908 (Status: affected)
- 22.0 ap368308 (Status: affected)
- 22.0 ap371583 (Status: affected)
- 22.0 ap368461 (Status: affected)
- 22.0 ap371195 (Status: affected)
- 22.0 ap371366 (Status: affected)
- 22.0 ap371911 (Status: affected)
- 22.0 ap371467 (Status: affected)
- 22.0 ap372371 (Status: affected)
- 22.0 ap368695 (Status: affected)
- 22.0 ap368140 (Status: affected)
- 22.0 ap368603 (Status: affected)
- 22.0 ap371805 (Status: affected)
- 22.0 ap371977 (Status: affected)
- 22.0 ap368913 (Status: affected)
- 22.0 ap368987 (Status: affected)
- 22.0 ap372024 (Status: affected)
- 22.0 ap372152 (Status: affected)
- 22.0 ap371682 (Status: affected)
- 22.0 ap371627 (Status: affected)
- 22.0 ap371961 (Status: affected)
- 22.0 ap371295 (Status: affected)
- 22.0 ap369674 (Status: affected)
- 22.0 ap369607 (Status: affected)
- 22.0 ap369173 (Status: affected)
- 22.0 ap369863 (Status: affected)
- 22.0 ap369433 (Status: affected)
- 22.0 ap369641 (Status: affected)
- 22.0 ap368604 (Status: affected)
- 22.0 ap368087 (Status: affected)
- 22.0 ap368706 (Status: affected)
- 22.0 ap370103 (Status: affected)
- 22.0 ap368216 (Status: affected)
- 22.0 ap369934 (Status: affected)
- 22.0 ap368326 (Status: affected)
- 22.0 ap369855 (Status: affected)
- 22.0 ap368510 (Status: affected)
- 22.0 ap369501 (Status: affected)
- 22.0 ap368195 (Status: affected)
- 22.0 ap369693 (Status: affected)
- 22.0 ap368327 (Status: affected)
- 22.0 ap368957 (Status: affected)
- 22.0 ap368612 (Status: affected)
- 22.0 ap369219 (Status: affected)
- 22.0 ap368568 (Status: affected)
- 22.0 ap369227 (Status: affected)
- 22.0 ap368422 (Status: affected)
- 22.0 ap369454 (Status: affected)
- 22.0 ap368217 (Status: affected)
- 22.0 ap369529 (Status: affected)
- 22.0 ap368887 (Status: affected)
- 22.0 ap368096 (Status: affected)
- 22.0 ap368754 (Status: affected)
- 22.0 ap368601 (Status: affected)
- 22.0 ap368970 (Status: affected)
- 22.0 ap369106 (Status: affected)
- 22.0 ap369881 (Status: affected)
- 22.0 ap369550 (Status: affected)
- 22.0 ap369748 (Status: affected)
- 22.0 ap368978 (Status: affected)
- 22.0 ap370113 (Status: affected)
- 22.0 ap369478 (Status: affected)
- 22.0 ap369132 (Status: affected)
- 22.0 ap368660 (Status: affected)
- 22.0 ap369667 (Status: affected)
- 22.0 ap369295 (Status: affected)
- 22.0 ap369473 (Status: affected)
- 22.0 ap369065 (Status: affected)
- 22.0 ap369668 (Status: affected)
- 22.0 ap369571 (Status: affected)
- 22.0 ap370645 (Status: affected)
- 22.0 ap370696 (Status: affected)
- 22.0 ap372433 (Status: affected)
- 22.0 ap370654 (Status: affected)
- 22.0 ap370138 (Status: affected)
- 22.0 ap370615 (Status: affected)
- 22.0 ap372567 (Status: affected)
- 22.0 ap372522 (Status: affected)
- 22.0 ap369929 (Status: affected)
- 22.0 ap372643 (Status: affected)
- 22.0 ap369800 (Status: affected)
- 22.0 ap372708 (Status: affected)
- 22.0 ap372389 (Status: affected)
- 22.0 ap370590 (Status: affected)
- 22.0 ap372390 (Status: affected)
- 22.0 ap372690 (Status: affected)
- 22.0 ap372757 (Status: affected)
- 22.0 ap372560 (Status: affected)
- 22.0 ap370636 (Status: affected)
- 22.0 ap370579 (Status: affected)
- 22.0 ap372674 (Status: affected)
- 22.0 ap372750 (Status: affected)
- 22.0 ap372706 (Status: affected)
- 22.0 ap370269 (Status: affected)
- 22.0 ap370160 (Status: affected)
- 22.0 ap370180 (Status: affected)
- 22.0 ap370667 (Status: affected)
- 22.0 ap370186 (Status: affected)
- 22.0 ap370563 (Status: affected)
- 22.0 ap370627 (Status: affected)
- 22.0 ap370258 (Status: affected)
- 22.0 ap370675 (Status: affected)
- 22.0 ap370344 (Status: affected)
- 22.0 ap370217 (Status: affected)
- 22.0 ap370349 (Status: affected)
- 22.0 ap372623 (Status: affected)
- 22.0 ap370737 (Status: affected)
- 22.0 ap372488 (Status: affected)
- 22.0 ap370424 (Status: affected)
- 22.0 ap370193 (Status: affected)
- 22.0 ap370170 (Status: affected)
- 22.0 ap374680 (Status: affected)
- 22.0 ap370544 (Status: affected)
- 22.0 ap374714 (Status: affected)
- 22.0 ap370465 (Status: affected)
- 22.0 ap374838 (Status: affected)
- 22.0 ap374169 (Status: affected)
- 22.0 ap374822 (Status: affected)
- 22.0 ap374339 (Status: affected)
- 22.0 ap374092 (Status: affected)
- 22.0 ap370459 (Status: affected)
- 22.0 ap370545 (Status: affected)
- 22.0 ap370389 (Status: affected)
- 22.0 ap374799 (Status: affected)
- 22.0 ap370437 (Status: affected)
- 22.0 ap374265 (Status: affected)
- 22.0 ap374803 (Status: affected)
- 22.0 ap370275 (Status: affected)
- 22.0 ap374430 (Status: affected)
- 22.0 ap370177 (Status: affected)
- 22.0 ap370358 (Status: affected)
- 22.0 ap373918 (Status: affected)
- 22.0 ap370179 (Status: affected)
- 22.0 ap374677 (Status: affected)
- 22.0 ap370196 (Status: affected)
- 22.0 ap372854 (Status: affected)
- 22.0 ap373539 (Status: affected)
- 22.0 ap372968 (Status: affected)
- 22.0 ap373813 (Status: affected)
- 22.0 ap373118 (Status: affected)
- 22.0 ap373855 (Status: affected)
- 22.0 ap373820 (Status: affected)
- 22.0 ap373438 (Status: affected)
- 22.0 ap373647 (Status: affected)
- 22.0 ap374660 (Status: affected)
- 22.0 ap373102 (Status: affected)
- 22.0 ap373391 (Status: affected)
- 22.0 ap373303 (Status: affected)
- 22.0 ap373302 (Status: affected)
- 22.0 ap373562 (Status: affected)
- 22.0 ap373196 (Status: affected)
- 22.0 ap373564 (Status: affected)
- 22.0 ap373732 (Status: affected)
- 22.0 ap373018 (Status: affected)
- 22.0 ap373954 (Status: affected)
- 22.0 ap374230 (Status: affected)
- 22.0 ap373950 (Status: affected)
- 22.0 ap373664 (Status: affected)
- 22.0 ap374330 (Status: affected)
- 22.0 ap374460 (Status: affected)
- 22.0 ap374312 (Status: affected)
- 22.0 ap374113 (Status: affected)
- 22.0 ap373034 (Status: affected)
- 22.0 ap372956 (Status: affected)
- 22.0 ap373111 (Status: affected)
- 22.0 ap373189 (Status: affected)
- 22.0 ap374488 (Status: affected)
- 22.0 ap374354 (Status: affected)
- 22.0 ap373285 (Status: affected)
- 22.0 ap372974 (Status: affected)
- 22.0 ap374114 (Status: affected)
- 22.0 ap373122 (Status: affected)
- 22.0 ap373257 (Status: affected)
- 22.0 ap373108 (Status: affected)
- 22.0 ap372994 (Status: affected)
- 22.0 ap374238 (Status: affected)
- 22.0 ap374356 (Status: affected)
- 22.0 ap372932 (Status: affected)
- 22.0 ap373315 (Status: affected)
- 22.0 ap373299 (Status: affected)
- 22.0 ap373137 (Status: affected)
- 22.0 ap375069 (Status: affected)
- 22.0 ap373482 (Status: affected)
- 22.0 ap373899 (Status: affected)
- 22.0 ap374971 (Status: affected)
- 22.0 ap373777 (Status: affected)
- 22.0 ap373644 (Status: affected)
- 22.0 ap375734 (Status: affected)
- 22.0 ap375625 (Status: affected)
- 22.0 ap375862 (Status: affected)
- 22.0 ap375354 (Status: affected)
- 22.0 ap375655 (Status: affected)
- 22.0 ap375688 (Status: affected)
- 22.0 ap373318 (Status: affected)
- 22.0 ap375441 (Status: affected)
- 22.0 ap375291 (Status: affected)
- 22.0 ap373046 (Status: affected)
- 22.0 ap374031 (Status: affected)
- 22.0 ap375200 (Status: affected)
- 22.0 ap373452 (Status: affected)
- 22.0 ap374334 (Status: affected)
- 22.0 ap374131 (Status: affected)
- 22.0 ap374428 (Status: affected)
- 22.0 ap374254 (Status: affected)
- 22.0 ap375936 (Status: affected)
- 22.0 ap374596 (Status: affected)
- 22.0 ap372963 (Status: affected)
- 22.0 ap373008 (Status: affected)
- 22.0 ap376504 (Status: affected)
- 22.0 ap373117 (Status: affected)
- 22.0 ap376041 (Status: affected)
- 22.0 ap376410 (Status: affected)
- 22.0 ap376179 (Status: affected)
- 22.0 ap376298 (Status: affected)
- 22.0 ap376355 (Status: affected)
- 22.0 ap376523 (Status: affected)
- 22.0 ap376485 (Status: affected)
- 22.0 ap372799 (Status: affected)
- 22.0 ap376577 (Status: affected)
- 22.0 ap376181 (Status: affected)
- 22.0 ap375090 (Status: affected)
- 22.0 ap376416 (Status: affected)
- 22.0 ap373098 (Status: affected)
- 22.0 ap374977 (Status: affected)
- 22.0 ap375206 (Status: affected)
- 22.0 ap376602 (Status: affected)
- 22.0 ap375309 (Status: affected)
- 22.0 ap375937 (Status: affected)
- 22.0 ap376531 (Status: affected)
- 22.0 ap375465 (Status: affected)
- 22.0 ap375254 (Status: affected)
- 22.0 ap375464 (Status: affected)
- 22.0 ap375865 (Status: affected)
- 22.0 ap375672 (Status: affected)
- 22.0 ap375793 (Status: affected)
- 22.0 ap374891 (Status: affected)
- 22.0 ap375321 (Status: affected)
- 22.0 ap376100 (Status: affected)
- 22.0 ap375634 (Status: affected)
- 22.0 ap375382 (Status: affected)
- 22.0 ap375091 (Status: affected)
- 22.0 ap375018 (Status: affected)
- 22.0 ap375743 (Status: affected)
- 22.0 ap375383 (Status: affected)
- 22.0 ap376508 (Status: affected)
- 22.0 ap375646 (Status: affected)
- 22.0 ap375661 (Status: affected)
- 22.0 ap375709 (Status: affected)
- 22.0 ap376426 (Status: affected)
- 22.0 ap375984 (Status: affected)
- 22.0 ap375719 (Status: affected)
- 22.0 ap375908 (Status: affected)
- 22.0 ap376117 (Status: affected)
- 22.0 ap376535 (Status: affected)
- 22.0 ap375266 (Status: affected)
- 22.0 ap375654 (Status: affected)
- 22.0 ap376614 (Status: affected)
- 22.0 ap375038 (Status: affected)
- 22.0 ap376541 (Status: affected)
- 22.0 ap376513 (Status: affected)
- 22.0 ap375509 (Status: affected)
- 22.0 ap375343 (Status: affected)
- 22.0 ap379772 (Status: affected)
- 22.0 ap375685 (Status: affected)
- 22.0 ap376356 (Status: affected)
- 22.0 ap376218 (Status: affected)
- 22.0 ap375133 (Status: affected)
- 22.0 ap374895 (Status: affected)
- 22.0 ap376429 (Status: affected)
- 22.0 ap376402 (Status: affected)
- 22.0 ap375413 (Status: affected)
- 22.0 ap379838 (Status: affected)
- 22.0 ap379874 (Status: affected)
- 22.0 ap380187 (Status: affected)
- 22.0 ap380143 (Status: affected)
- 22.0 ap379972 (Status: affected)
- 22.0 ap380535 (Status: affected)
- 22.0 ap375797 (Status: affected)
- 22.0 ap379847 (Status: affected)
- 22.0 ap380117 (Status: affected)
- 22.0 ap379775 (Status: affected)
- 22.0 ap380512 (Status: affected)
- 22.0 ap380446 (Status: affected)
- 22.0 ap379752 (Status: affected)
- 22.0 ap380396 (Status: affected)
- 22.0 ap380167 (Status: affected)
- 22.0 ap376261 (Status: affected)
- 22.0 ap376010 (Status: affected)
- 22.0 ap380473 (Status: affected)
- 22.0 ap380371 (Status: affected)
- 22.0 ap380232 (Status: affected)
- 22.0 ap376147 (Status: affected)
- 22.0 ap375924 (Status: affected)
- 22.0 ap375720 (Status: affected)
- 22.0 ap380506 (Status: affected)
- 22.0 ap379833 (Status: affected)
- 22.0 ap380108 (Status: affected)
- 22.0 ap376633 (Status: affected)
- 22.0 ap376661 (Status: affected)
- 22.0 ap380161 (Status: affected)
- 22.0 ap379917 (Status: affected)
- 22.0 ap380201 (Status: affected)
- 22.0 ap380180 (Status: affected)
- 22.0 ap380401 (Status: affected)
- 22.0 ap379951 (Status: affected)
- 22.0 ap380507 (Status: affected)
- 22.0 ap380449 (Status: affected)
- 22.0 ap379853 (Status: affected)
- 22.0 ap380041 (Status: affected)
- 22.0 ap380391 (Status: affected)
- 22.0 ap379795 (Status: affected)
- 22.0 ap380128 (Status: affected)
- 22.0 ap380239 (Status: affected)
- 22.0 ap379848 (Status: affected)
- 22.0 ap380137 (Status: affected)
- 22.0 ap380532 (Status: affected)
- 22.0 ap379934 (Status: affected)
- 22.0 ap376988 (Status: affected)
- 22.0 ap380099 (Status: affected)
- 22.0 ap376860 (Status: affected)
- 22.0 ap376989 (Status: affected)
- 22.0 ap376752 (Status: affected)
- 22.0 ap376642 (Status: affected)
- 22.0 ap377107 (Status: affected)
- 22.0 ap376701 (Status: affected)
- 22.0 ap376668 (Status: affected)
- 22.0 ap377225 (Status: affected)
- 22.0 ap377384 (Status: affected)
- 22.0 ap376953 (Status: affected)
- 22.0 ap376670 (Status: affected)
- 22.0 ap376935 (Status: affected)
- 22.0 ap377480 (Status: affected)
- 22.0 ap377497 (Status: affected)
- 22.0 ap377581 (Status: affected)
- 22.0 ap377727 (Status: affected)
- 22.0 ap377802 (Status: affected)
- 22.0 ap376652 (Status: affected)
- 22.0 ap380130 (Status: affected)
- 22.0 ap376656 (Status: affected)
- 22.0 ap376685 (Status: affected)
- 22.0 ap376984 (Status: affected)
- 22.0 ap378140 (Status: affected)
- 22.0 ap376620 (Status: affected)
- 22.0 ap376762 (Status: affected)
- 22.0 ap377982 (Status: affected)
- 22.0 ap376844 (Status: affected)
- 22.0 ap378405 (Status: affected)
- 22.0 ap377494 (Status: affected)
- 22.0 ap377625 (Status: affected)
- 22.0 ap377147 (Status: affected)
- 22.0 ap377755 (Status: affected)
- 22.0 ap378440 (Status: affected)
- 22.0 ap377483 (Status: affected)
- 22.0 ap377042 (Status: affected)
- 22.0 ap377523 (Status: affected)
- 22.0 ap378218 (Status: affected)
- 22.0 ap378581 (Status: affected)
- 22.0 ap378334 (Status: affected)
- 22.0 ap377307 (Status: affected)
- 22.0 ap377389 (Status: affected)
- 22.0 ap377566 (Status: affected)
- 22.0 ap378585 (Status: affected)
- 22.0 ap378055 (Status: affected)
- 22.0 ap378153 (Status: affected)
- 22.0 ap377149 (Status: affected)
- 22.0 ap378471 (Status: affected)
- 22.0 ap378485 (Status: affected)
- 22.0 ap377900 (Status: affected)
- 22.0 ap378257 (Status: affected)
- 22.0 ap377412 (Status: affected)
- 22.0 ap378425 (Status: affected)
- 22.0 ap378391 (Status: affected)
- 22.0 ap377496 (Status: affected)
- 22.0 ap377164 (Status: affected)
- 22.0 ap378393 (Status: affected)
- 22.0 ap377908 (Status: affected)
- 22.0 ap377068 (Status: affected)
- 22.0 ap378025 (Status: affected)
- 22.0 ap378259 (Status: affected)
- 22.0 ap377409 (Status: affected)
- 22.0 ap378419 (Status: affected)
- 22.0 ap377757 (Status: affected)
- 22.0 ap377327 (Status: affected)
- 22.0 ap377680 (Status: affected)
- 22.0 ap377329 (Status: affected)
- 22.0 ap378161 (Status: affected)
- 22.0 ap377045 (Status: affected)
- 22.0 ap378332 (Status: affected)
- 22.0 ap379016 (Status: affected)
- 22.0 ap378866 (Status: affected)
- 22.0 ap377963 (Status: affected)
- 22.0 ap379461 (Status: affected)
- 22.0 ap379326 (Status: affected)
- 22.0 ap378079 (Status: affected)
- 22.0 ap378436 (Status: affected)
- 22.0 ap378164 (Status: affected)
- 22.0 ap378966 (Status: affected)
- 22.0 ap378509 (Status: affected)
- 22.0 ap378953 (Status: affected)
- 22.0 ap377779 (Status: affected)
- 22.0 ap378823 (Status: affected)
- 22.0 ap377715 (Status: affected)
- 22.0 ap379151 (Status: affected)
- 22.0 ap378400 (Status: affected)
- 22.0 ap379350 (Status: affected)
- 22.0 ap379008 (Status: affected)
- 22.0 ap377578 (Status: affected)
- 22.0 ap379098 (Status: affected)
- 22.0 ap379524 (Status: affected)
- 22.0 ap379694 (Status: affected)
- 22.0 ap379597 (Status: affected)
- 22.0 ap378880 (Status: affected)
- 22.0 ap379531 (Status: affected)
- 22.0 ap378863 (Status: affected)
- 22.0 ap378882 (Status: affected)
- 22.0 ap379427 (Status: affected)
- 22.0 ap379493 (Status: affected)
- 22.0 ap379389 (Status: affected)
- 22.0 ap379556 (Status: affected)
- 22.0 ap379487 (Status: affected)
- 22.0 ap378970 (Status: affected)
- 22.0 ap379374 (Status: affected)
- 22.0 ap379465 (Status: affected)
- 22.0 ap379153 (Status: affected)
- 22.0 ap379165 (Status: affected)
- 22.0 ap378599 (Status: affected)
- 22.0 ap378862 (Status: affected)
- 22.0 ap379080 (Status: affected)
- 22.0 ap379085 (Status: affected)
- 22.0 ap378924 (Status: affected)
- 22.0 ap381029 (Status: affected)
- 22.0 ap382225 (Status: affected)
- 22.0 ap381125 (Status: affected)
- 22.0 ap378603 (Status: affected)
- 22.0 ap381410 (Status: affected)
- 22.0 ap380771 (Status: affected)
- 22.0 ap381518 (Status: affected)
- 22.0 ap380537 (Status: affected)
- 22.0 ap381594 (Status: affected)
- 22.0 ap381243 (Status: affected)
- 22.0 ap378865 (Status: affected)
- 22.0 ap380697 (Status: affected)
- 22.0 ap380629 (Status: affected)
- 22.0 ap380751 (Status: affected)
- 22.0 ap382300 (Status: affected)
- 22.0 ap382158 (Status: affected)
- 22.0 ap381072 (Status: affected)
- 22.0 ap378999 (Status: affected)
- 22.0 ap380914 (Status: affected)
- 22.0 ap380936 (Status: affected)
- 22.0 ap381136 (Status: affected)
- 22.0 ap380737 (Status: affected)
- 22.0 ap381781 (Status: affected)
- 22.0 ap380555 (Status: affected)
- 22.0 ap380817 (Status: affected)
- 22.0 ap381137 (Status: affected)
- 22.0 ap382240 (Status: affected)
- 22.0 ap381270 (Status: affected)
- 22.0 ap382032 (Status: affected)
- 22.0 ap382362 (Status: affected)
- 22.0 ap381523 (Status: affected)
- 22.0 ap381609 (Status: affected)
- 22.0 ap381569 (Status: affected)
- 22.0 ap381275 (Status: affected)
- 22.0 ap381498 (Status: affected)
- 22.0 ap382192 (Status: affected)
- 22.0 ap381622 (Status: affected)
- 22.0 ap381418 (Status: affected)
- 22.0 ap380970 (Status: affected)
- 22.0 ap381091 (Status: affected)
- 22.0 ap381810 (Status: affected)
- 22.0 ap382251 (Status: affected)
- 22.0 ap381732 (Status: affected)
- 22.0 ap382053 (Status: affected)
- 22.0 ap382198 (Status: affected)
- 22.0 ap382372 (Status: affected)
- 22.0 ap382195 (Status: affected)
- 22.0 ap380626 (Status: affected)
- 22.0 ap381584 (Status: affected)
- 22.0 ap380818 (Status: affected)
- 22.0 ap381118 (Status: affected)
- 22.0 ap380739 (Status: affected)
- 22.0 ap381009 (Status: affected)
- 22.0 ap382252 (Status: affected)
- 22.0 ap381140 (Status: affected)
- 22.0 ap381504 (Status: affected)
- 22.0 ap381367 (Status: affected)
- 22.0 ap382409 (Status: affected)
- 22.0 ap382993 (Status: affected)
- 22.0 ap382717 (Status: affected)
- 22.0 ap383372 (Status: affected)
- 22.0 ap382945 (Status: affected)
- 22.0 ap383569 (Status: affected)
- 22.0 ap382951 (Status: affected)
- 22.0 ap382487 (Status: affected)
- 22.0 ap383002 (Status: affected)
- 22.0 ap383168 (Status: affected)
- 22.0 ap382434 (Status: affected)
- 22.0 ap383170 (Status: affected)
- 22.0 ap383655 (Status: affected)
- 22.0 ap382615 (Status: affected)
- 22.0 ap382524 (Status: affected)
- 22.0 ap383309 (Status: affected)
- 22.0 ap383514 (Status: affected)
- 22.0 ap382824 (Status: affected)
- 22.0 ap382903 (Status: affected)
- 22.0 ap383710 (Status: affected)
- 22.0 ap383519 (Status: affected)
- 22.0 ap383367 (Status: affected)
- 22.0 ap382838 (Status: affected)
- 22.0 ap383562 (Status: affected)
- 22.0 ap382977 (Status: affected)
- 22.0 ap382488 (Status: affected)
- 22.0 ap383134 (Status: affected)
- 22.0 ap383706 (Status: affected)
- 22.0 ap383150 (Status: affected)
- 22.0 ap382954 (Status: affected)
- 22.0 ap382432 (Status: affected)
- 22.0 ap382386 (Status: affected)
- 22.0 ap382476 (Status: affected)
- 22.0 ap347536 (Status: affected)
- 22.0 ap347644 (Status: affected)
- 22.0 ap347645 (Status: affected)
- 22.0 ap347673 (Status: affected)
- 22.0 ap347677 (Status: affected)
- 22.0 ap347726 (Status: affected)
- 22.0 ap348474 (Status: affected)
- 22.0 ap348575 (Status: affected)
- 22.0 ap348766 (Status: affected)
- 22.0 ap349235 (Status: affected)
- 22.0 ap349441 (Status: affected)
- 22.0 ap349501 (Status: affected)
- 22.0 ap349582 (Status: affected)
- 22.0 ap349664 (Status: affected)
- 22.0 ap349820 (Status: affected)
- 22.0 ap349858 (Status: affected)
- 22.0 ap350056 (Status: affected)
- 22.0 ap350175 (Status: affected)
- 22.0 ap350471 (Status: affected)
- 22.0 ap350527 (Status: affected)
- 22.0 ap350564 (Status: affected)
- 22.0 ap350603 (Status: affected)
- 22.0 ap350864 (Status: affected)
- 22.0 ap350908 (Status: affected)
- 22.0 ap350969 (Status: affected)
- 22.0 ap351199 (Status: affected)
- 22.0 ap351223 (Status: affected)
- 22.0 ap351246 (Status: affected)
- 22.0 ap351345 (Status: affected)
- 22.0 ap351527 (Status: affected)
- 22.0 ap351727 (Status: affected)
- 22.0 ap351744 (Status: affected)
- 22.0 ap351942 (Status: affected)
- 22.0 ap352184 (Status: affected)
- 22.0 ap352203 (Status: affected)
- 22.0 ap352264 (Status: affected)
- 22.0 ap352323 (Status: affected)
- 22.0 ap352369 (Status: affected)
- 22.0 ap352423 (Status: affected)
- 22.0 ap352511 (Status: affected)
- 22.0 ap352697 (Status: affected)
- 22.0 ap352711 (Status: affected)
- 22.0 ap352804 (Status: affected)
- 22.0 ap352805 (Status: affected)
- 22.0 ap352824 (Status: affected)
- 22.0 ap352915 (Status: affected)
- 22.0 ap352954 (Status: affected)
- 22.0 ap353001 (Status: affected)
- 22.0 ap353122 (Status: affected)
- 22.0 ap353137 (Status: affected)
- 22.0 ap353167 (Status: affected)
- 22.0 ap353168 (Status: affected)
- 22.0 ap353354 (Status: affected)
- 22.0 ap353389 (Status: affected)
- 22.0 ap353623 (Status: affected)
- 22.0 ap353658 (Status: affected)
- 22.0 ap353708 (Status: affected)
- 22.0 ap353812 (Status: affected)
- 22.0 ap353836 (Status: affected)
- 22.0 ap353839 (Status: affected)
- 22.0 ap353852 (Status: affected)
- 22.0 ap353856 (Status: affected)
- 22.0 ap353870 (Status: affected)
- 22.0 ap353985 (Status: affected)
- 22.0 ap354005 (Status: affected)
- 22.0 ap354077 (Status: affected)
- 22.0 ap354164 (Status: affected)
- 22.0 ap354170 (Status: affected)
- 22.0 ap354180 (Status: affected)
- 22.0 ap354195 (Status: affected)
- 22.0 ap354200 (Status: affected)
- 22.0 ap354316 (Status: affected)
- 22.0 ap354365 (Status: affected)
- 22.0 ap354380 (Status: affected)
- 22.0 ap354415 (Status: affected)
- 22.0 ap354438 (Status: affected)
- 22.0 ap354439 (Status: affected)
- 22.0 ap354535 (Status: affected)
- 22.0 ap354556 (Status: affected)
- 22.0 ap354616 (Status: affected)
- 22.0 ap354681 (Status: affected)
- 22.0 ap354942 (Status: affected)
- 22.0 ap355002 (Status: affected)
- 22.0 ap355003 (Status: affected)
- 22.0 ap355069 (Status: affected)
- 22.0 ap355102 (Status: affected)
- 22.0 ap355112 (Status: affected)
- 22.0 ap355121 (Status: affected)
- 22.0 ap355124 (Status: affected)
- 22.0 ap355125 (Status: affected)
- 22.0 ap355197 (Status: affected)
- 22.0 ap355201 (Status: affected)
- 22.0 ap355236 (Status: affected)
- 22.0 ap355265 (Status: affected)
- 22.0 ap355283 (Status: affected)
- 22.0 ap355356 (Status: affected)
- 22.0 ap355568 (Status: affected)
- 22.0 ap355599 (Status: affected)
- 22.0 ap355628 (Status: affected)
- 22.0 ap355637 (Status: affected)
- 22.0 ap355639 (Status: affected)
- 22.0 ap355640 (Status: affected)
- 22.0 ap355664 (Status: affected)
- 22.0 ap355669 (Status: affected)
- 22.0 ap355670 (Status: affected)
- 22.0 ap355806 (Status: affected)
- 22.0 ap355820 (Status: affected)
- 22.0 ap355833 (Status: affected)
- 22.0 ap355836 (Status: affected)
- 22.0 ap355838 (Status: affected)
- 22.0 ap355896 (Status: affected)
- 22.0 ap355897 (Status: affected)
- 22.0 ap356007 (Status: affected)
- 22.0 ap356029 (Status: affected)
- 22.0 ap356141 (Status: affected)
- 22.0 ap356142 (Status: affected)
- 22.0 ap356152 (Status: affected)
- 22.0 ap356231 (Status: affected)
- 22.0 ap356254 (Status: affected)
- 22.0 ap356301 (Status: affected)
- 22.0 ap356320 (Status: affected)
- 22.0 ap356345 (Status: affected)
- 22.0 ap356353 (Status: affected)
- 22.0 ap356497 (Status: affected)
- 22.0 ap356527 (Status: affected)
- 22.0 ap356570 (Status: affected)
- 22.0 ap356575 (Status: affected)
- 22.0 ap356589 (Status: affected)
- 22.0 ap356707 (Status: affected)
- 22.0 ap356752 (Status: affected)
- 22.0 ap356935 (Status: affected)
- 22.0 ap356969 (Status: affected)
- 22.0 ap356978 (Status: affected)
- 22.0 ap357019 (Status: affected)
- 22.0 ap357029 (Status: affected)
- 22.0 ap357039 (Status: affected)
- 22.0 ap357081 (Status: affected)
- 22.0 ap357105 (Status: affected)
- 22.0 ap357162 (Status: affected)
- 22.0 ap357172 (Status: affected)
- 22.0 ap357181 (Status: affected)
- 22.0 ap357185 (Status: affected)
- 22.0 ap357330 (Status: affected)
- 22.0 ap357366 (Status: affected)
- 22.0 ap357387 (Status: affected)
- 22.0 ap357405 (Status: affected)
- 22.0 ap357413 (Status: affected)
- 22.0 ap357417 (Status: affected)
- 22.0 ap357452 (Status: affected)
- 22.0 ap357454 (Status: affected)
- 22.0 ap357507 (Status: affected)
- 22.0 ap357508 (Status: affected)
- 22.0 ap357610 (Status: affected)
- 22.0 ap357624 (Status: affected)
- 22.0 ap357653 (Status: affected)
- 22.0 ap357670 (Status: affected)
- 22.0 ap357675 (Status: affected)
- 22.0 ap357761 (Status: affected)
- 22.0 ap357889 (Status: affected)
- 22.0 ap357915 (Status: affected)
- 22.0 ap357917 (Status: affected)
- 22.0 ap358012 (Status: affected)
- 22.0 ap358046 (Status: affected)
- 22.0 ap358082 (Status: affected)
- 22.0 ap358096 (Status: affected)
- 22.0 ap358128 (Status: affected)
- 22.0 ap358241 (Status: affected)
- 22.0 ap358271 (Status: affected)
- 22.0 ap358330 (Status: affected)
- 22.0 ap358360 (Status: affected)
- 22.0 ap358365 (Status: affected)
- 22.0 ap358440 (Status: affected)
- 22.0 ap358441 (Status: affected)
- 22.0 ap358513 (Status: affected)
- 22.0 ap358521 (Status: affected)
- 22.0 ap358568 (Status: affected)
- 22.0 ap358604 (Status: affected)
- 22.0 ap358643 (Status: affected)
- 22.0 ap358651 (Status: affected)
- 22.0 ap358681 (Status: affected)
- 22.0 ap358707 (Status: affected)
- 22.0 ap358730 (Status: affected)
- 22.0 ap358732 (Status: affected)
- 22.0 ap358737 (Status: affected)
- 22.0 ap358845 (Status: affected)
- 22.0 ap358870 (Status: affected)
- 22.0 ap358891 (Status: affected)
- 22.0 ap358901 (Status: affected)
- 22.0 ap358907 (Status: affected)
- 22.0 ap358920 (Status: affected)
- 22.0 ap358942 (Status: affected)
- 22.0 ap358943 (Status: affected)
- 22.0 ap358944 (Status: affected)
- 22.0 ap359044 (Status: affected)
- 22.0 ap359118 (Status: affected)
- 22.0 ap359130 (Status: affected)
- 22.0 ap359153 (Status: affected)
- 22.0 ap359164 (Status: affected)
- 22.0 ap359186 (Status: affected)
- 22.0 ap359191 (Status: affected)
- 22.0 ap359225 (Status: affected)
- 22.0 ap359259 (Status: affected)
- 22.0 ap359292 (Status: affected)
- 22.0 ap359298 (Status: affected)
- 22.0 ap359324 (Status: affected)
- 22.0 ap359421 (Status: affected)
- 22.0 ap359424 (Status: affected)
- 22.0 ap359429 (Status: affected)
- 22.0 ap359458 (Status: affected)
- 22.0 ap359464 (Status: affected)
- 22.0 ap359492 (Status: affected)
- 22.0 ap359562 (Status: affected)
- 22.0 ap359570 (Status: affected)
- 22.0 ap359612 (Status: affected)
- 22.0 ap359657 (Status: affected)
- 22.0 ap359710 (Status: affected)
- 22.0 ap359772 (Status: affected)
- 22.0 ap359775 (Status: affected)
- 22.0 ap359812 (Status: affected)
- 22.0 ap359826 (Status: affected)
- 22.0 ap359851 (Status: affected)
- 22.0 ap359892 (Status: affected)
- 22.0 ap359925 (Status: affected)
- 22.0 ap360167 (Status: affected)
- 22.0 ap360198 (Status: affected)
- 22.0 ap360231 (Status: affected)
- 22.0 ap360245 (Status: affected)
- 22.0 ap360319 (Status: affected)
- 22.0 ap360375 (Status: affected)
- 22.0 ap360563 (Status: affected)
- 22.0 ap360603 (Status: affected)
- 22.0 ap360627 (Status: affected)
- 22.0 ap360790 (Status: affected)
- 22.0 ap360874 (Status: affected)
- 22.0 ap360943 (Status: affected)
- 22.0 ap360955 (Status: affected)
- 22.0 ap361062 (Status: affected)
- 22.0 ap361080 (Status: affected)
- 22.0 ap361379 (Status: affected)
- 22.0 ap361414 (Status: affected)
- 22.0 ap361444 (Status: affected)
- 22.0 ap361453 (Status: affected)
- 22.0 ap361459 (Status: affected)
- 22.0 ap361519 (Status: affected)
- 22.0 ap361537 (Status: affected)
- 22.0 ap361549 (Status: affected)
- 22.0 ap361551 (Status: affected)
- 22.0 ap361581 (Status: affected)
- 22.0 ap361596 (Status: affected)
- 22.0 ap361620 (Status: affected)
- 22.0 ap361631 (Status: affected)
- 22.0 ap361640 (Status: affected)
- 22.0 ap361643 (Status: affected)
- 22.0 ap361679 (Status: affected)
- 22.0 ap361691 (Status: affected)
- 22.0 ap361823 (Status: affected)
- 22.0 ap361831 (Status: affected)
- 22.0 ap361847 (Status: affected)
- 22.0 ap361930 (Status: affected)
- 22.0 ap361936 (Status: affected)
- 22.0 ap361997 (Status: affected)
- 22.0 ap361999 (Status: affected)
- 22.0 ap362015 (Status: affected)
- 22.0 ap362019 (Status: affected)
- 22.0 ap362041 (Status: affected)
- 22.0 ap362080 (Status: affected)
- 22.0 ap362120 (Status: affected)
- 22.0 ap362128 (Status: affected)
- 22.0 ap362141 (Status: affected)
- 22.0 ap362193 (Status: affected)
- 22.0 ap362263 (Status: affected)
- 22.0 ap362269 (Status: affected)
- 22.0 ap362314 (Status: affected)
- 22.0 ap362316 (Status: affected)
- 22.0 ap362324 (Status: affected)
- 22.0 ap362363 (Status: affected)
- 22.0 ap362365 (Status: affected)
- 22.0 ap362368 (Status: affected)
- 22.0 ap362372 (Status: affected)
- 22.0 ap362389 (Status: affected)
- 22.0 ap362525 (Status: affected)
- 22.0 ap362677 (Status: affected)
- 22.0 ap362681 (Status: affected)
- 22.0 ap362691 (Status: affected)
- 22.0 ap362693 (Status: affected)
- 22.0 ap362712 (Status: affected)
- 22.0 ap362741 (Status: affected)
- 22.0 ap362766 (Status: affected)
- 22.0 ap362769 (Status: affected)
- 22.0 ap362868 (Status: affected)
- 22.0 ap363023 (Status: affected)
- 22.0 ap363130 (Status: affected)
- 22.0 ap363136 (Status: affected)
- 22.0 ap363197 (Status: affected)
- 22.0 ap363208 (Status: affected)
- 22.0 ap363221 (Status: affected)
- 22.0 ap363240 (Status: affected)
- 22.0 ap363247 (Status: affected)
- 22.0 ap363297 (Status: affected)
- 22.0 ap363298 (Status: affected)
- 22.0 ap363305 (Status: affected)
- 22.0 ap363330 (Status: affected)
- 22.0 ap363412 (Status: affected)
- 22.0 ap363415 (Status: affected)
- 22.0 ap363431 (Status: affected)
- 22.0 ap363433 (Status: affected)
- 22.0 ap363530 (Status: affected)
- 22.0 ap363556 (Status: affected)
- 22.0 ap363560 (Status: affected)
- 22.0 ap363565 (Status: affected)
- 22.0 ap363577 (Status: affected)
- 22.0 ap363609 (Status: affected)
- 22.0 ap363641 (Status: affected)
- 22.0 ap363672 (Status: affected)
- 22.0 ap363691 (Status: affected)
- 22.0 ap363693 (Status: affected)
- 22.0 ap363694 (Status: affected)
- 22.0 ap363705 (Status: affected)
- 22.0 ap363707 (Status: affected)
- 22.0 ap363710 (Status: affected)
- 22.0 ap363727 (Status: affected)
- 22.0 ap363811 (Status: affected)
- 22.0 ap363844 (Status: affected)
- 22.0 ap363845 (Status: affected)
- 22.0 ap363984 (Status: affected)
- 22.0 ap364003 (Status: affected)
- 22.0 ap364030 (Status: affected)
- 22.0 ap364100 (Status: affected)
- 22.0 ap364101 (Status: affected)
- 22.0 ap364107 (Status: affected)
- 22.0 ap364113 (Status: affected)
- 22.0 ap364146 (Status: affected)
- 22.0 ap364148 (Status: affected)
- 22.0 ap364150 (Status: affected)
- 22.0 ap364154 (Status: affected)
- 22.0 ap364157 (Status: affected)
- 22.0 ap364210 (Status: affected)
- 22.0 ap364241 (Status: affected)
- 22.0 ap364248 (Status: affected)
- 22.0 ap364252 (Status: affected)
- 22.0 ap364260 (Status: affected)
- 22.0 ap364347 (Status: affected)
- 22.0 ap364357 (Status: affected)
- 22.0 ap364385 (Status: affected)
- 22.0 ap364483 (Status: affected)
- 22.0 ap364532 (Status: affected)
- 22.0 ap364562 (Status: affected)
- 22.0 ap364582 (Status: affected)
- 22.0 ap364598 (Status: affected)
- 22.0 ap364611 (Status: affected)
- 22.0 ap364617 (Status: affected)
- 22.0 ap364621 (Status: affected)
- 22.0 ap364628 (Status: affected)
- 22.0 ap364634 (Status: affected)
- 22.0 ap364636 (Status: affected)
- 22.0 ap364705 (Status: affected)
- 22.0 ap364755 (Status: affected)
- 22.0 ap364825 (Status: affected)
- 22.0 ap365040 (Status: affected)
- 22.0 ap365044 (Status: affected)
- 22.0 ap365090 (Status: affected)
- 22.0 ap365186 (Status: affected)
- 22.0 ap365227 (Status: affected)
- 22.0 ap365257 (Status: affected)
- 22.0 ap365357 (Status: affected)
- 22.0 ap365530 (Status: affected)
- 22.0 ap365531 (Status: affected)
- 22.0 ap365598 (Status: affected)
- 22.0 ap365633 (Status: affected)
- 22.0 ap365639 (Status: affected)
- 22.0 ap365640 (Status: affected)
- 22.0 ap365646 (Status: affected)
- 22.0 ap365661 (Status: affected)
- 22.0 ap365689 (Status: affected)
- 22.0 ap365701 (Status: affected)
- 22.0 ap365770 (Status: affected)
- 22.0 ap365771 (Status: affected)
- 22.0 ap365798 (Status: affected)
- 22.0 ap365832 (Status: affected)
- 22.0 ap365900 (Status: affected)
- 22.0 ap365984 (Status: affected)
- 22.0 ap366013 (Status: affected)
- 22.0 ap366179 (Status: affected)
- 22.0 ap366264 (Status: affected)
- 22.0 ap366321 (Status: affected)
- 22.0 ap366334 (Status: affected)
- 22.0 ap366346 (Status: affected)
- 22.0 ap366366 (Status: affected)
- 22.0 ap366390 (Status: affected)
- 22.0 ap366661 (Status: affected)
- 22.0 ap366748 (Status: affected)
- 22.0 ap366834 (Status: affected)
- 22.0 ap366835 (Status: affected)
- 22.0 ap366836 (Status: affected)
- 22.0 ap366879 (Status: affected)
- 22.0 ap366905 (Status: affected)
- 22.0 ap366917 (Status: affected)
- 22.0 ap366940 (Status: affected)
- 22.0 ap366968 (Status: affected)
- 22.0 ap366982 (Status: affected)
- 22.0 ap366984 (Status: affected)
- 22.0 ap366986 (Status: affected)
- 22.0 ap366992 (Status: affected)
- 22.0 ap366997 (Status: affected)
- 22.0 ap367006 (Status: affected)
- 22.0 ap367222 (Status: affected)
- 22.0 ap367223 (Status: affected)
- 22.0 ap367233 (Status: affected)
- 22.0 ap367263 (Status: affected)
- 22.0 ap384120 (Status: affected)
- 22.0 ap367292 (Status: affected)
- 22.0 ap367307 (Status: affected)
- 22.0 ap367323 (Status: affected)
- 22.0 ap367324 (Status: affected)
- 22.0 ap367325 (Status: affected)
- 22.0 ap367335 (Status: affected)
- 22.0 ap367356 (Status: affected)
- 22.0 ap367413 (Status: affected)
- 22.0 ap367436 (Status: affected)
- 22.0 ap367451 (Status: affected)
- 22.0 ap367487 (Status: affected)
- 22.0 ap367488 (Status: affected)
- 22.0 ap367501 (Status: affected)
- 22.0 ap367547 (Status: affected)
- 22.0 ap367781 (Status: affected)
- 22.0 ap367810 (Status: affected)
- 22.0 ap367816 (Status: affected)
- 22.0 ap367857 (Status: affected)
- 22.0 ap367893 (Status: affected)
- 22.0 ap367895 (Status: affected)
- 22.0 ap367985 (Status: affected)
- 22.0 ap367991 (Status: affected)
- 22.0 ap367992 (Status: affected)
- 22.0 ap368000 (Status: affected)
- 22.0 ap368057 (Status: affected)
- 22.0 ap368073 (Status: affected)
- 22.0 ap368127 (Status: affected)
- 22.0 ap368163 (Status: affected)
- 22.0 ap368179 (Status: affected)
- 22.0 ap368196 (Status: affected)
- 22.0 ap368214 (Status: affected)
- 22.0 ap368350 (Status: affected)
- 22.0 ap368408 (Status: affected)
- 22.0 ap368437 (Status: affected)
- 22.0 ap368485 (Status: affected)
- 22.0 ap368517 (Status: affected)
- 22.0 ap368590 (Status: affected)
- 22.0 ap368605 (Status: affected)
- 22.0 ap368613 (Status: affected)
- 22.0 ap368643 (Status: affected)
- 22.0 ap368651 (Status: affected)
- 22.0 ap368725 (Status: affected)
- 22.0 ap368743 (Status: affected)
- 22.0 ap368854 (Status: affected)
- 22.0 ap368933 (Status: affected)
- 22.0 ap369012 (Status: affected)
- 22.0 ap369052 (Status: affected)
- 22.0 ap369078 (Status: affected)
- 22.0 ap369087 (Status: affected)
- 22.0 ap369127 (Status: affected)
- 22.0 ap369136 (Status: affected)
- 22.0 ap369179 (Status: affected)
- 22.0 ap369256 (Status: affected)
- 22.0 ap369300 (Status: affected)
- 22.0 ap369316 (Status: affected)
- 22.0 ap369469 (Status: affected)
- 22.0 ap369470 (Status: affected)
- 22.0 ap369472 (Status: affected)
- 22.0 ap369474 (Status: affected)
- 22.0 ap369476 (Status: affected)
- 22.0 ap369477 (Status: affected)
- 22.0 ap369479 (Status: affected)
- 22.0 ap369535 (Status: affected)
- 22.0 ap369595 (Status: affected)
- 22.0 ap369608 (Status: affected)
- 22.0 ap369619 (Status: affected)
- 22.0 ap369624 (Status: affected)
- 22.0 ap369680 (Status: affected)
- 22.0 ap369710 (Status: affected)
- 22.0 ap369716 (Status: affected)
- 22.0 ap369724 (Status: affected)
- 22.0 ap369730 (Status: affected)
- 22.0 ap369757 (Status: affected)
- 22.0 ap369763 (Status: affected)
- 22.0 ap369770 (Status: affected)
- 22.0 ap369775 (Status: affected)
- 22.0 ap369779 (Status: affected)
- 22.0 ap369784 (Status: affected)
- 22.0 ap369877 (Status: affected)
- 22.0 ap369878 (Status: affected)
- 22.0 ap369883 (Status: affected)
- 22.0 ap369884 (Status: affected)
- 22.0 ap369885 (Status: affected)
- 22.0 ap369902 (Status: affected)
- 22.0 ap369903 (Status: affected)
- 22.0 ap369928 (Status: affected)
- 22.0 ap370040 (Status: affected)
- 22.0 ap370085 (Status: affected)
- 22.0 ap370088 (Status: affected)
- 22.0 ap370093 (Status: affected)
- 22.0 ap370199 (Status: affected)
- 22.0 ap370246 (Status: affected)
- 22.0 ap370300 (Status: affected)
- 22.0 ap370307 (Status: affected)
- 22.0 ap370326 (Status: affected)
- 22.0 ap370328 (Status: affected)
- 22.0 ap370362 (Status: affected)
- 22.0 ap370383 (Status: affected)
- 22.0 ap370426 (Status: affected)
- 22.0 ap370442 (Status: affected)
- 22.0 ap370464 (Status: affected)
- 22.0 ap370479 (Status: affected)
- 22.0 ap370537 (Status: affected)
- 22.0 ap370539 (Status: affected)
- 22.0 ap370578 (Status: affected)
- 22.0 ap370603 (Status: affected)
- 22.0 ap370620 (Status: affected)
- 22.0 ap370662 (Status: affected)
- 22.0 ap370676 (Status: affected)
- 22.0 ap370707 (Status: affected)
- 22.0 ap370720 (Status: affected)
- 22.0 ap370735 (Status: affected)
- 22.0 ap370739 (Status: affected)
- 22.0 ap370763 (Status: affected)
- 22.0 ap370777 (Status: affected)
- 22.0 ap370786 (Status: affected)
- 22.0 ap370801 (Status: affected)
- 22.0 ap370907 (Status: affected)
- 22.0 ap370909 (Status: affected)
- 22.0 ap370918 (Status: affected)
- 22.0 ap370935 (Status: affected)
- 22.0 ap371021 (Status: affected)
- 22.0 ap371024 (Status: affected)
- 22.0 ap371052 (Status: affected)
- 22.0 ap371056 (Status: affected)
- 22.0 ap371091 (Status: affected)
- 22.0 ap371099 (Status: affected)
- 22.0 ap371151 (Status: affected)
- 22.0 ap371233 (Status: affected)
- 22.0 ap371246 (Status: affected)
- 22.0 ap371254 (Status: affected)
- 22.0 ap371258 (Status: affected)
- 22.0 ap371259 (Status: affected)
- 22.0 ap371261 (Status: affected)
- 22.0 ap371269 (Status: affected)
- 22.0 ap371291 (Status: affected)
- 22.0 ap371301 (Status: affected)
- 22.0 ap371310 (Status: affected)
- 22.0 ap371327 (Status: affected)
- 22.0 ap371368 (Status: affected)
- 22.0 ap371423 (Status: affected)
- 22.0 ap371459 (Status: affected)
- 22.0 ap371490 (Status: affected)
- 22.0 ap371500 (Status: affected)
- 22.0 ap371529 (Status: affected)
- 22.0 ap371539 (Status: affected)
- 22.0 ap371543 (Status: affected)
- 22.0 ap371557 (Status: affected)
- 22.0 ap371604 (Status: affected)
- 22.0 ap371605 (Status: affected)
- 22.0 ap371669 (Status: affected)
- 22.0 ap371733 (Status: affected)
- 22.0 ap371768 (Status: affected)
- 22.0 ap371772 (Status: affected)
- 22.0 ap371779 (Status: affected)
- 22.0 ap371793 (Status: affected)
- 22.0 ap371835 (Status: affected)
- 22.0 ap371886 (Status: affected)
- 22.0 ap371917 (Status: affected)
- 22.0 ap371922 (Status: affected)
- 22.0 ap371935 (Status: affected)
- 22.0 ap371945 (Status: affected)
- 22.0 ap371996 (Status: affected)
- 22.0 ap371998 (Status: affected)
- 22.0 ap372011 (Status: affected)
- 22.0 ap372068 (Status: affected)
- 22.0 ap372085 (Status: affected)
- 22.0 ap372115 (Status: affected)
- 22.0 ap372211 (Status: affected)
- 22.0 ap372286 (Status: affected)
- 22.0 ap372292 (Status: affected)
- 22.0 ap372397 (Status: affected)
- 22.0 ap372405 (Status: affected)
- 22.0 ap372432 (Status: affected)
- 22.0 ap372464 (Status: affected)
- 22.0 ap372475 (Status: affected)
- 22.0 ap372502 (Status: affected)
- 22.0 ap372505 (Status: affected)
- 22.0 ap372508 (Status: affected)
- 22.0 ap372510 (Status: affected)
- 22.0 ap372561 (Status: affected)
- 22.0 ap372574 (Status: affected)
- 22.0 ap372588 (Status: affected)
- 22.0 ap372617 (Status: affected)
- 22.0 ap372633 (Status: affected)
- 22.0 ap372655 (Status: affected)
- 22.0 ap372696 (Status: affected)
- 22.0 ap372821 (Status: affected)
- 22.0 ap372890 (Status: affected)
- 22.0 ap372910 (Status: affected)
- 22.0 ap372929 (Status: affected)
- 22.0 ap372942 (Status: affected)
- 22.0 ap372943 (Status: affected)
- 22.0 ap372989 (Status: affected)
- 22.0 ap373001 (Status: affected)
- 22.0 ap373009 (Status: affected)
- 22.0 ap373017 (Status: affected)
- 22.0 ap373097 (Status: affected)
- 22.0 ap373146 (Status: affected)
- 22.0 ap373173 (Status: affected)
- 22.0 ap373174 (Status: affected)
- 22.0 ap373180 (Status: affected)
- 22.0 ap373182 (Status: affected)
- 22.0 ap373197 (Status: affected)
- 22.0 ap373239 (Status: affected)
- 22.0 ap373256 (Status: affected)
- 22.0 ap373300 (Status: affected)
- 22.0 ap373330 (Status: affected)
- 22.0 ap373332 (Status: affected)
- 22.0 ap373336 (Status: affected)
- 22.0 ap373339 (Status: affected)
- 22.0 ap373340 (Status: affected)
- 22.0 ap373358 (Status: affected)
- 22.0 ap373392 (Status: affected)
- 22.0 ap373412 (Status: affected)
- 22.0 ap373480 (Status: affected)
- 22.0 ap373511 (Status: affected)
- 22.0 ap373521 (Status: affected)
- 22.0 ap373534 (Status: affected)
- 22.0 ap373565 (Status: affected)
- 22.0 ap373584 (Status: affected)
- 22.0 ap373589 (Status: affected)
- 22.0 ap373622 (Status: affected)
- 22.0 ap373649 (Status: affected)
- 22.0 ap373711 (Status: affected)
- 22.0 ap373717 (Status: affected)
- 22.0 ap373769 (Status: affected)
- 22.0 ap373783 (Status: affected)
- 22.0 ap373870 (Status: affected)
- 22.0 ap373872 (Status: affected)
- 22.0 ap373881 (Status: affected)
- 22.0 ap373914 (Status: affected)
- 22.0 ap373952 (Status: affected)
- 22.0 ap373958 (Status: affected)
- 22.0 ap374037 (Status: affected)
- 22.0 ap374055 (Status: affected)
- 22.0 ap374085 (Status: affected)
- 22.0 ap374109 (Status: affected)
- 22.0 ap374135 (Status: affected)
- 22.0 ap374144 (Status: affected)
- 22.0 ap374145 (Status: affected)
- 22.0 ap374162 (Status: affected)
- 22.0 ap374165 (Status: affected)
- 22.0 ap374211 (Status: affected)
- 22.0 ap374226 (Status: affected)
- 22.0 ap374249 (Status: affected)
- 22.0 ap374255 (Status: affected)
- 22.0 ap374270 (Status: affected)
- 22.0 ap374286 (Status: affected)
- 22.0 ap374294 (Status: affected)
- 22.0 ap374296 (Status: affected)
- 22.0 ap374305 (Status: affected)
- 22.0 ap374310 (Status: affected)
- 22.0 ap374311 (Status: affected)
- 22.0 ap374315 (Status: affected)
- 22.0 ap374361 (Status: affected)
- 22.0 ap374414 (Status: affected)
- 22.0 ap374421 (Status: affected)
- 22.0 ap374454 (Status: affected)
- 22.0 ap374472 (Status: affected)
- 22.0 ap374493 (Status: affected)
- 22.0 ap374498 (Status: affected)
- 22.0 ap374528 (Status: affected)
- 22.0 ap374530 (Status: affected)
- 22.0 ap374548 (Status: affected)
- 22.0 ap374583 (Status: affected)
- 22.0 ap374605 (Status: affected)
- 22.0 ap374609 (Status: affected)
- 22.0 ap374641 (Status: affected)
- 22.0 ap374643 (Status: affected)
- 22.0 ap374691 (Status: affected)
- 22.0 ap374695 (Status: affected)
- 22.0 ap374723 (Status: affected)
- 22.0 ap374785 (Status: affected)
- 22.0 ap374793 (Status: affected)
- 22.0 ap374794 (Status: affected)
- 22.0 ap374820 (Status: affected)
- 22.0 ap374832 (Status: affected)
- 22.0 ap374869 (Status: affected)
- 22.0 ap374892 (Status: affected)
- 22.0 ap374917 (Status: affected)
- 22.0 ap374935 (Status: affected)
- 22.0 ap374943 (Status: affected)
- 22.0 ap374956 (Status: affected)
- 22.0 ap375004 (Status: affected)
- 22.0 ap375021 (Status: affected)
- 22.0 ap375036 (Status: affected)
- 22.0 ap375039 (Status: affected)
- 22.0 ap375041 (Status: affected)
- 22.0 ap375205 (Status: affected)
- 22.0 ap375207 (Status: affected)
- 22.0 ap375210 (Status: affected)
- 22.0 ap375214 (Status: affected)
- 22.0 ap375240 (Status: affected)
- 22.0 ap375260 (Status: affected)
- 22.0 ap375270 (Status: affected)
- 22.0 ap375273 (Status: affected)
- 22.0 ap375289 (Status: affected)
- 22.0 ap375293 (Status: affected)
- 22.0 ap375317 (Status: affected)
- 22.0 ap375335 (Status: affected)
- 22.0 ap375342 (Status: affected)
- 22.0 ap375351 (Status: affected)
- 22.0 ap375353 (Status: affected)
- 22.0 ap375370 (Status: affected)
- 22.0 ap375398 (Status: affected)
- 22.0 ap375409 (Status: affected)
- 22.0 ap375412 (Status: affected)
- 22.0 ap375414 (Status: affected)
- 22.0 ap375421 (Status: affected)
- 22.0 ap375424 (Status: affected)
- 22.0 ap375425 (Status: affected)
- 22.0 ap375430 (Status: affected)
- 22.0 ap375432 (Status: affected)
- 22.0 ap375453 (Status: affected)
- 22.0 ap375469 (Status: affected)
- 22.0 ap375484 (Status: affected)
- 22.0 ap375488 (Status: affected)
- 22.0 ap375489 (Status: affected)
- 22.0 ap375514 (Status: affected)
- 22.0 ap375515 (Status: affected)
- 22.0 ap375518 (Status: affected)
- 22.0 ap375539 (Status: affected)
- 22.0 ap375603 (Status: affected)
- 22.0 ap375624 (Status: affected)
- 22.0 ap375650 (Status: affected)
- 22.0 ap375700 (Status: affected)
- 22.0 ap375711 (Status: affected)
- 22.0 ap375748 (Status: affected)
- 22.0 ap375756 (Status: affected)
- 22.0 ap375757 (Status: affected)
- 22.0 ap375785 (Status: affected)
- 22.0 ap375787 (Status: affected)
- 22.0 ap375804 (Status: affected)
- 22.0 ap375828 (Status: affected)
- 22.0 ap375849 (Status: affected)
- 22.0 ap375860 (Status: affected)
- 22.0 ap375902 (Status: affected)
- 22.0 ap375950 (Status: affected)
- 22.0 ap375959 (Status: affected)
- 22.0 ap375982 (Status: affected)
- 22.0 ap375989 (Status: affected)
- 22.0 ap375996 (Status: affected)
- 22.0 ap376012 (Status: affected)
- 22.0 ap376024 (Status: affected)
- 22.0 ap376042 (Status: affected)
- 22.0 ap376099 (Status: affected)
- 22.0 ap376156 (Status: affected)
- 22.0 ap376189 (Status: affected)
- 22.0 ap376205 (Status: affected)
- 22.0 ap376213 (Status: affected)
- 22.0 ap376220 (Status: affected)
- 22.0 ap376317 (Status: affected)
- 22.0 ap376373 (Status: affected)
- 22.0 ap376384 (Status: affected)
- 22.0 ap376387 (Status: affected)
- 22.0 ap376414 (Status: affected)
- 22.0 ap376445 (Status: affected)
- 22.0 ap376486 (Status: affected)
- 22.0 ap376512 (Status: affected)
- 22.0 ap376529 (Status: affected)
- 22.0 ap376594 (Status: affected)
- 22.0 ap376613 (Status: affected)
- 22.0 ap376622 (Status: affected)
- 22.0 ap376666 (Status: affected)
- 22.0 ap376696 (Status: affected)
- 22.0 ap376699 (Status: affected)
- 22.0 ap376704 (Status: affected)
- 22.0 ap376722 (Status: affected)
- 22.0 ap376736 (Status: affected)
- 22.0 ap376787 (Status: affected)
- 22.0 ap376798 (Status: affected)
- 22.0 ap376809 (Status: affected)
- 22.0 ap376818 (Status: affected)
- 22.0 ap376820 (Status: affected)
- 22.0 ap376878 (Status: affected)
- 22.0 ap376889 (Status: affected)
- 22.0 ap376934 (Status: affected)
- 22.0 ap376945 (Status: affected)
- 22.0 ap376956 (Status: affected)
- 22.0 ap376979 (Status: affected)
- 22.0 ap377033 (Status: affected)
- 22.0 ap377050 (Status: affected)
- 22.0 ap377091 (Status: affected)
- 22.0 ap377109 (Status: affected)
- 22.0 ap377120 (Status: affected)
- 22.0 ap377163 (Status: affected)
- 22.0 ap377175 (Status: affected)
- 22.0 ap377177 (Status: affected)
- 22.0 ap377229 (Status: affected)
- 22.0 ap377319 (Status: affected)
- 22.0 ap377423 (Status: affected)
- 22.0 ap377505 (Status: affected)
- 22.0 ap377517 (Status: affected)
- 22.0 ap377538 (Status: affected)
- 22.0 ap377555 (Status: affected)
- 22.0 ap377569 (Status: affected)
- 22.0 ap377630 (Status: affected)
- 22.0 ap377670 (Status: affected)
- 22.0 ap377687 (Status: affected)
- 22.0 ap377718 (Status: affected)
- 22.0 ap377723 (Status: affected)
- 22.0 ap377737 (Status: affected)
- 22.0 ap377751 (Status: affected)
- 22.0 ap377868 (Status: affected)
- 22.0 ap377878 (Status: affected)
- 22.0 ap377888 (Status: affected)
- 22.0 ap377966 (Status: affected)
- 22.0 ap377986 (Status: affected)
- 22.0 ap378014 (Status: affected)
- 22.0 ap378029 (Status: affected)
- 22.0 ap378047 (Status: affected)
- 22.0 ap378051 (Status: affected)
- 22.0 ap378070 (Status: affected)
- 22.0 ap378087 (Status: affected)
- 22.0 ap378122 (Status: affected)
- 22.0 ap378141 (Status: affected)
- 22.0 ap378142 (Status: affected)
- 22.0 ap378144 (Status: affected)
- 22.0 ap378154 (Status: affected)
- 22.0 ap378168 (Status: affected)
- 22.0 ap378178 (Status: affected)
- 22.0 ap378227 (Status: affected)
- 22.0 ap378234 (Status: affected)
- 22.0 ap378242 (Status: affected)
- 22.0 ap378248 (Status: affected)
- 22.0 ap378258 (Status: affected)
- 22.0 ap378372 (Status: affected)
- 22.0 ap378383 (Status: affected)
- 22.0 ap378390 (Status: affected)
- 22.0 ap378415 (Status: affected)
- 22.0 ap378481 (Status: affected)
- 22.0 ap378535 (Status: affected)
- 22.0 ap378553 (Status: affected)
- 22.0 ap378575 (Status: affected)
- 22.0 ap378595 (Status: affected)
- 22.0 ap378818 (Status: affected)
- 22.0 ap378827 (Status: affected)
- 22.0 ap378886 (Status: affected)
- 22.0 ap378902 (Status: affected)
- 22.0 ap378913 (Status: affected)
- 22.0 ap378920 (Status: affected)
- 22.0 ap378952 (Status: affected)
- 22.0 ap378985 (Status: affected)
- 22.0 ap378991 (Status: affected)
- 22.0 ap378995 (Status: affected)
- 22.0 ap379091 (Status: affected)
- 22.0 ap379105 (Status: affected)
- 22.0 ap379112 (Status: affected)
- 22.0 ap379140 (Status: affected)
- 22.0 ap379152 (Status: affected)
- 22.0 ap379168 (Status: affected)
- 22.0 ap379187 (Status: affected)
- 22.0 ap379190 (Status: affected)
- 22.0 ap379327 (Status: affected)
- 22.0 ap379339 (Status: affected)
- 22.0 ap379346 (Status: affected)
- 22.0 ap379373 (Status: affected)
- 22.0 ap379390 (Status: affected)
- 22.0 ap379391 (Status: affected)
- 22.0 ap379411 (Status: affected)
- 22.0 ap379423 (Status: affected)
- 22.0 ap379449 (Status: affected)
- 22.0 ap379501 (Status: affected)
- 22.0 ap379511 (Status: affected)
- 22.0 ap379532 (Status: affected)
- 22.0 ap379533 (Status: affected)
- 22.0 ap379535 (Status: affected)
- 22.0 ap379600 (Status: affected)
- 22.0 ap379616 (Status: affected)
- 22.0 ap379627 (Status: affected)
- 22.0 ap379635 (Status: affected)
- 22.0 ap379781 (Status: affected)
- 22.0 ap379830 (Status: affected)
- 22.0 ap379855 (Status: affected)
- 22.0 ap379903 (Status: affected)
- 22.0 ap379921 (Status: affected)
- 22.0 ap379925 (Status: affected)
- 22.0 ap379957 (Status: affected)
- 22.0 ap379963 (Status: affected)
- 22.0 ap380109 (Status: affected)
- 22.0 ap380249 (Status: affected)
- 22.0 ap380256 (Status: affected)
- 22.0 ap380264 (Status: affected)
- 22.0 ap380282 (Status: affected)
- 22.0 ap380355 (Status: affected)
- 22.0 ap380375 (Status: affected)
- 22.0 ap380465 (Status: affected)
- 22.0 ap380581 (Status: affected)
- 22.0 ap380608 (Status: affected)
- 22.0 ap380692 (Status: affected)
- 22.0 ap380758 (Status: affected)
- 22.0 ap380762 (Status: affected)
- 22.0 ap380766 (Status: affected)
- 22.0 ap380772 (Status: affected)
- 22.0 ap380775 (Status: affected)
- 22.0 ap380782 (Status: affected)
- 22.0 ap380802 (Status: affected)
- 22.0 ap380840 (Status: affected)
- 22.0 ap380939 (Status: affected)
- 22.0 ap381051 (Status: affected)
- 22.0 ap381078 (Status: affected)
- 22.0 ap381081 (Status: affected)
- 22.0 ap381108 (Status: affected)
- 22.0 ap381247 (Status: affected)
- 22.0 ap381269 (Status: affected)
- 22.0 ap381292 (Status: affected)
- 22.0 ap381300 (Status: affected)
- 22.0 ap381334 (Status: affected)
- 22.0 ap381339 (Status: affected)
- 22.0 ap381358 (Status: affected)
- 22.0 ap381385 (Status: affected)
- 22.0 ap381398 (Status: affected)
- 22.0 ap381543 (Status: affected)
- 22.0 ap381570 (Status: affected)
- 22.0 ap381575 (Status: affected)
- 22.0 ap381596 (Status: affected)
- 22.0 ap381600 (Status: affected)
- 22.0 ap381611 (Status: affected)
- 22.0 ap381616 (Status: affected)
- 22.0 ap381621 (Status: affected)
- 22.0 ap381623 (Status: affected)
- 22.0 ap381624 (Status: affected)
- 22.0 ap381657 (Status: affected)
- 22.0 ap381734 (Status: affected)
- 22.0 ap381775 (Status: affected)
- 22.0 ap381809 (Status: affected)
- 22.0 ap381825 (Status: affected)
- 22.0 ap381878 (Status: affected)
- 22.0 ap382231 (Status: affected)
- 22.0 ap382412 (Status: affected)
- 22.0 ap382441 (Status: affected)
- 22.0 ap382691 (Status: affected)
- 22.0 ap382692 (Status: affected)
- 22.0 ap382836 (Status: affected)
- 22.0 ap382869 (Status: affected)
- 22.0 ap382873 (Status: affected)
- 22.0 ap382894 (Status: affected)
- 22.0 ap382929 (Status: affected)
- 22.0 ap382935 (Status: affected)
- 22.0 ap382965 (Status: affected)
- 22.0 ap382969 (Status: affected)
- 22.0 ap382994 (Status: affected)
- 22.0 ap383105 (Status: affected)
- 22.0 ap383126 (Status: affected)
- 22.0 ap383147 (Status: affected)
- 22.0 ap383178 (Status: affected)
- 22.0 ap383188 (Status: affected)
- 22.0 ap383331 (Status: affected)
- 22.0 ap383682 (Status: affected)
- 21.sp1 (Status: affected)
- 21.sp1 ap379554 (Status: affected)
- 21.sp1 ap359433 (Status: affected)
- 21.sp1 ap350491 (Status: affected)
- 21.sp1 ap351294 (Status: affected)
- 21.sp1 ap351704 (Status: affected)
- 21.sp1 ap352726 (Status: affected)
- 21.sp1 ap349996 (Status: affected)
- 21.sp1 ap350763 (Status: affected)
- 21.sp1 ap356747 (Status: affected)
- 21.sp1 ap349210 (Status: affected)
- 21.sp1 ap346622 (Status: affected)
- 21.sp1 ap350110 (Status: affected)
- 21.sp1 ap350420 (Status: affected)
- 21.sp1 ap351795 (Status: affected)
- 21.sp1 ap359119 (Status: affected)
- 21.sp1 ap348753 (Status: affected)
- 21.sp1 ap350338 (Status: affected)
- 21.sp1 ap350204 (Status: affected)
- 21.sp1 ap346386 (Status: affected)
- 21.sp1 ap351961 (Status: affected)
- 21.sp1 ap357571 (Status: affected)
- 21.sp1 ap352109 (Status: affected)
- 21.sp1 ap350308 (Status: affected)
- 21.sp1 ap351160 (Status: affected)
- 21.sp1 ap371921 (Status: affected)
- 21.sp1 ap363301 (Status: affected)
- 21.sp1 ap348143 (Status: affected)
- 21.sp1 ap351216 (Status: affected)
- 21.sp1 ap361590 (Status: affected)
- 21.sp1 ap361308 (Status: affected)
- 21.sp1 ap370196 (Status: affected)
- 21.sp1 ap366880 (Status: affected)
- 21.sp1 ap369219 (Status: affected)
- 21.sp1 ap353354 (Status: affected)
- 21.sp1 ap350379 (Status: affected)
- 21.sp1 ap339376 (Status: affected)
- 21.sp1 ap345633 (Status: affected)
- 21.sp1 ap372454 (Status: affected)
- 21.sp1 ap343495 (Status: affected)
- 21.sp1 ap344020 (Status: affected)
- 21.sp1 ap370636 (Status: affected)
- 21.sp1 ap358132 (Status: affected)
- 21.sp1 ap343579 (Status: affected)
- 21.sp1 ap343675 (Status: affected)
- 21.sp1 ap355717 (Status: affected)
- 21.sp1 ap355107 (Status: affected)
- 21.sp1 ap344422 (Status: affected)
- 21.sp1 ap355581 (Status: affected)
- 21.sp1 ap354785 (Status: affected)
- 21.sp1 ap349872 (Status: affected)
- 21.sp1 ap375465 (Status: affected)
- 21.sp1 ap353842 (Status: affected)
- 21.sp1 ap347603 (Status: affected)
- 21.sp1 ap345013 (Status: affected)
- 21.sp1 ap367109 (Status: affected)
- 21.sp1 ap344752 (Status: affected)
- 21.sp1 ap346074 (Status: affected)
- 21.sp1 ap346379 (Status: affected)
- 21.sp1 ap366486 (Status: affected)
- 21.sp1 ap345261 (Status: affected)
- 21.sp1 ap339781 (Status: affected)
- 21.sp1 ap366298 (Status: affected)
- 21.sp1 ap373102 (Status: affected)
- 21.sp1 ap367732 (Status: affected)
- 21.sp1 ap366370 (Status: affected)
- 21.sp1 ap215990 (Status: affected)
- 21.sp1 ap233247 (Status: affected)
- 21.sp1 ap233913 (Status: affected)
- 21.sp1 ap235252 (Status: affected)
- 21.sp1 ap235960 (Status: affected)
- 21.sp1 ap242300 (Status: affected)
- 21.sp1 ap243808 (Status: affected)
- 21.sp1 ap244020 (Status: affected)
- 21.sp1 ap244265 (Status: affected)
- 21.sp1 ap244609 (Status: affected)
- 21.sp1 ap245148 (Status: affected)
- 21.sp1 ap245441 (Status: affected)
- 21.sp1 ap245468 (Status: affected)
- 21.sp1 ap246656 (Status: affected)
- 21.sp1 ap247533 (Status: affected)
- 21.sp1 ap338833 (Status: affected)
- 21.sp1 ap338964 (Status: affected)
- 21.sp1 ap338965 (Status: affected)
- 21.sp1 ap338972 (Status: affected)
- 21.sp1 ap338988 (Status: affected)
- 21.sp1 ap339196 (Status: affected)
- 21.sp1 ap339200 (Status: affected)
- 21.sp1 ap339206 (Status: affected)
- 21.sp1 ap339209 (Status: affected)
- 21.sp1 ap339236 (Status: affected)
- 21.sp1 ap339342 (Status: affected)
- 21.sp1 ap339346 (Status: affected)
- 21.sp1 ap339351 (Status: affected)
- 21.sp1 ap339395 (Status: affected)
- 21.sp1 ap339477 (Status: affected)
- 21.sp1 ap339538 (Status: affected)
- 21.sp1 ap339552 (Status: affected)
- 21.sp1 ap339568 (Status: affected)
- 21.sp1 ap339658 (Status: affected)
- 21.sp1 ap339897 (Status: affected)
- 21.sp1 ap340054 (Status: affected)
- 21.sp1 ap340168 (Status: affected)
- 21.sp1 ap341350 (Status: affected)
- 21.sp1 ap341471 (Status: affected)
- 21.sp1 ap341498 (Status: affected)
- 21.sp1 ap341577 (Status: affected)
- 21.sp1 ap341645 (Status: affected)
- 21.sp1 ap341663 (Status: affected)
- 21.sp1 ap341897 (Status: affected)
- 21.sp1 ap341939 (Status: affected)
- 21.sp1 ap342028 (Status: affected)
- 21.sp1 ap342127 (Status: affected)
- 21.sp1 ap342145 (Status: affected)
- 21.sp1 ap342175 (Status: affected)
- 21.sp1 ap342217 (Status: affected)
- 21.sp1 ap342284 (Status: affected)
- 21.sp1 ap342324 (Status: affected)
- 21.sp1 ap342461 (Status: affected)
- 21.sp1 ap342474 (Status: affected)
- 21.sp1 ap342483 (Status: affected)
- 21.sp1 ap342543 (Status: affected)
- 21.sp1 ap342548 (Status: affected)
- 21.sp1 ap342588 (Status: affected)
- 21.sp1 ap342625 (Status: affected)
- 21.sp1 ap342669 (Status: affected)
- 21.sp1 ap342696 (Status: affected)
- 21.sp1 ap342719 (Status: affected)
- 21.sp1 ap342755 (Status: affected)
- 21.sp1 ap342771 (Status: affected)
- 21.sp1 ap342782 (Status: affected)
- 21.sp1 ap342792 (Status: affected)
- 21.sp1 ap342836 (Status: affected)
- 21.sp1 ap342853 (Status: affected)
- 21.sp1 ap342946 (Status: affected)
- 21.sp1 ap342975 (Status: affected)
- 21.sp1 ap343017 (Status: affected)
- 21.sp1 ap343229 (Status: affected)
- 21.sp1 ap343351 (Status: affected)
- 21.sp1 ap343352 (Status: affected)
- 21.sp1 ap343410 (Status: affected)
- 21.sp1 ap343445 (Status: affected)
- 21.sp1 ap343616 (Status: affected)
- 21.sp1 ap343877 (Status: affected)
- 21.sp1 ap343883 (Status: affected)
- 21.sp1 ap343999 (Status: affected)
- 21.sp1 ap344043 (Status: affected)
- 21.sp1 ap344052 (Status: affected)
- 21.sp1 ap344083 (Status: affected)
- 21.sp1 ap344094 (Status: affected)
- 21.sp1 ap344100 (Status: affected)
- 21.sp1 ap344238 (Status: affected)
- 21.sp1 ap344253 (Status: affected)
- 21.sp1 ap344270 (Status: affected)
- 21.sp1 ap344290 (Status: affected)
- 21.sp1 ap344479 (Status: affected)
- 21.sp1 ap344485 (Status: affected)
- 21.sp1 ap344600 (Status: affected)
- 21.sp1 ap344681 (Status: affected)
- 21.sp1 ap344945 (Status: affected)
- 21.sp1 ap344952 (Status: affected)
- 21.sp1 ap344954 (Status: affected)
- 21.sp1 ap344964 (Status: affected)
- 21.sp1 ap345054 (Status: affected)
- 21.sp1 ap345059 (Status: affected)
- 21.sp1 ap345069 (Status: affected)
- 21.sp1 ap345246 (Status: affected)
- 21.sp1 ap345293 (Status: affected)
- 21.sp1 ap345452 (Status: affected)
- 21.sp1 ap345456 (Status: affected)
- 21.sp1 ap345490 (Status: affected)
- 21.sp1 ap345627 (Status: affected)
- 21.sp1 ap345729 (Status: affected)
- 21.sp1 ap345732 (Status: affected)
- 21.sp1 ap345738 (Status: affected)
- 21.sp1 ap345755 (Status: affected)
- 21.sp1 ap345850 (Status: affected)
- 21.sp1 ap345873 (Status: affected)
- 21.sp1 ap346064 (Status: affected)
- 21.sp1 ap346076 (Status: affected)
- 21.sp1 ap346128 (Status: affected)
- 21.sp1 ap346129 (Status: affected)
- 21.sp1 ap346183 (Status: affected)
- 21.sp1 ap346233 (Status: affected)
- 21.sp1 ap346253 (Status: affected)
- 21.sp1 ap346261 (Status: affected)
- 21.sp1 ap346307 (Status: affected)
- 21.sp1 ap346337 (Status: affected)
- 21.sp1 ap346347 (Status: affected)
- 21.sp1 ap346376 (Status: affected)
- 21.sp1 ap346554 (Status: affected)
- 21.sp1 ap346559 (Status: affected)
- 21.sp1 ap346562 (Status: affected)
- 21.sp1 ap346577 (Status: affected)
- 21.sp1 ap346607 (Status: affected)
- 21.sp1 ap346632 (Status: affected)
- 21.sp1 ap346639 (Status: affected)
- 21.sp1 ap346646 (Status: affected)
- 21.sp1 ap346724 (Status: affected)
- 21.sp1 ap346900 (Status: affected)
- 21.sp1 ap346902 (Status: affected)
- 21.sp1 ap347016 (Status: affected)
- 21.sp1 ap347158 (Status: affected)
- 21.sp1 ap347172 (Status: affected)
- 21.sp1 ap347246 (Status: affected)
- 21.sp1 ap347302 (Status: affected)
- 21.sp1 ap347506 (Status: affected)
- 21.sp1 ap347534 (Status: affected)
- 21.sp1 ap347548 (Status: affected)
- 21.sp1 ap347562 (Status: affected)
- 21.sp1 ap347640 (Status: affected)
- 21.sp1 ap347741 (Status: affected)
- 21.sp1 ap347896 (Status: affected)
- 21.sp1 ap347905 (Status: affected)
- 21.sp1 ap347930 (Status: affected)
- 21.sp1 ap347959 (Status: affected)
- 21.sp1 ap347975 (Status: affected)
- 21.sp1 ap348037 (Status: affected)
- 21.sp1 ap348078 (Status: affected)
- 21.sp1 ap348093 (Status: affected)
- 21.sp1 ap348100 (Status: affected)
- 21.sp1 ap348104 (Status: affected)
- 21.sp1 ap348107 (Status: affected)
- 21.sp1 ap348156 (Status: affected)
- 21.sp1 ap348431 (Status: affected)
- 21.sp1 ap348462 (Status: affected)
- 21.sp1 ap348472 (Status: affected)
- 21.sp1 ap348527 (Status: affected)
- 21.sp1 ap348531 (Status: affected)
- 21.sp1 ap348564 (Status: affected)
- 21.sp1 ap348740 (Status: affected)
- 21.sp1 ap348878 (Status: affected)
- 21.sp1 ap348891 (Status: affected)
- 21.sp1 ap348945 (Status: affected)
- 21.sp1 ap348952 (Status: affected)
- 21.sp1 ap349011 (Status: affected)
- 21.sp1 ap349023 (Status: affected)
- 21.sp1 ap349056 (Status: affected)
- 21.sp1 ap349066 (Status: affected)
- 21.sp1 ap349206 (Status: affected)
- 21.sp1 ap349222 (Status: affected)
- 21.sp1 ap349390 (Status: affected)
- 21.sp1 ap349443 (Status: affected)
- 21.sp1 ap349589 (Status: affected)
- 21.sp1 ap349617 (Status: affected)
- 21.sp1 ap349631 (Status: affected)
- 21.sp1 ap349642 (Status: affected)
- 21.sp1 ap349699 (Status: affected)
- 21.sp1 ap349703 (Status: affected)
- 21.sp1 ap349724 (Status: affected)
- 21.sp1 ap349850 (Status: affected)
- 21.sp1 ap349863 (Status: affected)
- 21.sp1 ap349864 (Status: affected)
- 21.sp1 ap349867 (Status: affected)
- 21.sp1 ap350050 (Status: affected)
- 21.sp1 ap350090 (Status: affected)
- 21.sp1 ap350111 (Status: affected)
- 21.sp1 ap350141 (Status: affected)
- 21.sp1 ap350143 (Status: affected)
- 21.sp1 ap350179 (Status: affected)
- 21.sp1 ap350189 (Status: affected)
- 21.sp1 ap350303 (Status: affected)
- 21.sp1 ap350456 (Status: affected)
- 21.sp1 ap350465 (Status: affected)
- 21.sp1 ap350474 (Status: affected)
- 21.sp1 ap350497 (Status: affected)
- 21.sp1 ap350573 (Status: affected)
- 21.sp1 ap350591 (Status: affected)
- 21.sp1 ap350832 (Status: affected)
- 21.sp1 ap350859 (Status: affected)
- 21.sp1 ap350884 (Status: affected)
- 21.sp1 ap351014 (Status: affected)
- 21.sp1 ap351248 (Status: affected)
- 21.sp1 ap351263 (Status: affected)
- 21.sp1 ap351295 (Status: affected)
- 21.sp1 ap351487 (Status: affected)
- 21.sp1 ap351495 (Status: affected)
- 21.sp1 ap351530 (Status: affected)
- 21.sp1 ap351644 (Status: affected)
- 21.sp1 ap351700 (Status: affected)
- 21.sp1 ap351701 (Status: affected)
- 21.sp1 ap351721 (Status: affected)
- 21.sp1 ap351754 (Status: affected)
- 21.sp1 ap351835 (Status: affected)
- 21.sp1 ap351894 (Status: affected)
- 21.sp1 ap351898 (Status: affected)
- 21.sp1 ap351934 (Status: affected)
- 21.sp1 ap351988 (Status: affected)
- 21.sp1 ap352082 (Status: affected)
- 21.sp1 ap352087 (Status: affected)
- 21.sp1 ap352205 (Status: affected)
- 21.sp1 ap352340 (Status: affected)
- 21.sp1 ap352372 (Status: affected)
- 21.sp1 ap352402 (Status: affected)
- 21.sp1 ap352421 (Status: affected)
- 21.sp1 ap352515 (Status: affected)
- 21.sp1 ap352766 (Status: affected)
- 21.sp1 ap352795 (Status: affected)
- 21.sp1 ap352896 (Status: affected)
- 21.sp1 ap352969 (Status: affected)
- 21.sp1 ap352972 (Status: affected)
- 21.sp1 ap353403 (Status: affected)
- 21.sp1 ap353406 (Status: affected)
- 21.sp1 ap353418 (Status: affected)
- 21.sp1 ap353464 (Status: affected)
- 21.sp1 ap353520 (Status: affected)
- 21.sp1 ap353549 (Status: affected)
- 21.sp1 ap353701 (Status: affected)
- 21.sp1 ap353839 (Status: affected)
- 21.sp1 ap353841 (Status: affected)
- 21.sp1 ap353843 (Status: affected)
- 21.sp1 ap354050 (Status: affected)
- 21.sp1 ap354052 (Status: affected)
- 21.sp1 ap354069 (Status: affected)
- 21.sp1 ap354090 (Status: affected)
- 21.sp1 ap354098 (Status: affected)
- 21.sp1 ap354180 (Status: affected)
- 21.sp1 ap354331 (Status: affected)
- 21.sp1 ap354355 (Status: affected)
- 21.sp1 ap354413 (Status: affected)
- 21.sp1 ap354454 (Status: affected)
- 21.sp1 ap354469 (Status: affected)
- 21.sp1 ap354474 (Status: affected)
- 21.sp1 ap354494 (Status: affected)
- 21.sp1 ap354531 (Status: affected)
- 21.sp1 ap354559 (Status: affected)
- 21.sp1 ap354646 (Status: affected)
- 21.sp1 ap354707 (Status: affected)
- 21.sp1 ap354789 (Status: affected)
- 21.sp1 ap354793 (Status: affected)
- 21.sp1 ap354918 (Status: affected)
- 21.sp1 ap354927 (Status: affected)
- 21.sp1 ap354936 (Status: affected)
- 21.sp1 ap354964 (Status: affected)
- 21.sp1 ap355000 (Status: affected)
- 21.sp1 ap355003 (Status: affected)
- 21.sp1 ap355027 (Status: affected)
- 21.sp1 ap355091 (Status: affected)
- 21.sp1 ap355095 (Status: affected)
- 21.sp1 ap355385 (Status: affected)
- 21.sp1 ap355616 (Status: affected)
- 21.sp1 ap355774 (Status: affected)
- 21.sp1 ap355855 (Status: affected)
- 21.sp1 ap355875 (Status: affected)
- 21.sp1 ap355894 (Status: affected)
- 21.sp1 ap355904 (Status: affected)
- 21.sp1 ap355912 (Status: affected)
- 21.sp1 ap355914 (Status: affected)
- 21.sp1 ap356145 (Status: affected)
- 21.sp1 ap356164 (Status: affected)
- 21.sp1 ap356231 (Status: affected)
- 21.sp1 ap356271 (Status: affected)
- 21.sp1 ap356317 (Status: affected)
- 21.sp1 ap356328 (Status: affected)
- 21.sp1 ap356375 (Status: affected)
- 21.sp1 ap356458 (Status: affected)
- 21.sp1 ap356474 (Status: affected)
- 21.sp1 ap356589 (Status: affected)
- 21.sp1 ap356787 (Status: affected)
- 21.sp1 ap356803 (Status: affected)
- 21.sp1 ap356817 (Status: affected)
- 21.sp1 ap356978 (Status: affected)
- 21.sp1 ap357047 (Status: affected)
- 21.sp1 ap357049 (Status: affected)
- 21.sp1 ap357083 (Status: affected)
- 21.sp1 ap357395 (Status: affected)
- 21.sp1 ap357574 (Status: affected)
- 21.sp1 ap357607 (Status: affected)
- 21.sp1 ap357653 (Status: affected)
- 21.sp1 ap357670 (Status: affected)
- 21.sp1 ap357718 (Status: affected)
- 21.sp1 ap357768 (Status: affected)
- 21.sp1 ap357769 (Status: affected)
- 21.sp1 ap357775 (Status: affected)
- 21.sp1 ap358034 (Status: affected)
- 21.sp1 ap358101 (Status: affected)
- 21.sp1 ap358234 (Status: affected)
- 21.sp1 ap358345 (Status: affected)
- 21.sp1 ap358399 (Status: affected)
- 21.sp1 ap358411 (Status: affected)
- 21.sp1 ap358469 (Status: affected)
- 21.sp1 ap358508 (Status: affected)
- 21.sp1 ap358563 (Status: affected)
- 21.sp1 ap358578 (Status: affected)
- 21.sp1 ap358582 (Status: affected)
- 21.sp1 ap358726 (Status: affected)
- 21.sp1 ap358730 (Status: affected)
- 21.sp1 ap358731 (Status: affected)
- 21.sp1 ap358887 (Status: affected)
- 21.sp1 ap358889 (Status: affected)
- 21.sp1 ap358893 (Status: affected)
- 21.sp1 ap358907 (Status: affected)
- 21.sp1 ap358942 (Status: affected)
- 21.sp1 ap358971 (Status: affected)
- 21.sp1 ap359023 (Status: affected)
- 21.sp1 ap359030 (Status: affected)
- 21.sp1 ap359076 (Status: affected)
- 21.sp1 ap359085 (Status: affected)
- 21.sp1 ap359112 (Status: affected)
- 21.sp1 ap359145 (Status: affected)
- 21.sp1 ap359172 (Status: affected)
- 21.sp1 ap359227 (Status: affected)
- 21.sp1 ap359465 (Status: affected)
- 21.sp1 ap359470 (Status: affected)
- 21.sp1 ap359536 (Status: affected)
- 21.sp1 ap359589 (Status: affected)
- 21.sp1 ap359644 (Status: affected)
- 21.sp1 ap359685 (Status: affected)
- 21.sp1 ap359729 (Status: affected)
- 21.sp1 ap359752 (Status: affected)
- 21.sp1 ap359764 (Status: affected)
- 21.sp1 ap359808 (Status: affected)
- 21.sp1 ap359829 (Status: affected)
- 21.sp1 ap359911 (Status: affected)
- 21.sp1 ap359956 (Status: affected)
- 21.sp1 ap359974 (Status: affected)
- 21.sp1 ap360211 (Status: affected)
- 21.sp1 ap360259 (Status: affected)
- 21.sp1 ap360265 (Status: affected)
- 21.sp1 ap360295 (Status: affected)
- 21.sp1 ap360306 (Status: affected)
- 21.sp1 ap360325 (Status: affected)
- 21.sp1 ap360373 (Status: affected)
- 21.sp1 ap360459 (Status: affected)
- 21.sp1 ap360586 (Status: affected)
- 21.sp1 ap360600 (Status: affected)
- 21.sp1 ap360771 (Status: affected)
- 21.sp1 ap360893 (Status: affected)
- 21.sp1 ap360907 (Status: affected)
- 21.sp1 ap360912 (Status: affected)
- 21.sp1 ap360931 (Status: affected)
- 21.sp1 ap360966 (Status: affected)
- 21.sp1 ap360993 (Status: affected)
- 21.sp1 ap361055 (Status: affected)
- 21.sp1 ap361122 (Status: affected)
- 21.sp1 ap361153 (Status: affected)
- 21.sp1 ap361338 (Status: affected)
- 21.sp1 ap361412 (Status: affected)
- 21.sp1 ap361420 (Status: affected)
- 21.sp1 ap361520 (Status: affected)
- 21.sp1 ap361533 (Status: affected)
- 21.sp1 ap361559 (Status: affected)
- 21.sp1 ap361560 (Status: affected)
- 21.sp1 ap361579 (Status: affected)
- 21.sp1 ap361641 (Status: affected)
- 21.sp1 ap361820 (Status: affected)
- 21.sp1 ap361821 (Status: affected)
- 21.sp1 ap361854 (Status: affected)
- 21.sp1 ap361883 (Status: affected)
- 21.sp1 ap361945 (Status: affected)
- 21.sp1 ap362163 (Status: affected)
- 21.sp1 ap362298 (Status: affected)
- 21.sp1 ap362317 (Status: affected)
- 21.sp1 ap362532 (Status: affected)
- 21.sp1 ap362553 (Status: affected)
- 21.sp1 ap362593 (Status: affected)
- 21.sp1 ap362637 (Status: affected)
- 21.sp1 ap362825 (Status: affected)
- 21.sp1 ap362848 (Status: affected)
- 21.sp1 ap362961 (Status: affected)
- 21.sp1 ap363001 (Status: affected)
- 21.sp1 ap363128 (Status: affected)
- 21.sp1 ap363146 (Status: affected)
- 21.sp1 ap363218 (Status: affected)
- 21.sp1 ap363228 (Status: affected)
- 21.sp1 ap363265 (Status: affected)
- 21.sp1 ap363363 (Status: affected)
- 21.sp1 ap363560 (Status: affected)
- 21.sp1 ap363584 (Status: affected)
- 21.sp1 ap363695 (Status: affected)
- 21.sp1 ap363705 (Status: affected)
- 21.sp1 ap363729 (Status: affected)
- 21.sp1 ap363846 (Status: affected)
- 21.sp1 ap364003 (Status: affected)
- 21.sp1 ap364004 (Status: affected)
- 21.sp1 ap364062 (Status: affected)
- 21.sp1 ap364239 (Status: affected)
- 21.sp1 ap364243 (Status: affected)
- 21.sp1 ap364256 (Status: affected)
- 21.sp1 ap364304 (Status: affected)
- 21.sp1 ap364358 (Status: affected)
- 21.sp1 ap364369 (Status: affected)
- 21.sp1 ap364384 (Status: affected)
- 21.sp1 ap364471 (Status: affected)
- 21.sp1 ap364473 (Status: affected)
- 21.sp1 ap364559 (Status: affected)
- 21.sp1 ap364568 (Status: affected)
- 21.sp1 ap364670 (Status: affected)
- 21.sp1 ap364879 (Status: affected)
- 21.sp1 ap364898 (Status: affected)
- 21.sp1 ap365167 (Status: affected)
- 21.sp1 ap365170 (Status: affected)
- 21.sp1 ap365379 (Status: affected)
- 21.sp1 ap365390 (Status: affected)
- 21.sp1 ap365449 (Status: affected)
- 21.sp1 ap365556 (Status: affected)
- 21.sp1 ap365584 (Status: affected)
- 21.sp1 ap365597 (Status: affected)
- 21.sp1 ap365632 (Status: affected)
- 21.sp1 ap365633 (Status: affected)
- 21.sp1 ap365662 (Status: affected)
- 21.sp1 ap365730 (Status: affected)
- 21.sp1 ap365798 (Status: affected)
- 21.sp1 ap365889 (Status: affected)
- 21.sp1 ap365970 (Status: affected)
- 21.sp1 ap366118 (Status: affected)
- 21.sp1 ap366211 (Status: affected)
- 21.sp1 ap366268 (Status: affected)
- 21.sp1 ap366290 (Status: affected)
- 21.sp1 ap366295 (Status: affected)
- 21.sp1 ap366348 (Status: affected)
- 21.sp1 ap366373 (Status: affected)
- 21.sp1 ap366744 (Status: affected)
- 21.sp1 ap366747 (Status: affected)
- 21.sp1 ap366803 (Status: affected)
- 21.sp1 ap367340 (Status: affected)
- 21.sp1 ap367461 (Status: affected)
- 21.sp1 ap367524 (Status: affected)
- 21.sp1 ap367782 (Status: affected)
- 21.sp1 ap367794 (Status: affected)
- 21.sp1 ap367998 (Status: affected)
- 21.sp1 ap368399 (Status: affected)
- 21.sp1 ap368497 (Status: affected)
- 21.sp1 ap368604 (Status: affected)
- 21.sp1 ap369132 (Status: affected)
- 21.sp1 ap369173 (Status: affected)
- 21.sp1 ap369206 (Status: affected)
- 21.sp1 ap369434 (Status: affected)
- 21.sp1 ap370388 (Status: affected)
- 21.sp1 ap370620 (Status: affected)
- 21.sp1 ap370654 (Status: affected)
- 21.sp1 ap370801 (Status: affected)
- 21.sp1 ap372043 (Status: affected)
- 21.sp1 ap372337 (Status: affected)
- 21.sp1 ap372351 (Status: affected)
- 21.sp1 ap372842 (Status: affected)
- 21.sp1 ap373015 (Status: affected)
- 21.sp1 ap373276 (Status: affected)
- 21.sp1 ap373349 (Status: affected)
- 21.sp1 ap373777 (Status: affected)
- 21.sp1 ap373813 (Status: affected)
- 21.sp1 ap373814 (Status: affected)
- 21.sp1 ap373899 (Status: affected)
- 21.sp1 ap373914 (Status: affected)
- 21.sp1 ap373950 (Status: affected)
- 21.sp1 ap374144 (Status: affected)
- 21.sp1 ap374145 (Status: affected)
- 21.sp1 ap374265 (Status: affected)
- 21.sp1 ap374557 (Status: affected)
- 21.sp1 ap374822 (Status: affected)
- 21.sp1 ap375026 (Status: affected)
- 21.sp1 ap375036 (Status: affected)
- 21.sp1 ap375053 (Status: affected)
- 21.sp1 ap375061 (Status: affected)
- 21.sp1 ap375355 (Status: affected)
- 21.sp1 ap375674 (Status: affected)
- 21.sp1 ap375931 (Status: affected)
- 21.sp1 ap378258 (Status: affected)
- 21.sp1 ap378970 (Status: affected)
- 21.sp1 ap379387 (Status: affected)
- 21.sp1 ap379440 (Status: affected)
- 21.sp1 ap379473 (Status: affected)
- 21.sp1 ap379847 (Status: affected)
- 21.sp1 ap380473 (Status: affected)
- 21.0 ap354707 (Status: affected)
- 21.0 ap346307 (Status: affected)
- 21.0 ap345633 (Status: affected)
- 21.0 ap354474 (Status: affected)
- 21.0 ap349066 (Status: affected)
- 21.0 ap349056 (Status: affected)
- 21.0 ap355774 (Status: affected)
- 21.0 ap345732 (Status: affected)
- 21.0 ap342324 (Status: affected)
- 21.0 ap355385 (Status: affected)
- 21.0 ap347741 (Status: affected)
- 21.0 ap341471 (Status: affected)
- 21.0 ap343410 (Status: affected)
- 21.0 ap348431 (Status: affected)
- 21.0 ap354793 (Status: affected)
- 21.0 ap339342 (Status: affected)
- 21.0 ap351160 (Status: affected)
- 21.0 ap352972 (Status: affected)
- 21.0 ap359145 (Status: affected)
- 21.0 ap339376 (Status: affected)
- 21.0 ap364358 (Status: affected)
- 21.0 ap356787 (Status: affected)
- 21.0 ap351898 (Status: affected)
- 21.0 ap362637 (Status: affected)
- 21.0 ap350338 (Status: affected)
- 21.0 ap342625 (Status: affected)
- 21.0 ap235252 (Status: affected)
- 21.0 ap354494 (Status: affected)
- 21.0 ap345261 (Status: affected)
- 21.0 ap359536 (Status: affected)
- 21.0 ap346261 (Status: affected)
- 21.0 ap355027 (Status: affected)
- 21.0 ap359465 (Status: affected)
- 21.0 ap363560 (Status: affected)
- 21.0 ap345738 (Status: affected)
- 21.0 ap356458 (Status: affected)
- 21.0 ap364670 (Status: affected)
- 21.0 ap342145 (Status: affected)
- 21.0 ap339200 (Status: affected)
- 21.0 ap357571 (Status: affected)
- 21.0 ap365889 (Status: affected)
- 21.0 ap215990 (Status: affected)
- 21.0 ap339346 (Status: affected)
- 21.0 ap244265 (Status: affected)
- 21.0 ap339781 (Status: affected)
- 21.0 ap364879 (Status: affected)
- 21.0 ap355091 (Status: affected)
- 21.0 ap245148 (Status: affected)
- 21.0 ap339658 (Status: affected)
- 21.0 ap358563 (Status: affected)
- 21.0 ap340054 (Status: affected)
- 21.0 ap341645 (Status: affected)
- 21.0 ap362825 (Status: affected)
- 21.0 ap355894 (Status: affected)
- 21.0 ap352372 (Status: affected)
- 21.0 ap361559 (Status: affected)
- 21.0 ap360306 (Status: affected)
- 21.0 ap362532 (Status: affected)
- 21.0 ap339206 (Status: affected)
- 21.0 ap356164 (Status: affected)
- 21.0 ap366118 (Status: affected)
- 21.0 ap348527 (Status: affected)
- 21.0 ap359470 (Status: affected)
- 21.0 ap352421 (Status: affected)
- 21.0 ap354469 (Status: affected)
- 21.0 ap349206 (Status: affected)
- 21.0 ap344100 (Status: affected)
- 21.0 ap351961 (Status: affected)
- 21.0 ap342461 (Status: affected)
- 21.0 ap346376 (Status: affected)
- 21.0 ap358411 (Status: affected)
- 21.0 ap346577 (Status: affected)
- 21.0 ap346147 (Status: affected)
- 21.0 ap349867 (Status: affected)
- 21.0 ap365170 (Status: affected)
- 21.0 ap345059 (Status: affected)
- 21.0 ap354964 (Status: affected)
- 21.0 ap356271 (Status: affected)
- 21.0 ap363146 (Status: affected)
- 21.0 ap346554 (Status: affected)
- 21.0 ap347246 (Status: affected)
- 21.0 ap342853 (Status: affected)
- 21.0 ap354180 (Status: affected)
- 21.0 ap351988 (Status: affected)
- 21.0 ap356474 (Status: affected)
- 21.0 ap354785 (Status: affected)
- 21.0 ap346253 (Status: affected)
- 21.0 ap354413 (Status: affected)
- 21.0 ap342719 (Status: affected)
- 21.0 ap350465 (Status: affected)
- 21.0 ap343675 (Status: affected)
- 21.0 ap361533 (Status: affected)
- 21.0 ap346900 (Status: affected)
- 21.0 ap339897 (Status: affected)
- 21.0 ap358726 (Status: affected)
- 21.0 ap359433 (Status: affected)
- 21.0 ap351835 (Status: affected)
- 21.0 ap344952 (Status: affected)
- 21.0 ap353843 (Status: affected)
- 21.0 ap356817 (Status: affected)
- 21.0 ap343017 (Status: affected)
- 21.0 ap360586 (Status: affected)
- 21.0 ap346074 (Status: affected)
- 21.0 ap338988 (Status: affected)
- 21.0 ap345069 (Status: affected)
- 21.0 ap355904 (Status: affected)
- 21.0 ap351263 (Status: affected)
- 21.0 ap361590 (Status: affected)
- 21.0 ap346622 (Status: affected)
- 21.0 ap341350 (Status: affected)
- 21.0 ap342975 (Status: affected)
- 21.0 ap344052 (Status: affected)
- 21.0 ap359119 (Status: affected)
- 21.0 ap343351 (Status: affected)
- 21.0 ap350497 (Status: affected)
- 21.0 ap342284 (Status: affected)
- 21.0 ap347603 (Status: affected)
- 21.0 ap340168 (Status: affected)
- 21.0 ap354098 (Status: affected)
- 21.0 ap339395 (Status: affected)
- 21.0 ap349390 (Status: affected)
- 21.0 ap358234 (Status: affected)
- 21.0 ap360912 (Status: affected)
- 21.0 ap345013 (Status: affected)
- 21.0 ap361854 (Status: affected)
- 21.0 ap342669 (Status: affected)
- 21.0 ap343579 (Status: affected)
- 21.0 ap355000 (Status: affected)
- 21.0 ap349210 (Status: affected)
- 21.0 ap361412 (Status: affected)
- 21.0 ap342588 (Status: affected)
- 21.0 ap355107 (Status: affected)
- 21.0 ap348945 (Status: affected)
- 21.0 ap345452 (Status: affected)
- 21.0 ap244609 (Status: affected)
- 21.0 ap346902 (Status: affected)
- 21.0 ap359829 (Status: affected)
- 21.0 ap358469 (Status: affected)
- 21.0 ap357083 (Status: affected)
- 21.0 ap347506 (Status: affected)
- 21.0 ap342696 (Status: affected)
- 21.0 ap345293 (Status: affected)
- 21.0 ap349996 (Status: affected)
- 21.0 ap244020 (Status: affected)
- 21.0 ap348156 (Status: affected)
- 21.0 ap350189 (Status: affected)
- 21.0 ap343495 (Status: affected)
- 21.0 ap367732 (Status: affected)
- 21.0 ap339552 (Status: affected)
- 21.0 ap342175 (Status: affected)
- 21.0 ap359227 (Status: affected)
- 21.0 ap338972 (Status: affected)
- 21.0 ap343352 (Status: affected)
- 21.0 ap352766 (Status: affected)
- 21.0 ap346724 (Status: affected)
- 21.0 ap363228 (Status: affected)
- 21.0 ap344094 (Status: affected)
- 21.0 ap345755 (Status: affected)
- 21.0 ap342483 (Status: affected)
- 21.0 ap346386 (Status: affected)
- 21.0 ap343616 (Status: affected)
- 21.0 ap351478 (Status: affected)
- 21.0 ap343999 (Status: affected)
- 21.0 ap344270 (Status: affected)
- 21.0 ap348472 (Status: affected)
- 21.0 ap358582 (Status: affected)
- 21.0 ap245441 (Status: affected)
- 21.0 ap358893 (Status: affected)
- 21.0 ap354646 (Status: affected)
- 21.0 ap341939 (Status: affected)
- 21.0 ap350308 (Status: affected)
- 21.0 ap357607 (Status: affected)
- 21.0 ap364384 (Status: affected)
- 21.0 ap242300 (Status: affected)
- 21.0 ap349699 (Status: affected)
- 21.0 ap338833 (Status: affected)
- 21.0 ap360600 (Status: affected)
- 21.0 ap342946 (Status: affected)
- 21.0 ap363301 (Status: affected)
- 21.0 ap339477 (Status: affected)
- 21.0 ap235960 (Status: affected)
- 21.0 ap247533 (Status: affected)
- 21.0 ap348473 (Status: affected)
- 21.0 ap339538 (Status: affected)
- 21.0 ap343877 (Status: affected)
- 21.0 ap366373 (Status: affected)
- 21.0 ap364369 (Status: affected)
- 21.0 ap366295 (Status: affected)
- 21.0 ap349617 (Status: affected)
- 21.0 ap339351 (Status: affected)
- 21.0 ap356317 (Status: affected)
- 21.0 ap349850 (Status: affected)
- 21.0 ap347905 (Status: affected)
- 21.0 ap344752 (Status: affected)
- 21.0 ap348143 (Status: affected)
- 21.0 ap365730 (Status: affected)
- 21.0 ap350303 (Status: affected)
- 21.0 ap347158 (Status: affected)
- 21.0 ap351294 (Status: affected)
- 21.0 ap344681 (Status: affected)
- 21.0 ap354069 (Status: affected)
- 21.0 ap347640 (Status: affected)
- 21.0 ap349864 (Status: affected)
- 21.0 ap360459 (Status: affected)
- 21.0 ap361520 (Status: affected)
- 21.0 ap346639 (Status: affected)
- 21.0 ap350110 (Status: affected)
- 21.0 ap350111 (Status: affected)
- 21.0 ap349724 (Status: affected)
- 21.0 ap245468 (Status: affected)
- 21.0 ap344043 (Status: affected)
- 21.0 ap355095 (Status: affected)
- 21.0 ap347016 (Status: affected)
- 21.0 ap350143 (Status: affected)
- 21.0 ap347172 (Status: affected)
- 21.0 ap342836 (Status: affected)
- 21.0 ap352969 (Status: affected)
- 21.0 ap365167 (Status: affected)
- 21.0 ap346379 (Status: affected)
- 21.0 ap364473 (Status: affected)
- 21.0 ap347302 (Status: affected)
- 21.0 ap339209 (Status: affected)
- 21.0 ap350141 (Status: affected)
- 21.0 ap355616 (Status: affected)
- 21.0 ap365632 (Status: affected)
- 21.0 ap357653 (Status: affected)
- 21.0 ap346347 (Status: affected)
- 21.0 ap349872 (Status: affected)
- 21.0 ap354936 (Status: affected)
- 21.0 ap353701 (Status: affected)
- 21.0 ap345627 (Status: affected)
- 21.0 ap345054 (Status: affected)
- 21.0 ap360966 (Status: affected)
- 21.0 ap359752 (Status: affected)
- 21.0 ap346183 (Status: affected)
- 21.0 ap352109 (Status: affected)
- 21.sp1 ap350575 (Status: affected)
- 21.sp1 ap350949 (Status: affected)
- 21.0 ap345490 (Status: affected)
- 21.0 ap348753 (Status: affected)
- 21.0 ap353841 (Status: affected)
- 21.0 ap346128 (Status: affected)
- 21.0 ap350204 (Status: affected)
- 21.sp1 ap343452 (Status: affected)
- 21.0 ap356145 (Status: affected)
- 21.0 ap358889 (Status: affected)
- 21.sp1 ap348101 (Status: affected)
- 21.0 ap359030 (Status: affected)
- 21.0 ap343452 (Status: affected)
- 21.0 ap347930 (Status: affected)
- 21.0 ap361883 (Status: affected)
- 21.0 ap352515 (Status: affected)
- 21.0 ap356231 (Status: affected)
- 21.0 ap363584 (Status: affected)
- 21.0 ap351216 (Status: affected)
- 21.0 ap356328 (Status: affected)
- 21.0 ap348093 (Status: affected)
- 21.0 ap351721 (Status: affected)
- 21.0 ap344253 (Status: affected)
- 21.sp1 ap345864 (Status: affected)
- 21.0 ap345850 (Status: affected)
- 21.0 ap246656 (Status: affected)
- 21.0 ap341897 (Status: affected)
- 21.0 ap350491 (Status: affected)
- 21.sp1 ap348678 (Status: affected)
- 21.0 ap359589 (Status: affected)
- 21.0 ap352795 (Status: affected)
- 21.0 ap350591 (Status: affected)
- 21.0 ap366290 (Status: affected)
- 21.0 ap346076 (Status: affected)
- 21.0 ap339196 (Status: affected)
- 21.0 ap358345 (Status: affected)
- 21.0 ap364471 (Status: affected)
- 21.0 ap348078 (Status: affected)
- 21.sp1 ap343868 (Status: affected)
- 21.0 ap346562 (Status: affected)
- 21.0 ap354331 (Status: affected)
- 21.0 ap350474 (Status: affected)
- 21.0 ap349642 (Status: affected)
- 21.0 ap348100 (Status: affected)
- 21.0 ap346559 (Status: affected)
- 21.0 ap352896 (Status: affected)
- 21.0 ap344020 (Status: affected)
- 21.0 ap342217 (Status: affected)
- 21.0 ap353418 (Status: affected)
- 21.0 ap359729 (Status: affected)
- 21.0 ap343868 (Status: affected)
- 21.0 ap351644 (Status: affected)
- 21.0 ap359076 (Status: affected)
- 21.0 ap339568 (Status: affected)
- 21.0 (Status: affected)
- 21.0 ap347896 (Status: affected)
- 21.0 ap344945 (Status: affected)
- 21.0 ap351700 (Status: affected)
- 21.0 ap353842 (Status: affected)
- 21.0 ap205814 (Status: affected)
- 21.0 ap237573 (Status: affected)
- 21.0 ap240187 (Status: affected)
- 21.0 ap238193 (Status: affected)
- 21.0 ap230925 (Status: affected)
- 21.0 ap239410 (Status: affected)
- 21.0 ap241691 (Status: affected)
- 21.0 ap225333 (Status: affected)
- 21.0 ap237570 (Status: affected)
- 21.0 ap231358 (Status: affected)
- 21.0 ap241133 (Status: affected)
- 21.0 ap232938 (Status: affected)
- 21.0 ap231084 (Status: affected)
- 21.0 ap241379 (Status: affected)
- 21.0 ap237395 (Status: affected)
- 21.0 ap237825 (Status: affected)
- 21.0 ap241172 (Status: affected)
- 21.0 ap239722 (Status: affected)
- 21.0 ap221935 (Status: affected)
- 21.0 ap229942 (Status: affected)
- 21.0 ap242025 (Status: affected)
- 21.0 ap242778 (Status: affected)
- 21.0 ap242972 (Status: affected)
- 21.0 ap242541 (Status: affected)
- 21.0 ap238035 (Status: affected)
- 21.0 ap242597 (Status: affected)
- 21.0 ap239469 (Status: affected)
- 21.0 ap242593 (Status: affected)
- 21.0 ap229160 (Status: affected)
- 21.0 ap243150 (Status: affected)
- 21.0 ap241901 (Status: affected)
- 21.0 ap219733 (Status: affected)
- 21.0 ap242250 (Status: affected)
- 21.0 ap247717 (Status: affected)
- 21.0 ap338839 (Status: affected)
- 21.0 ap338855 (Status: affected)
- 21.0 ap248364 (Status: affected)
- 21.0 ap338830 (Status: affected)
- 21.0 ap247568 (Status: affected)
- 21.0 ap338861 (Status: affected)
- 21.0 ap339077 (Status: affected)
- 21.0 ap339092 (Status: affected)
- 21.0 ap248266 (Status: affected)
- 21.0 ap339156 (Status: affected)
- 21.0 ap338965 (Status: affected)
- 21.0 ap338950 (Status: affected)
- 21.0 ap339244 (Status: affected)
- 21.0 ap338876 (Status: affected)
- 21.0 ap338964 (Status: affected)
- 21.0 ap339356 (Status: affected)
- 21.0 ap338959 (Status: affected)
- 21.0 ap339033 (Status: affected)
- 21.0 ap339080 (Status: affected)
- 21.0 ap339108 (Status: affected)
- 21.0 ap339048 (Status: affected)
- 21.0 ap339288 (Status: affected)
- 21.0 ap339083 (Status: affected)
- 21.0 ap339061 (Status: affected)
- 21.0 ap339109 (Status: affected)
- 21.0 ap339087 (Status: affected)
- 21.0 ap339223 (Status: affected)
- 21.0 ap338946 (Status: affected)
- 21.0 ap338993 (Status: affected)
- 21.0 ap243581 (Status: affected)
- 21.0 ap243935 (Status: affected)
- 21.0 ap245323 (Status: affected)
- 21.0 ap246001 (Status: affected)
- 21.0 ap339573 (Status: affected)
- 21.0 ap246376 (Status: affected)
- 21.0 ap247424 (Status: affected)
- 21.0 ap339449 (Status: affected)
- 21.0 ap339421 (Status: affected)
- 21.0 ap245386 (Status: affected)
- 21.0 ap246064 (Status: affected)
- 21.0 ap246387 (Status: affected)
- 21.0 ap339626 (Status: affected)
- 21.0 ap243808 (Status: affected)
- 21.0 ap247529 (Status: affected)
- 21.0 ap245245 (Status: affected)
- 21.0 ap247273 (Status: affected)
- 21.0 ap246523 (Status: affected)
- 21.0 ap247426 (Status: affected)
- 21.0 ap246996 (Status: affected)
- 21.0 ap246189 (Status: affected)
- 21.0 ap244712 (Status: affected)
- 21.0 ap339932 (Status: affected)
- 21.0 ap243200 (Status: affected)
- 21.0 ap244895 (Status: affected)
- 21.0 ap245263 (Status: affected)
- 21.0 ap246281 (Status: affected)
- 21.0 ap247376 (Status: affected)
- 21.0 ap339853 (Status: affected)
- 21.0 ap341433 (Status: affected)
- 21.0 ap341382 (Status: affected)
- 21.0 ap339386 (Status: affected)
- 21.0 ap340730 (Status: affected)
- 21.0 ap341393 (Status: affected)
- 21.0 ap341593 (Status: affected)
- 21.0 ap341555 (Status: affected)
- 21.0 ap341655 (Status: affected)
- 21.0 ap340744 (Status: affected)
- 21.0 ap340531 (Status: affected)
- 21.0 ap341658 (Status: affected)
- 21.0 ap341945 (Status: affected)
- 21.0 ap341909 (Status: affected)
- 21.0 ap341943 (Status: affected)
- 21.0 ap341942 (Status: affected)
- 21.0 ap342089 (Status: affected)
- 21.0 ap342042 (Status: affected)
- 21.0 ap341969 (Status: affected)
- 21.0 ap341470 (Status: affected)
- 21.0 ap341850 (Status: affected)
- 21.0 ap341595 (Status: affected)
- 21.0 ap341575 (Status: affected)
- 21.0 ap341683 (Status: affected)
- 21.0 ap341495 (Status: affected)
- 21.0 ap342107 (Status: affected)
- 21.0 ap341944 (Status: affected)
- 21.0 ap342120 (Status: affected)
- 21.0 ap341851 (Status: affected)
- 21.0 ap342038 (Status: affected)
- 21.0 ap340100 (Status: affected)
- 21.0 ap340745 (Status: affected)
- 21.0 ap341585 (Status: affected)
- 21.0 ap342081 (Status: affected)
- 21.0 ap342188 (Status: affected)
- 21.0 ap340545 (Status: affected)
- 21.0 ap342168 (Status: affected)
- 21.0 ap341425 (Status: affected)
- 21.0 ap342040 (Status: affected)
- 21.0 ap340749 (Status: affected)
- 21.0 ap342087 (Status: affected)
- 21.0 ap341426 (Status: affected)
- 21.0 ap342132 (Status: affected)
- 21.0 ap341940 (Status: affected)
- 21.0 ap341540 (Status: affected)
- 21.0 ap244317 (Status: affected)
- 21.0 ap341586 (Status: affected)
- 21.0 ap341855 (Status: affected)
- 21.0 ap342695 (Status: affected)
- 21.0 ap343319 (Status: affected)
- 21.0 ap342771 (Status: affected)
- 21.0 ap244509 (Status: affected)
- 21.0 ap342792 (Status: affected)
- 21.0 ap343144 (Status: affected)
- 21.0 ap343488 (Status: affected)
- 21.0 ap343204 (Status: affected)
- 21.0 ap343446 (Status: affected)
- 21.0 ap343504 (Status: affected)
- 21.0 ap244158 (Status: affected)
- 21.0 ap343572 (Status: affected)
- 21.0 ap343398 (Status: affected)
- 21.0 ap342776 (Status: affected)
- 21.0 ap342752 (Status: affected)
- 21.0 ap343537 (Status: affected)
- 21.0 ap342821 (Status: affected)
- 21.0 ap342785 (Status: affected)
- 21.0 ap342960 (Status: affected)
- 21.0 ap342786 (Status: affected)
- 21.0 ap343243 (Status: affected)
- 21.0 ap343038 (Status: affected)
- 21.0 ap343251 (Status: affected)
- 21.0 ap343445 (Status: affected)
- 21.0 ap343541 (Status: affected)
- 21.0 ap342441 (Status: affected)
- 21.0 ap343503 (Status: affected)
- 21.0 ap342706 (Status: affected)
- 21.0 ap343483 (Status: affected)
- 21.0 ap342606 (Status: affected)
- 21.0 ap342561 (Status: affected)
- 21.0 ap342942 (Status: affected)
- 21.0 ap343790 (Status: affected)
- 21.0 ap342847 (Status: affected)
- 21.0 ap342943 (Status: affected)
- 21.0 ap343647 (Status: affected)
- 21.0 ap343760 (Status: affected)
- 21.0 ap343807 (Status: affected)
- 21.0 ap343861 (Status: affected)
- 21.0 ap343876 (Status: affected)
- 21.0 ap343670 (Status: affected)
- 21.0 ap343808 (Status: affected)
- 21.0 ap343864 (Status: affected)
- 21.0 ap342572 (Status: affected)
- 21.0 ap342449 (Status: affected)
- 21.0 ap342325 (Status: affected)
- 21.0 ap343774 (Status: affected)
- 21.0 ap342289 (Status: affected)
- 21.0 ap342523 (Status: affected)
- 21.0 ap342851 (Status: affected)
- 21.0 ap343830 (Status: affected)
- 21.0 ap344116 (Status: affected)
- 21.0 ap342336 (Status: affected)
- 21.0 ap342546 (Status: affected)
- 21.0 ap344628 (Status: affected)
- 21.0 ap344403 (Status: affected)
- 21.0 ap342214 (Status: affected)
- 21.0 ap344405 (Status: affected)
- 21.0 ap344754 (Status: affected)
- 21.0 ap344762 (Status: affected)
- 21.0 ap344414 (Status: affected)
- 21.0 ap344150 (Status: affected)
- 21.0 ap344725 (Status: affected)
- 21.0 ap344467 (Status: affected)
- 21.0 ap344272 (Status: affected)
- 21.0 ap344489 (Status: affected)
- 21.0 ap344515 (Status: affected)
- 21.0 ap344763 (Status: affected)
- 21.0 ap344917 (Status: affected)
- 21.0 ap344684 (Status: affected)
- 21.0 ap344755 (Status: affected)
- 21.0 ap344886 (Status: affected)
- 21.0 ap344737 (Status: affected)
- 21.0 ap344709 (Status: affected)
- 21.0 ap344783 (Status: affected)
- 21.0 ap344114 (Status: affected)
- 21.0 ap344196 (Status: affected)
- 21.0 ap344476 (Status: affected)
- 21.0 ap344301 (Status: affected)
- 21.0 ap344263 (Status: affected)
- 21.0 ap344477 (Status: affected)
- 21.0 ap344452 (Status: affected)
- 21.0 ap344413 (Status: affected)
- 21.0 ap344411 (Status: affected)
- 21.0 ap344557 (Status: affected)
- 21.0 ap344198 (Status: affected)
- 21.0 ap344570 (Status: affected)
- 21.0 ap344679 (Status: affected)
- 21.0 ap344757 (Status: affected)
- 21.0 ap344883 (Status: affected)
- 21.0 ap344037 (Status: affected)
- 21.0 ap344663 (Status: affected)
- 21.0 ap344692 (Status: affected)
- 21.0 ap343901 (Status: affected)
- 21.0 ap344698 (Status: affected)
- 21.0 ap343918 (Status: affected)
- 21.0 ap344716 (Status: affected)
- 21.0 ap344083 (Status: affected)
- 21.0 ap343933 (Status: affected)
- 21.0 ap343942 (Status: affected)
- 21.0 ap343879 (Status: affected)
- 21.0 ap343920 (Status: affected)
- 21.0 ap343908 (Status: affected)
- 21.0 ap343924 (Status: affected)
- 21.0 ap343981 (Status: affected)
- 21.0 ap345451 (Status: affected)
- 21.0 ap345209 (Status: affected)
- 21.0 ap345071 (Status: affected)
- 21.0 ap342226 (Status: affected)
- 21.0 ap345637 (Status: affected)
- 21.0 ap345162 (Status: affected)
- 21.0 ap345705 (Status: affected)
- 21.0 ap345634 (Status: affected)
- 21.0 ap345086 (Status: affected)
- 21.0 ap345245 (Status: affected)
- 21.0 ap345374 (Status: affected)
- 21.0 ap345175 (Status: affected)
- 21.0 ap345246 (Status: affected)
- 21.0 ap345196 (Status: affected)
- 21.0 ap345195 (Status: affected)
- 21.0 ap345161 (Status: affected)
- 21.0 ap345263 (Status: affected)
- 21.0 ap345399 (Status: affected)
- 21.0 ap345636 (Status: affected)
- 21.0 ap345695 (Status: affected)
- 21.0 ap345704 (Status: affected)
- 21.0 ap345762 (Status: affected)
- 21.0 ap345745 (Status: affected)
- 21.0 ap346219 (Status: affected)
- 21.0 ap345733 (Status: affected)
- 21.0 ap346127 (Status: affected)
- 21.0 ap346009 (Status: affected)
- 21.0 ap346156 (Status: affected)
- 21.0 ap345769 (Status: affected)
- 21.0 ap346021 (Status: affected)
- 21.0 ap346141 (Status: affected)
- 21.0 ap346174 (Status: affected)
- 21.0 ap346160 (Status: affected)
- 21.0 ap345872 (Status: affected)
- 21.0 ap346170 (Status: affected)
- 21.0 ap345790 (Status: affected)
- 21.0 ap346006 (Status: affected)
- 21.0 ap346270 (Status: affected)
- 21.0 ap346080 (Status: affected)
- 21.0 ap346079 (Status: affected)
- 21.0 ap346207 (Status: affected)
- 21.0 ap346375 (Status: affected)
- 21.0 ap346500 (Status: affected)
- 21.0 ap346541 (Status: affected)
- 21.0 ap346607 (Status: affected)
- 21.0 ap346570 (Status: affected)
- 21.0 ap346235 (Status: affected)
- 21.0 ap346508 (Status: affected)
- 21.0 ap346361 (Status: affected)
- 21.0 ap346546 (Status: affected)
- 21.0 ap346273 (Status: affected)
- 21.0 ap346475 (Status: affected)
- 21.0 ap346365 (Status: affected)
- 21.0 ap346512 (Status: affected)
- 21.0 ap346300 (Status: affected)
- 21.0 ap346243 (Status: affected)
- 21.0 ap346321 (Status: affected)
- 21.0 ap346363 (Status: affected)
- 21.0 ap346377 (Status: affected)
- 21.0 ap346381 (Status: affected)
- 21.0 ap346552 (Status: affected)
- 21.0 ap346866 (Status: affected)
- 21.0 ap347015 (Status: affected)
- 21.0 ap346578 (Status: affected)
- 21.0 ap346640 (Status: affected)
- 21.0 ap347247 (Status: affected)
- 21.0 ap347263 (Status: affected)
- 21.0 ap347196 (Status: affected)
- 21.0 ap346527 (Status: affected)
- 21.0 ap346629 (Status: affected)
- 21.0 ap347059 (Status: affected)
- 21.0 ap346706 (Status: affected)
- 21.0 ap347303 (Status: affected)
- 21.0 ap347064 (Status: affected)
- 21.0 ap347256 (Status: affected)
- 21.0 ap347264 (Status: affected)
- 21.0 ap346630 (Status: affected)
- 21.0 ap347218 (Status: affected)
- 21.0 ap347139 (Status: affected)
- 21.0 ap346897 (Status: affected)
- 21.0 ap347306 (Status: affected)
- 21.0 ap346646 (Status: affected)
- 21.0 ap346989 (Status: affected)
- 21.0 ap346778 (Status: affected)
- 21.0 ap346787 (Status: affected)
- 21.0 ap347065 (Status: affected)
- 21.0 ap347185 (Status: affected)
- 21.0 ap347277 (Status: affected)
- 21.0 ap347313 (Status: affected)
- 21.0 ap347309 (Status: affected)
- 21.0 ap347127 (Status: affected)
- 21.0 ap345506 (Status: affected)
- 21.0 ap347032 (Status: affected)
- 21.0 ap347008 (Status: affected)
- 21.0 ap345454 (Status: affected)
- 21.0 ap345470 (Status: affected)
- 21.0 ap347297 (Status: affected)
- 21.0 ap345016 (Status: affected)
- 21.0 ap345550 (Status: affected)
- 21.0 ap345492 (Status: affected)
- 21.0 ap345557 (Status: affected)
- 21.0 ap347258 (Status: affected)
- 21.0 ap345526 (Status: affected)
- 21.0 ap346616 (Status: affected)
- 21.0 ap345614 (Status: affected)
- 21.0 ap345528 (Status: affected)
- 21.0 ap345541 (Status: affected)
- 21.0 ap345503 (Status: affected)
- 21.0 ap348880 (Status: affected)
- 21.0 ap345472 (Status: affected)
- 21.0 ap348766 (Status: affected)
- 21.0 ap345046 (Status: affected)
- 21.0 ap348697 (Status: affected)
- 21.0 ap348066 (Status: affected)
- 21.0 ap349198 (Status: affected)
- 21.0 ap349497 (Status: affected)
- 21.0 ap348031 (Status: affected)
- 21.0 ap349044 (Status: affected)
- 21.0 ap348734 (Status: affected)
- 21.0 ap348724 (Status: affected)
- 21.0 ap348768 (Status: affected)
- 21.0 ap349201 (Status: affected)
- 21.0 ap349444 (Status: affected)
- 21.0 ap349501 (Status: affected)
- 21.0 ap349612 (Status: affected)
- 21.0 ap349019 (Status: affected)
- 21.0 ap349232 (Status: affected)
- 21.0 ap349714 (Status: affected)
- 21.0 ap348698 (Status: affected)
- 21.0 ap348777 (Status: affected)
- 21.0 ap349643 (Status: affected)
- 21.0 ap348057 (Status: affected)
- 21.0 ap348913 (Status: affected)
- 21.0 ap349020 (Status: affected)
- 21.0 ap348968 (Status: affected)
- 21.0 ap349517 (Status: affected)
- 21.0 ap348707 (Status: affected)
- 21.0 ap348779 (Status: affected)
- 21.0 ap349090 (Status: affected)
- 21.0 ap349487 (Status: affected)
- 21.0 ap348065 (Status: affected)
- 21.0 ap348687 (Status: affected)
- 21.0 ap349664 (Status: affected)
- 21.0 ap349582 (Status: affected)
- 21.0 ap349974 (Status: affected)
- 21.0 ap349136 (Status: affected)
- 21.0 ap349915 (Status: affected)
- 21.0 ap349219 (Status: affected)
- 21.0 ap348986 (Status: affected)
- 21.0 ap349496 (Status: affected)
- 21.0 ap349952 (Status: affected)
- 21.0 ap349751 (Status: affected)
- 21.0 ap349583 (Status: affected)
- 21.0 ap349845 (Status: affected)
- 21.0 ap349509 (Status: affected)
- 21.0 ap349745 (Status: affected)
- 21.0 ap349819 (Status: affected)
- 21.0 ap350140 (Status: affected)
- 21.0 ap349900 (Status: affected)
- 21.0 ap349818 (Status: affected)
- 21.0 ap349840 (Status: affected)
- 21.0 ap349907 (Status: affected)
- 21.0 ap350045 (Status: affected)
- 21.0 ap349853 (Status: affected)
- 21.0 ap350175 (Status: affected)
- 21.0 ap349858 (Status: affected)
- 21.0 ap350070 (Status: affected)
- 21.0 ap349877 (Status: affected)
- 21.0 ap349894 (Status: affected)
- 21.0 ap350032 (Status: affected)
- 21.0 ap347548 (Status: affected)
- 21.0 ap347562 (Status: affected)
- 21.0 ap347485 (Status: affected)
- 21.0 ap347981 (Status: affected)
- 21.0 ap347950 (Status: affected)
- 21.0 ap347436 (Status: affected)
- 21.0 ap347677 (Status: affected)
- 21.0 ap348107 (Status: affected)
- 21.0 ap347438 (Status: affected)
- 21.0 ap348361 (Status: affected)
- 21.0 ap347431 (Status: affected)
- 21.0 ap348207 (Status: affected)
- 21.0 ap347895 (Status: affected)
- 21.0 ap347719 (Status: affected)
- 21.0 ap349393 (Status: affected)
- 21.0 ap348503 (Status: affected)
- 21.0 ap348575 (Status: affected)
- 21.0 ap347644 (Status: affected)
- 21.0 ap347597 (Status: affected)
- 21.0 ap349236 (Status: affected)
- 21.0 ap347682 (Status: affected)
- 21.0 ap347610 (Status: affected)
- 21.0 ap348514 (Status: affected)
- 21.0 ap348145 (Status: affected)
- 21.0 ap347723 (Status: affected)
- 21.0 ap348334 (Status: affected)
- 21.0 ap347993 (Status: affected)
- 21.0 ap348362 (Status: affected)
- 21.0 ap348629 (Status: affected)
- 21.0 ap347602 (Status: affected)
- 21.0 ap347444 (Status: affected)
- 21.0 ap348682 (Status: affected)
- 21.0 ap347726 (Status: affected)
- 21.0 ap347645 (Status: affected)
- 21.0 ap349254 (Status: affected)
- 21.0 ap347766 (Status: affected)
- 21.0 ap348345 (Status: affected)
- 21.0 ap347975 (Status: affected)
- 21.0 ap348436 (Status: affected)
- 21.0 ap347551 (Status: affected)
- 21.0 ap347476 (Status: affected)
- 21.0 ap349400 (Status: affected)
- 21.0 ap347432 (Status: affected)
- 21.0 ap349262 (Status: affected)
- 21.0 ap348529 (Status: affected)
- 21.0 ap347536 (Status: affected)
- 21.0 ap347673 (Status: affected)
- 21.0 ap347697 (Status: affected)
- 21.0 ap348358 (Status: affected)
- 21.0 ap347889 (Status: affected)
- 21.0 ap349235 (Status: affected)
- 21.0 ap348474 (Status: affected)
- 21.0 ap348631 (Status: affected)
- 21.0 ap350478 (Status: affected)
- 21.0 ap351153 (Status: affected)
- 21.0 ap350864 (Status: affected)
- 21.0 ap350929 (Status: affected)
- 21.0 ap348536 (Status: affected)
- 21.0 ap351015 (Status: affected)
- 21.0 ap351205 (Status: affected)
- 21.0 ap351942 (Status: affected)
- 21.0 ap349280 (Status: affected)
- 21.0 ap350936 (Status: affected)
- 21.0 ap351179 (Status: affected)
- 21.0 ap349415 (Status: affected)
- 21.0 ap351924 (Status: affected)
- 21.0 ap350884 (Status: affected)
- 21.0 ap351020 (Status: affected)
- 21.0 ap351199 (Status: affected)
- 21.0 ap351213 (Status: affected)
- 21.0 ap351223 (Status: affected)
- 21.0 ap351925 (Status: affected)
- 21.0 ap351868 (Status: affected)
- 21.0 ap350969 (Status: affected)
- 21.0 ap351960 (Status: affected)
- 21.0 ap351045 (Status: affected)
- 21.0 ap351222 (Status: affected)
- 21.0 ap351936 (Status: affected)
- 21.0 ap353179 (Status: affected)
- 21.0 ap350908 (Status: affected)
- 21.0 ap350990 (Status: affected)
- 21.0 ap351200 (Status: affected)
- 21.0 ap351214 (Status: affected)
- 21.0 ap353311 (Status: affected)
- 21.0 ap353122 (Status: affected)
- 21.0 ap351165 (Status: affected)
- 21.0 ap352985 (Status: affected)
- 21.0 ap353154 (Status: affected)
- 21.0 ap353184 (Status: affected)
- 21.0 ap353001 (Status: affected)
- 21.0 ap351243 (Status: affected)
- 21.0 ap351261 (Status: affected)
- 21.0 ap353315 (Status: affected)
- 21.0 ap353419 (Status: affected)
- 21.0 ap353389 (Status: affected)
- 21.0 ap353025 (Status: affected)
- 21.0 ap351262 (Status: affected)
- 21.0 ap352238 (Status: affected)
- 21.0 ap352182 (Status: affected)
- 21.0 ap352126 (Status: affected)
- 21.0 ap350573 (Status: affected)
- 21.0 ap350538 (Status: affected)
- 21.0 ap352292 (Status: affected)
- 21.0 ap352184 (Status: affected)
- 21.0 ap352192 (Status: affected)
- 21.0 ap350845 (Status: affected)
- 21.0 ap350800 (Status: affected)
- 21.0 ap350740 (Status: affected)
- 21.0 ap351602 (Status: affected)
- 21.0 ap351337 (Status: affected)
- 21.0 ap350593 (Status: affected)
- 21.0 ap352203 (Status: affected)
- 21.0 ap350760 (Status: affected)
- 21.0 ap350604 (Status: affected)
- 21.0 ap351642 (Status: affected)
- 21.0 ap351315 (Status: affected)
- 21.0 ap351345 (Status: affected)
- 21.0 ap351744 (Status: affected)
- 21.0 ap350772 (Status: affected)
- 21.0 ap351817 (Status: affected)
- 21.0 ap350564 (Status: affected)
- 21.0 ap350859 (Status: affected)
- 21.0 ap350566 (Status: affected)
- 21.0 ap351727 (Status: affected)
- 21.0 ap351798 (Status: affected)
- 21.0 ap350749 (Status: affected)
- 21.0 ap350827 (Status: affected)
- 21.0 ap350602 (Status: affected)
- 21.0 ap350799 (Status: affected)
- 21.0 ap351639 (Status: affected)
- 21.0 ap351701 (Status: affected)
- 21.0 ap351497 (Status: affected)
- 21.0 ap350489 (Status: affected)
- 21.0 ap350835 (Status: affected)
- 21.0 ap350603 (Status: affected)
- 21.0 ap351335 (Status: affected)
- 21.0 ap350330 (Status: affected)
- 21.0 ap351682 (Status: affected)
- 21.0 ap351641 (Status: affected)
- 21.0 ap351401 (Status: affected)
- 21.0 ap352340 (Status: affected)
- 21.0 ap352337 (Status: affected)
- 21.0 ap350406 (Status: affected)
- 21.0 ap350315 (Status: affected)
- 21.0 ap351527 (Status: affected)
- 21.0 ap352804 (Status: affected)
- 21.0 ap352707 (Status: affected)
- 21.0 ap350429 (Status: affected)
- 21.0 ap352511 (Status: affected)
- 21.0 ap352293 (Status: affected)
- 21.0 ap352915 (Status: affected)
- 21.0 ap352805 (Status: affected)
- 21.0 ap350318 (Status: affected)
- 21.0 ap352345 (Status: affected)
- 21.0 ap350337 (Status: affected)
- 21.0 ap352926 (Status: affected)
- 21.0 ap352423 (Status: affected)
- 21.0 ap352386 (Status: affected)
- 21.0 ap352887 (Status: affected)
- 21.0 ap350321 (Status: affected)
- 21.0 ap350211 (Status: affected)
- 21.0 ap350469 (Status: affected)
- 21.0 ap352304 (Status: affected)
- 21.0 ap350434 (Status: affected)
- 21.0 ap352357 (Status: affected)
- 21.0 ap352927 (Status: affected)
- 21.0 ap350471 (Status: affected)
- 21.0 ap350322 (Status: affected)
- 21.0 ap350218 (Status: affected)
- 21.0 ap352711 (Status: affected)
- 21.0 ap352498 (Status: affected)
- 21.0 ap353549 (Status: affected)
- 21.0 ap352508 (Status: affected)
- 21.0 ap353839 (Status: affected)
- 21.0 ap353856 (Status: affected)
- 21.0 ap353879 (Status: affected)
- 21.0 ap353558 (Status: affected)
- 21.0 ap353623 (Status: affected)
- 21.0 ap353865 (Status: affected)
- 21.0 ap353852 (Status: affected)
- 21.0 ap353845 (Status: affected)
- 21.0 ap353836 (Status: affected)
- 21.0 ap353870 (Status: affected)
- 21.0 ap355647 (Status: affected)
- 21.0 ap357040 (Status: affected)
- 21.0 ap355753 (Status: affected)
- 21.0 ap356935 (Status: affected)
- 21.0 ap357019 (Status: affected)
- 21.0 ap356978 (Status: affected)
- 21.0 ap355670 (Status: affected)
- 21.0 ap356842 (Status: affected)
- 21.0 ap356969 (Status: affected)
- 21.0 ap357105 (Status: affected)
- 21.0 ap357366 (Status: affected)
- 21.0 ap357347 (Status: affected)
- 21.0 ap357430 (Status: affected)
- 21.0 ap357172 (Status: affected)
- 21.0 ap357560 (Status: affected)
- 21.0 ap357181 (Status: affected)
- 21.0 ap357508 (Status: affected)
- 21.0 ap357187 (Status: affected)
- 21.0 ap357039 (Status: affected)
- 21.0 ap357162 (Status: affected)
- 21.0 ap357454 (Status: affected)
- 21.0 ap357185 (Status: affected)
- 21.0 ap357452 (Status: affected)
- 21.0 ap354909 (Status: affected)
- 21.0 ap357357 (Status: affected)
- 21.0 ap357330 (Status: affected)
- 21.0 ap357562 (Status: affected)
- 21.0 ap356301 (Status: affected)
- 21.0 ap357507 (Status: affected)
- 21.0 ap357146 (Status: affected)
- 21.0 ap357176 (Status: affected)
- 21.0 ap357525 (Status: affected)
- 21.0 ap357417 (Status: affected)
- 21.0 ap357081 (Status: affected)
- 21.0 ap355002 (Status: affected)
- 21.0 ap356350 (Status: affected)
- 21.0 ap355003 (Status: affected)
- 21.0 ap355069 (Status: affected)
- 21.0 ap356345 (Status: affected)
- 21.0 ap356353 (Status: affected)
- 21.0 ap355102 (Status: affected)
- 21.0 ap356289 (Status: affected)
- 21.0 ap356412 (Status: affected)
- 21.0 ap356320 (Status: affected)
- 21.0 ap355020 (Status: affected)
- 21.0 ap357621 (Status: affected)
- 21.0 ap357610 (Status: affected)
- 21.0 ap354616 (Status: affected)
- 21.0 ap354528 (Status: affected)
- 21.0 ap357595 (Status: affected)
- 21.0 ap357675 (Status: affected)
- 21.0 ap357623 (Status: affected)
- 21.0 ap356497 (Status: affected)
- 21.0 ap354726 (Status: affected)
- 21.0 ap354673 (Status: affected)
- 21.0 ap356707 (Status: affected)
- 21.0 ap354681 (Status: affected)
- 21.0 ap354580 (Status: affected)
- 21.0 ap354595 (Status: affected)
- 21.0 ap354527 (Status: affected)
- 21.0 ap354636 (Status: affected)
- 21.0 ap354779 (Status: affected)
- 21.0 ap354690 (Status: affected)
- 21.0 ap354556 (Status: affected)
- 21.0 ap356717 (Status: affected)
- 21.0 ap354615 (Status: affected)
- 21.0 ap354129 (Status: affected)
- 21.0 ap356803 (Status: affected)
- 21.0 ap356572 (Status: affected)
- 21.0 ap354194 (Status: affected)
- 21.0 ap357737 (Status: affected)
- 21.0 ap357761 (Status: affected)
- 21.0 ap357802 (Status: affected)
- 21.0 ap356575 (Status: affected)
- 21.0 ap356749 (Status: affected)
- 21.0 ap355353 (Status: affected)
- 21.0 ap355283 (Status: affected)
- 21.0 ap354052 (Status: affected)
- 21.0 ap356029 (Status: affected)
- 21.0 ap356152 (Status: affected)
- 21.0 ap355125 (Status: affected)
- 21.0 ap355639 (Status: affected)
- 21.0 ap356254 (Status: affected)
- 21.0 ap354077 (Status: affected)
- 21.0 ap355201 (Status: affected)
- 21.0 ap355300 (Status: affected)
- 21.0 ap354465 (Status: affected)
- 21.0 ap354170 (Status: affected)
- 21.0 ap353954 (Status: affected)
- 21.0 ap356142 (Status: affected)
- 21.0 ap355952 (Status: affected)
- 21.0 ap355896 (Status: affected)
- 21.0 ap355568 (Status: affected)
- 21.0 ap354415 (Status: affected)
- 21.0 ap355356 (Status: affected)
- 21.0 ap355628 (Status: affected)
- 21.0 ap355836 (Status: affected)
- 21.0 ap356253 (Status: affected)
- 21.0 ap354380 (Status: affected)
- 21.0 ap355112 (Status: affected)
- 21.0 ap354200 (Status: affected)
- 21.0 ap353985 (Status: affected)
- 21.0 ap355599 (Status: affected)
- 21.0 ap355236 (Status: affected)
- 21.0 ap355897 (Status: affected)
- 21.0 ap354439 (Status: affected)
- 21.0 ap355838 (Status: affected)
- 21.0 ap355121 (Status: affected)
- 21.0 ap355637 (Status: affected)
- 21.0 ap354005 (Status: affected)
- 21.0 ap355265 (Status: affected)
- 21.0 ap354412 (Status: affected)
- 21.0 ap354314 (Status: affected)
- 21.0 ap363297 (Status: affected)
- 21.0 ap363415 (Status: affected)
- 21.0 ap363330 (Status: affected)
- 21.0 ap363233 (Status: affected)
- 21.0 ap356007 (Status: affected)
- 21.0 ap363408 (Status: affected)
- 21.0 ap363577 (Status: affected)
- 21.0 ap362707 (Status: affected)
- 21.0 ap362798 (Status: affected)
- 21.0 ap362708 (Status: affected)
- 21.0 ap363305 (Status: affected)
- 21.0 ap363023 (Status: affected)
- 21.0 ap363247 (Status: affected)
- 21.0 ap362963 (Status: affected)
- 21.0 ap362741 (Status: affected)
- 21.0 ap360531 (Status: affected)
- 21.0 ap362964 (Status: affected)
- 21.0 ap363049 (Status: affected)
- 21.0 ap360198 (Status: affected)
- 21.0 ap359767 (Status: affected)
- 21.0 ap359925 (Status: affected)
- 21.0 ap362680 (Status: affected)
- 21.0 ap360412 (Status: affected)
- 21.0 ap362960 (Status: affected)
- 21.0 ap360231 (Status: affected)
- 21.0 ap362683 (Status: affected)
- 21.0 ap359892 (Status: affected)
- 21.0 ap359772 (Status: affected)
- 21.0 ap360245 (Status: affected)
- 21.0 ap360319 (Status: affected)
- 21.0 ap359908 (Status: affected)
- 21.0 ap359973 (Status: affected)
- 21.0 ap359791 (Status: affected)
- 21.0 ap360250 (Status: affected)
- 21.0 ap363208 (Status: affected)
- 21.0 ap363221 (Status: affected)
- 21.0 ap363197 (Status: affected)
- 21.0 ap360362 (Status: affected)
- 21.0 ap358099 (Status: affected)
- 21.0 ap359556 (Status: affected)
- 21.0 ap359657 (Status: affected)
- 21.0 ap358241 (Status: affected)
- 21.0 ap358133 (Status: affected)
- 21.0 ap358328 (Status: affected)
- 21.0 ap362263 (Status: affected)
- 21.0 ap358920 (Status: affected)
- 21.0 ap359191 (Status: affected)
- 21.0 ap361936 (Status: affected)
- 21.0 ap361831 (Status: affected)
- 21.0 ap362122 (Status: affected)
- 21.0 ap359298 (Status: affected)
- 21.0 ap361637 (Status: affected)
- 21.0 ap362364 (Status: affected)
- 21.0 ap359464 (Status: affected)
- 21.0 ap358046 (Status: affected)
- 21.0 ap358271 (Status: affected)
- 21.0 ap361537 (Status: affected)
- 21.0 ap358338 (Status: affected)
- 21.0 ap358145 (Status: affected)
- 21.0 ap358942 (Status: affected)
- 21.0 ap358101 (Status: affected)
- 21.0 ap362141 (Status: affected)
- 21.0 ap357856 (Status: affected)
- 21.0 ap361643 (Status: affected)
- 21.0 ap362365 (Status: affected)
- 21.0 ap358289 (Status: affected)
- 21.0 ap362019 (Status: affected)
- 21.0 ap358089 (Status: affected)
- 21.0 ap362269 (Status: affected)
- 21.0 ap359218 (Status: affected)
- 21.0 ap361847 (Status: affected)
- 21.0 ap361691 (Status: affected)
- 21.0 ap358096 (Status: affected)
- 21.0 ap361551 (Status: affected)
- 21.0 ap359421 (Status: affected)
- 21.0 ap362120 (Status: affected)
- 21.0 ap362149 (Status: affected)
- 21.0 ap358314 (Status: affected)
- 21.0 ap358013 (Status: affected)
- 21.0 ap361930 (Status: affected)
- 21.0 ap358944 (Status: affected)
- 21.0 ap358894 (Status: affected)
- 21.0 ap362193 (Status: affected)
- 21.0 ap358845 (Status: affected)
- 21.0 ap360790 (Status: affected)
- 21.0 ap358604 (Status: affected)
- 21.0 ap360943 (Status: affected)
- 21.0 ap361353 (Status: affected)
- 21.0 ap362316 (Status: affected)
- 21.0 ap361823 (Status: affected)
- 21.0 ap361620 (Status: affected)
- 21.0 ap361154 (Status: affected)
- 21.0 ap359085 (Status: affected)
- 21.0 ap359130 (Status: affected)
- 21.0 ap358365 (Status: affected)
- 21.0 ap359029 (Status: affected)
- 21.0 ap358568 (Status: affected)
- 21.0 ap359164 (Status: affected)
- 21.0 ap358681 (Status: affected)
- 21.0 ap360615 (Status: affected)
- 21.0 ap359186 (Status: affected)
- 21.0 ap361305 (Status: affected)
- 21.0 ap359113 (Status: affected)
- 21.0 ap358643 (Status: affected)
- 21.0 ap360906 (Status: affected)
- 21.0 ap358521 (Status: affected)
- 21.0 ap359044 (Status: affected)
- 21.0 ap360627 (Status: affected)
- 21.0 ap359118 (Status: affected)
- 21.0 ap359121 (Status: affected)
- 21.0 ap358647 (Status: affected)
- 21.0 ap359153 (Status: affected)
- 21.0 ap361016 (Status: affected)
- 21.0 ap358891 (Status: affected)
- 21.sp1 ap237825 (Status: affected)
- 21.0 ap361459 (Status: affected)
- 21.0 ap363824 (Status: affected)
- 21.sp1 ap241691 (Status: affected)
- 21.0 ap363705 (Status: affected)
- 21.0 ap364075 (Status: affected)
- 21.0 ap363976 (Status: affected)
- 21.0 ap363671 (Status: affected)
- 21.sp1 ap242025 (Status: affected)
- 21.sp1 ap239410 (Status: affected)
- 21.sp1 ap241133 (Status: affected)
- 21.0 ap364248 (Status: affected)
- 21.sp1 ap240187 (Status: affected)
- 21.sp1 ap244317 (Status: affected)
- 21.sp1 ap237570 (Status: affected)
- 21.0 ap363693 (Status: affected)
- 21.sp1 ap238035 (Status: affected)
- 21.0 ap363753 (Status: affected)
- 21.0 ap363845 (Status: affected)
- 21.0 ap364381 (Status: affected)
- 21.0 ap364148 (Status: affected)
- 21.sp1 ap239469 (Status: affected)
- 21.sp1 ap244509 (Status: affected)
- 21.0 ap363694 (Status: affected)
- 21.sp1 ap241172 (Status: affected)
- 21.0 ap364210 (Status: affected)
- 21.0 ap363984 (Status: affected)
- 21.sp1 ap242250 (Status: affected)
- 21.sp1 ap239722 (Status: affected)
- 21.sp1 ap241901 (Status: affected)
- 21.sp1 ap237573 (Status: affected)
- 21.sp1 ap237395 (Status: affected)
- 21.sp1 ap238193 (Status: affected)
- 21.0 ap363638 (Status: affected)
- 21.0 ap364241 (Status: affected)
- 21.0 ap365900 (Status: affected)
- 21.0 ap364562 (Status: affected)
- 21.sp1 ap205814 (Status: affected)
- 21.0 ap364755 (Status: affected)
- 21.sp1 ap241379 (Status: affected)
- 21.0 ap364863 (Status: affected)
- 21.sp1 ap221935 (Status: affected)
- 21.sp1 ap231084 (Status: affected)
- 21.0 ap364611 (Status: affected)
- 21.sp1 ap232938 (Status: affected)
- 21.sp1 ap245197 (Status: affected)
- 21.0 ap364770 (Status: affected)
- 21.sp1 ap245323 (Status: affected)
- 21.sp1 ap225333 (Status: affected)
- 21.sp1 ap245386 (Status: affected)
- 21.0 ap364635 (Status: affected)
- 21.0 ap365979 (Status: affected)
- 21.sp1 ap229942 (Status: affected)
- 21.sp1 ap244712 (Status: affected)
- 21.0 ap364711 (Status: affected)
- 21.0 ap364795 (Status: affected)
- 21.sp1 ap229160 (Status: affected)
- 21.sp1 ap219733 (Status: affected)
- 21.0 ap365984 (Status: affected)
- 21.0 ap364754 (Status: affected)
- 21.sp1 ap230925 (Status: affected)
- 21.sp1 ap231358 (Status: affected)
- 21.0 ap364843 (Status: affected)
- 21.sp1 ap244895 (Status: affected)
- 21.sp1 ap245245 (Status: affected)
- 21.sp1 ap246281 (Status: affected)
- 21.sp1 ap246189 (Status: affected)
- 21.sp1 ap246001 (Status: affected)
- 21.sp1 ap246376 (Status: affected)
- 21.sp1 ap245263 (Status: affected)
- 21.0 ap366383 (Status: affected)
- 21.0 ap367307 (Status: affected)
- 21.sp1 ap246387 (Status: affected)
- 21.0 ap366661 (Status: affected)
- 21.sp1 ap246064 (Status: affected)
- 21.0 ap366395 (Status: affected)
- 21.0 ap366411 (Status: affected)
- 21.0 ap366836 (Status: affected)
- 21.0 ap364956 (Status: affected)
- 21.0 ap366398 (Status: affected)
- 21.0 ap378144 (Status: affected)
- 21.0 ap368682 (Status: affected)
- 21.sp1 ap242593 (Status: affected)
- 21.sp1 ap243897 (Status: affected)
- 21.0 ap365040 (Status: affected)
- 21.0 ap365858 (Status: affected)
- 21.sp1 ap243581 (Status: affected)
- 21.0 ap365155 (Status: affected)
- 21.0 ap365886 (Status: affected)
- 21.0 ap365530 (Status: affected)
- 21.0 ap365060 (Status: affected)
- 21.0 ap365640 (Status: affected)
- 21.0 ap365682 (Status: affected)
- 21.sp1 ap243150 (Status: affected)
- 21.0 ap365689 (Status: affected)
- 21.0 ap365773 (Status: affected)
- 21.sp1 ap242972 (Status: affected)
- 21.sp1 ap242597 (Status: affected)
- 21.sp1 ap242778 (Status: affected)
- 21.sp1 ap243935 (Status: affected)
- 21.sp1 ap243200 (Status: affected)
- 21.sp1 ap244158 (Status: affected)
- 21.0 ap365124 (Status: affected)
- 21.0 ap364906 (Status: affected)
- 21.sp1 ap242541 (Status: affected)
- 21.sp1 ap247424 (Status: affected)
- 21.sp1 ap246996 (Status: affected)
- 21.sp1 ap247529 (Status: affected)
- 21.sp1 ap247376 (Status: affected)
- 21.sp1 ap247426 (Status: affected)
- 21.sp1 ap247568 (Status: affected)
- 21.sp1 ap246523 (Status: affected)
- 21.sp1 ap247273 (Status: affected)
- 21.sp1 ap338959 (Status: affected)
- 21.sp1 ap338876 (Status: affected)
- 21.sp1 ap339033 (Status: affected)
- 21.sp1 ap339077 (Status: affected)
- 21.sp1 ap339092 (Status: affected)
- 21.sp1 ap338839 (Status: affected)
- 21.sp1 ap341555 (Status: affected)
- 21.sp1 ap340730 (Status: affected)
- 21.sp1 ap338855 (Status: affected)
- 21.sp1 ap339156 (Status: affected)
- 21.sp1 ap341426 (Status: affected)
- 21.sp1 ap341586 (Status: affected)
- 21.sp1 ap338861 (Status: affected)
- 21.sp1 ap338830 (Status: affected)
- 21.sp1 ap341382 (Status: affected)
- 21.sp1 ap341593 (Status: affected)
- 21.sp1 ap339080 (Status: affected)
- 21.sp1 ap339108 (Status: affected)
- 21.sp1 ap341495 (Status: affected)
- 21.sp1 ap340531 (Status: affected)
- 21.sp1 ap340744 (Status: affected)
- 21.sp1 ap341470 (Status: affected)
- 21.sp1 ap341433 (Status: affected)
- 21.sp1 ap338946 (Status: affected)
- 21.sp1 ap341575 (Status: affected)
- 21.sp1 ap339048 (Status: affected)
- 21.sp1 ap338993 (Status: affected)
- 21.sp1 ap339083 (Status: affected)
- 21.sp1 ap340545 (Status: affected)
- 21.sp1 ap340745 (Status: affected)
- 21.sp1 ap341393 (Status: affected)
- 21.sp1 ap338950 (Status: affected)
- 21.sp1 ap341595 (Status: affected)
- 21.sp1 ap339061 (Status: affected)
- 21.sp1 ap339109 (Status: affected)
- 21.sp1 ap340749 (Status: affected)
- 21.sp1 ap339087 (Status: affected)
- 21.sp1 ap341425 (Status: affected)
- 21.sp1 ap339021 (Status: affected)
- 21.sp1 ap341585 (Status: affected)
- 21.sp1 ap341658 (Status: affected)
- 21.sp1 ap341540 (Status: affected)
- 21.sp1 ap339244 (Status: affected)
- 21.sp1 ap339288 (Status: affected)
- 21.sp1 ap339223 (Status: affected)
- 21.sp1 ap339301 (Status: affected)
- 21.sp1 ap341655 (Status: affected)
- 21.sp1 ap339421 (Status: affected)
- 21.sp1 ap339573 (Status: affected)
- 21.sp1 ap248266 (Status: affected)
- 21.sp1 ap341683 (Status: affected)
- 21.sp1 ap339386 (Status: affected)
- 21.sp1 ap339932 (Status: affected)
- 21.sp1 ap247717 (Status: affected)
- 21.sp1 ap248364 (Status: affected)
- 21.sp1 ap339449 (Status: affected)
- 21.sp1 ap339853 (Status: affected)
- 21.sp1 ap339626 (Status: affected)
- 21.sp1 ap339356 (Status: affected)
- 21.sp1 ap340100 (Status: affected)
- 21.sp1 ap341855 (Status: affected)
- 21.sp1 ap341850 (Status: affected)
- 21.sp1 ap341909 (Status: affected)
- 21.sp1 ap343144 (Status: affected)
- 21.sp1 ap341851 (Status: affected)
- 21.sp1 ap342960 (Status: affected)
- 21.sp1 ap342942 (Status: affected)
- 21.sp1 ap343238 (Status: affected)
- 21.sp1 ap343038 (Status: affected)
- 21.sp1 ap343243 (Status: affected)
- 21.sp1 ap343572 (Status: affected)
- 21.sp1 ap342943 (Status: affected)
- 21.sp1 ap343537 (Status: affected)
- 21.sp1 ap343251 (Status: affected)
- 21.sp1 ap343541 (Status: affected)
- 21.sp1 ap343760 (Status: affected)
- 21.sp1 ap343647 (Status: affected)
- 21.sp1 ap343204 (Status: affected)
- 21.sp1 ap342087 (Status: affected)
- 21.sp1 ap343670 (Status: affected)
- 21.sp1 ap341943 (Status: affected)
- 21.sp1 ap342132 (Status: affected)
- 21.sp1 ap342042 (Status: affected)
- 21.sp1 ap341944 (Status: affected)
- 21.sp1 ap342089 (Status: affected)
- 21.sp1 ap343774 (Status: affected)
- 21.sp1 ap342107 (Status: affected)
- 21.sp1 ap341969 (Status: affected)
- 21.sp1 ap342120 (Status: affected)
- 21.sp1 ap341945 (Status: affected)
- 21.sp1 ap342040 (Status: affected)
- 21.sp1 ap342038 (Status: affected)
- 21.sp1 ap342081 (Status: affected)
- 21.sp1 ap342168 (Status: affected)
- 21.sp1 ap342785 (Status: affected)
- 21.sp1 ap342214 (Status: affected)
- 21.sp1 ap342523 (Status: affected)
- 21.sp1 ap342786 (Status: affected)
- 21.sp1 ap342473 (Status: affected)
- 21.sp1 ap342776 (Status: affected)
- 21.sp1 ap342546 (Status: affected)
- 21.sp1 ap342606 (Status: affected)
- 21.sp1 ap342188 (Status: affected)
- 21.sp1 ap343319 (Status: affected)
- 21.sp1 ap342695 (Status: affected)
- 21.sp1 ap342325 (Status: affected)
- 21.sp1 ap342752 (Status: affected)
- 21.sp1 ap342832 (Status: affected)
- 21.sp1 ap342336 (Status: affected)
- 21.sp1 ap343446 (Status: affected)
- 21.sp1 ap342561 (Status: affected)
- 21.sp1 ap342226 (Status: affected)
- 21.sp1 ap343483 (Status: affected)
- 21.sp1 ap342289 (Status: affected)
- 21.sp1 ap342572 (Status: affected)
- 21.sp1 ap341940 (Status: affected)
- 21.sp1 ap342441 (Status: affected)
- 21.sp1 ap343488 (Status: affected)
- 21.sp1 ap343398 (Status: affected)
- 21.sp1 ap341942 (Status: affected)
- 21.sp1 ap342706 (Status: affected)
- 21.sp1 ap342847 (Status: affected)
- 21.sp1 ap342449 (Status: affected)
- 21.sp1 ap342821 (Status: affected)
- 21.sp1 ap343503 (Status: affected)
- 21.sp1 ap345071 (Status: affected)
- 21.sp1 ap345209 (Status: affected)
- 21.sp1 ap343807 (Status: affected)
- 21.sp1 ap345161 (Status: affected)
- 21.sp1 ap344467 (Status: affected)
- 21.sp1 ap343790 (Status: affected)
- 21.sp1 ap345016 (Status: affected)
- 21.sp1 ap345231 (Status: affected)
- 21.sp1 ap345086 (Status: affected)
- 21.sp1 ap345245 (Status: affected)
- 21.sp1 ap345056 (Status: affected)
- 21.sp1 ap345162 (Status: affected)
- 21.sp1 ap343808 (Status: affected)
- 21.sp1 ap344457 (Status: affected)
- 21.sp1 ap344476 (Status: affected)
- 21.sp1 ap345046 (Status: affected)
- 21.sp1 ap345195 (Status: affected)
- 21.sp1 ap345049 (Status: affected)
- 21.sp1 ap345263 (Status: affected)
- 21.sp1 ap344477 (Status: affected)
- 21.sp1 ap345399 (Status: affected)
- 21.sp1 ap345196 (Status: affected)
- 21.sp1 ap345374 (Status: affected)
- 21.sp1 ap343864 (Status: affected)
- 21.sp1 ap343861 (Status: affected)
- 21.sp1 ap344515 (Status: affected)
- 21.sp1 ap345451 (Status: affected)
- 21.sp1 ap344679 (Status: affected)
- 21.sp1 ap344557 (Status: affected)
- 21.sp1 ap343876 (Status: affected)
- 21.sp1 ap344486 (Status: affected)
- 21.sp1 ap344628 (Status: affected)
- 21.sp1 ap343830 (Status: affected)
- 21.sp1 ap344570 (Status: affected)
- 21.sp1 ap344663 (Status: affected)
- 21.sp1 ap343920 (Status: affected)
- 21.sp1 ap343942 (Status: affected)
- 21.sp1 ap344196 (Status: affected)
- 21.sp1 ap344692 (Status: affected)
- 21.sp1 ap344757 (Status: affected)
- 21.sp1 ap344716 (Status: affected)
- 21.sp1 ap344917 (Status: affected)
- 21.sp1 ap344489 (Status: affected)
- 21.sp1 ap343924 (Status: affected)
- 21.sp1 ap343879 (Status: affected)
- 21.sp1 ap344698 (Status: affected)
- 21.sp1 ap344114 (Status: affected)
- 21.sp1 ap344754 (Status: affected)
- 21.sp1 ap344762 (Status: affected)
- 21.sp1 ap344116 (Status: affected)
- 21.sp1 ap344725 (Status: affected)
- 21.sp1 ap344037 (Status: affected)
- 21.sp1 ap343981 (Status: affected)
- 21.sp1 ap343908 (Status: affected)
- 21.sp1 ap344883 (Status: affected)
- 21.sp1 ap343901 (Status: affected)
- 21.sp1 ap343918 (Status: affected)
- 21.sp1 ap344763 (Status: affected)
- 21.sp1 ap344150 (Status: affected)
- 21.sp1 ap343933 (Status: affected)
- 21.sp1 ap344263 (Status: affected)
- 21.sp1 ap344709 (Status: affected)
- 21.sp1 ap344755 (Status: affected)
- 21.sp1 ap344737 (Status: affected)
- 21.sp1 ap344684 (Status: affected)
- 21.sp1 ap344301 (Status: affected)
- 21.sp1 ap344411 (Status: affected)
- 21.sp1 ap344886 (Status: affected)
- 21.sp1 ap344783 (Status: affected)
- 21.sp1 ap344413 (Status: affected)
- 21.sp1 ap344403 (Status: affected)
- 21.sp1 ap344198 (Status: affected)
- 21.sp1 ap344272 (Status: affected)
- 21.sp1 ap344405 (Status: affected)
- 21.sp1 ap344414 (Status: affected)
- 21.sp1 ap344452 (Status: affected)
- 21.sp1 ap345704 (Status: affected)
- 21.sp1 ap345705 (Status: affected)
- 21.sp1 ap346270 (Status: affected)
- 21.sp1 ap346080 (Status: affected)
- 21.sp1 ap346156 (Status: affected)
- 21.sp1 ap345733 (Status: affected)
- 21.sp1 ap345695 (Status: affected)
- 21.sp1 ap346127 (Status: affected)
- 21.sp1 ap346273 (Status: affected)
- 21.sp1 ap346160 (Status: affected)
- 21.sp1 ap346141 (Status: affected)
- 21.sp1 ap346079 (Status: affected)
- 21.sp1 ap345503 (Status: affected)
- 21.sp1 ap345506 (Status: affected)
- 21.sp1 ap345541 (Status: affected)
- 21.sp1 ap345526 (Status: affected)
- 21.sp1 ap345557 (Status: affected)
- 21.sp1 ap345614 (Status: affected)
- 21.sp1 ap345528 (Status: affected)
- 21.sp1 ap345550 (Status: affected)
- 21.sp1 ap345454 (Status: affected)
- 21.sp1 ap345492 (Status: affected)
- 21.sp1 ap346361 (Status: affected)
- 21.sp1 ap345472 (Status: affected)
- 21.sp1 ap346475 (Status: affected)
- 21.sp1 ap346578 (Status: affected)
- 21.sp1 ap346630 (Status: affected)
- 21.sp1 ap346527 (Status: affected)
- 21.sp1 ap346300 (Status: affected)
- 21.sp1 ap346381 (Status: affected)
- 21.sp1 ap346363 (Status: affected)
- 21.sp1 ap346377 (Status: affected)
- 21.sp1 ap346541 (Status: affected)
- 21.sp1 ap346500 (Status: affected)
- 21.sp1 ap346351 (Status: affected)
- 21.sp1 ap346365 (Status: affected)
- 21.sp1 ap346321 (Status: affected)
- 21.sp1 ap346546 (Status: affected)
- 21.sp1 ap346570 (Status: affected)
- 21.sp1 ap346508 (Status: affected)
- 21.sp1 ap346629 (Status: affected)
- 21.sp1 ap346375 (Status: affected)
- 21.sp1 ap346616 (Status: affected)
- 21.sp1 ap345637 (Status: affected)
- 21.sp1 ap346512 (Status: affected)
- 21.sp1 ap346021 (Status: affected)
- 21.sp1 ap345744 (Status: affected)
- 21.sp1 ap345826 (Status: affected)
- 21.sp1 ap345762 (Status: affected)
- 21.sp1 ap346207 (Status: affected)
- 21.sp1 ap346235 (Status: affected)
- 21.sp1 ap346552 (Status: affected)
- 21.sp1 ap345745 (Status: affected)
- 21.sp1 ap345634 (Status: affected)
- 21.sp1 ap345769 (Status: affected)
- 21.sp1 ap345887 (Status: affected)
- 21.sp1 ap346219 (Status: affected)
- 21.sp1 ap345790 (Status: affected)
- 21.sp1 ap345636 (Status: affected)
- 21.sp1 ap346174 (Status: affected)
- 21.sp1 ap346006 (Status: affected)
- 21.sp1 ap346243 (Status: affected)
- 21.sp1 ap346009 (Status: affected)
- 21.sp1 ap346170 (Status: affected)
- 21.sp1 ap345872 (Status: affected)
- 21.sp1 ap346246 (Status: affected)
- 21.sp1 ap346706 (Status: affected)
- 21.sp1 ap347196 (Status: affected)
- 21.sp1 ap348019 (Status: affected)
- 21.sp1 ap347032 (Status: affected)
- 21.sp1 ap347127 (Status: affected)
- 21.sp1 ap348057 (Status: affected)
- 21.sp1 ap347065 (Status: affected)
- 21.sp1 ap348065 (Status: affected)
- 21.sp1 ap346687 (Status: affected)
- 21.sp1 ap347059 (Status: affected)
- 21.sp1 ap347218 (Status: affected)
- 21.sp1 ap347185 (Status: affected)
- 21.sp1 ap347928 (Status: affected)
- 21.sp1 ap346690 (Status: affected)
- 21.sp1 ap347950 (Status: affected)
- 21.sp1 ap348004 (Status: affected)
- 21.sp1 ap348066 (Status: affected)
- 21.sp1 ap347993 (Status: affected)
- 21.sp1 ap348031 (Status: affected)
- 21.sp1 ap347139 (Status: affected)
- 21.sp1 ap347064 (Status: affected)
- 21.sp1 ap346866 (Status: affected)
- 21.sp1 ap347981 (Status: affected)
- 21.sp1 ap346778 (Status: affected)
- 21.sp1 ap348184 (Status: affected)
- 21.sp1 ap346989 (Status: affected)
- 21.sp1 ap348474 (Status: affected)
- 21.sp1 ap347263 (Status: affected)
- 21.sp1 ap348358 (Status: affected)
- 21.sp1 ap347297 (Status: affected)
- 21.sp1 ap348514 (Status: affected)
- 21.sp1 ap346897 (Status: affected)
- 21.sp1 ap348207 (Status: affected)
- 21.sp1 ap348361 (Status: affected)
- 21.sp1 ap347644 (Status: affected)
- 21.sp1 ap346787 (Status: affected)
- 21.sp1 ap347015 (Status: affected)
- 21.sp1 ap347610 (Status: affected)
- 21.sp1 ap348486 (Status: affected)
- 21.sp1 ap348145 (Status: affected)
- 21.sp1 ap347256 (Status: affected)
- 21.sp1 ap346837 (Status: affected)
- 21.sp1 ap348536 (Status: affected)
- 21.sp1 ap347264 (Status: affected)
- 21.sp1 ap347645 (Status: affected)
- 21.sp1 ap347277 (Status: affected)
- 21.sp1 ap348503 (Status: affected)
- 21.sp1 ap348334 (Status: affected)
- 21.sp1 ap347673 (Status: affected)
- 21.sp1 ap348362 (Status: affected)
- 21.sp1 ap347258 (Status: affected)
- 21.sp1 ap347247 (Status: affected)
- 21.sp1 ap348345 (Status: affected)
- 21.sp1 ap347895 (Status: affected)
- 21.sp1 ap348436 (Status: affected)
- 21.sp1 ap348529 (Status: affected)
- 21.sp1 ap347280 (Status: affected)
- 21.sp1 ap347682 (Status: affected)
- 21.sp1 ap347723 (Status: affected)
- 21.sp1 ap347719 (Status: affected)
- 21.sp1 ap347766 (Status: affected)
- 21.sp1 ap347677 (Status: affected)
- 21.sp1 ap347889 (Status: affected)
- 21.sp1 ap347697 (Status: affected)
- 21.sp1 ap347432 (Status: affected)
- 21.sp1 ap347726 (Status: affected)
- 21.sp1 ap347476 (Status: affected)
- 21.sp1 ap347879 (Status: affected)
- 21.sp1 ap346640 (Status: affected)
- 21.sp1 ap347313 (Status: affected)
- 21.sp1 ap347536 (Status: affected)
- 21.sp1 ap347303 (Status: affected)
- 21.sp1 ap348121 (Status: affected)
- 21.sp1 ap348139 (Status: affected)
- 21.sp1 ap347436 (Status: affected)
- 21.sp1 ap347485 (Status: affected)
- 21.sp1 ap347597 (Status: affected)
- 21.sp1 ap347444 (Status: affected)
- 21.sp1 ap347431 (Status: affected)
- 21.sp1 ap347309 (Status: affected)
- 21.sp1 ap347438 (Status: affected)
- 21.sp1 ap347306 (Status: affected)
- 21.sp1 ap347551 (Status: affected)
- 21.sp1 ap348079 (Status: affected)
- 21.sp1 ap347602 (Status: affected)
- 21.sp1 ap349280 (Status: affected)
- 21.sp1 ap348879 (Status: affected)
- 21.sp1 ap348768 (Status: affected)
- 21.sp1 ap349877 (Status: affected)
- 21.sp1 ap349444 (Status: affected)
- 21.sp1 ap349235 (Status: affected)
- 21.sp1 ap349400 (Status: affected)
- 21.sp1 ap349907 (Status: affected)
- 21.sp1 ap348777 (Status: affected)
- 21.sp1 ap348880 (Status: affected)
- 21.sp1 ap350045 (Status: affected)
- 21.sp1 ap349236 (Status: affected)
- 21.sp1 ap349900 (Status: affected)
- 21.sp1 ap349952 (Status: affected)
- 21.sp1 ap349901 (Status: affected)
- 21.sp1 ap349393 (Status: affected)
- 21.sp1 ap349894 (Status: affected)
- 21.sp1 ap349476 (Status: affected)
- 21.sp1 ap349375 (Status: affected)
- 21.sp1 ap349974 (Status: affected)
- 21.sp1 ap349415 (Status: affected)
- 21.sp1 ap348779 (Status: affected)
- 21.sp1 ap349479 (Status: affected)
- 21.sp1 ap349230 (Status: affected)
- 21.sp1 ap349254 (Status: affected)
- 21.sp1 ap349915 (Status: affected)
- 21.sp1 ap349441 (Status: affected)
- 21.sp1 ap348766 (Status: affected)
- 21.sp1 ap349262 (Status: affected)
- 21.sp1 ap349232 (Status: affected)
- 21.sp1 ap349923 (Status: affected)
- 21.sp1 ap348682 (Status: affected)
- 21.sp1 ap350032 (Status: affected)
- 21.sp1 ap348629 (Status: affected)
- 21.sp1 ap348574 (Status: affected)
- 21.sp1 ap348986 (Status: affected)
- 21.sp1 ap349583 (Status: affected)
- 21.sp1 ap349009 (Status: affected)
- 21.sp1 ap348631 (Status: affected)
- 21.sp1 ap348687 (Status: affected)
- 21.sp1 ap349496 (Status: affected)
- 21.sp1 ap349509 (Status: affected)
- 21.sp1 ap348575 (Status: affected)
- 21.sp1 ap348913 (Status: affected)
- 21.sp1 ap348608 (Status: affected)
- 21.sp1 ap348964 (Status: affected)
- 21.sp1 ap349497 (Status: affected)
- 21.sp1 ap348697 (Status: affected)
- 21.sp1 ap348987 (Status: affected)
- 21.sp1 ap349044 (Status: affected)
- 21.sp1 ap348968 (Status: affected)
- 21.sp1 ap349501 (Status: affected)
- 21.sp1 ap350070 (Status: affected)
- 21.sp1 ap349517 (Status: affected)
- 21.sp1 ap349019 (Status: affected)
- 21.sp1 ap349582 (Status: affected)
- 21.sp1 ap349487 (Status: affected)
- 21.sp1 ap349020 (Status: affected)
- 21.sp1 ap348980 (Status: affected)
- 21.sp1 ap349745 (Status: affected)
- 21.sp1 ap349136 (Status: affected)
- 21.sp1 ap349219 (Status: affected)
- 21.sp1 ap349714 (Status: affected)
- 21.sp1 ap349751 (Status: affected)
- 21.sp1 ap349086 (Status: affected)
- 21.sp1 ap349198 (Status: affected)
- 21.sp1 ap349090 (Status: affected)
- 21.sp1 ap348707 (Status: affected)
- 21.sp1 ap349201 (Status: affected)
- 21.sp1 ap349107 (Status: affected)
- 21.sp1 ap349858 (Status: affected)
- 21.sp1 ap349684 (Status: affected)
- 21.sp1 ap349845 (Status: affected)
- 21.sp1 ap349818 (Status: affected)
- 21.sp1 ap349612 (Status: affected)
- 21.sp1 ap348734 (Status: affected)
- 21.sp1 ap348724 (Status: affected)
- 21.sp1 ap349643 (Status: affected)
- 21.sp1 ap349819 (Status: affected)
- 21.sp1 ap349840 (Status: affected)
- 21.sp1 ap349853 (Status: affected)
- 21.sp1 ap350429 (Status: affected)
- 21.sp1 ap348698 (Status: affected)
- 21.sp1 ap349623 (Status: affected)
- 21.sp1 ap350180 (Status: affected)
- 21.sp1 ap351261 (Status: affected)
- 21.sp1 ap349664 (Status: affected)
- 21.sp1 ap350315 (Status: affected)
- 21.sp1 ap350330 (Status: affected)
- 21.sp1 ap350404 (Status: affected)
- 21.sp1 ap350318 (Status: affected)
- 21.sp1 ap351262 (Status: affected)
- 21.sp1 ap350337 (Status: affected)
- 21.sp1 ap350211 (Status: affected)
- 21.sp1 ap350175 (Status: affected)
- 21.sp1 ap350321 (Status: affected)
- 21.sp1 ap351259 (Status: affected)
- 21.sp1 ap350322 (Status: affected)
- 21.sp1 ap350218 (Status: affected)
- 21.sp1 ap350406 (Status: affected)
- 21.sp1 ap350353 (Status: affected)
- 21.sp1 ap350396 (Status: affected)
- 21.sp1 ap350140 (Status: affected)
- 21.sp1 ap350527 (Status: affected)
- 21.sp1 ap350603 (Status: affected)
- 21.sp1 ap351335 (Status: affected)
- 21.sp1 ap350584 (Status: affected)
- 21.sp1 ap350799 (Status: affected)
- 21.sp1 ap350434 (Status: affected)
- 21.sp1 ap351365 (Status: affected)
- 21.sp1 ap350740 (Status: affected)
- 21.sp1 ap350749 (Status: affected)
- 21.sp1 ap350800 (Status: affected)
- 21.sp1 ap350604 (Status: affected)
- 21.sp1 ap350772 (Status: affected)
- 21.sp1 ap350538 (Status: affected)
- 21.sp1 ap351337 (Status: affected)
- 21.sp1 ap350760 (Status: affected)
- 21.sp1 ap350593 (Status: affected)
- 21.sp1 ap350469 (Status: affected)
- 21.sp1 ap350564 (Status: affected)
- 21.sp1 ap350566 (Status: affected)
- 21.sp1 ap351315 (Status: affected)
- 21.sp1 ap350524 (Status: affected)
- 21.sp1 ap350471 (Status: affected)
- 21.sp1 ap351497 (Status: affected)
- 21.sp1 ap351401 (Status: affected)
- 21.sp1 ap350602 (Status: affected)
- 21.sp1 ap351345 (Status: affected)
- 21.sp1 ap351425 (Status: affected)
- 21.sp1 ap350835 (Status: affected)
- 21.sp1 ap351527 (Status: affected)
- 21.sp1 ap351223 (Status: affected)
- 21.sp1 ap350864 (Status: affected)
- 21.sp1 ap350990 (Status: affected)
- 21.sp1 ap350929 (Status: affected)
- 21.sp1 ap351045 (Status: affected)
- 21.sp1 ap351020 (Status: affected)
- 21.sp1 ap351199 (Status: affected)
- 21.sp1 ap351213 (Status: affected)
- 21.sp1 ap351052 (Status: affected)
- 21.sp1 ap351023 (Status: affected)
- 21.sp1 ap350936 (Status: affected)
- 21.sp1 ap350489 (Status: affected)
- 21.sp1 ap351214 (Status: affected)
- 21.sp1 ap351232 (Status: affected)
- 21.sp1 ap351200 (Status: affected)
- 21.sp1 ap350845 (Status: affected)
- 21.sp1 ap351165 (Status: affected)
- 21.sp1 ap351179 (Status: affected)
- 21.sp1 ap350908 (Status: affected)
- 21.sp1 ap351015 (Status: affected)
- 21.sp1 ap351239 (Status: affected)
- 21.sp1 ap350969 (Status: affected)
- 21.sp1 ap351153 (Status: affected)
- 21.sp1 ap351040 (Status: affected)
- 21.sp1 ap351019 (Status: affected)
- 21.sp1 ap351205 (Status: affected)
- 21.sp1 ap351222 (Status: affected)
- 21.sp1 ap351243 (Status: affected)
- 21.sp1 ap352762 (Status: affected)
- 21.sp1 ap352508 (Status: affected)
- 21.sp1 ap352707 (Status: affected)
- 21.sp1 ap352345 (Status: affected)
- 21.sp1 ap353179 (Status: affected)
- 21.sp1 ap352511 (Status: affected)
- 21.sp1 ap353025 (Status: affected)
- 21.sp1 ap352711 (Status: affected)
- 21.sp1 ap352323 (Status: affected)
- 21.sp1 ap352915 (Status: affected)
- 21.sp1 ap352357 (Status: affected)
- 21.sp1 ap352423 (Status: affected)
- 21.sp1 ap353122 (Status: affected)
- 21.sp1 ap353311 (Status: affected)
- 21.sp1 ap352985 (Status: affected)
- 21.sp1 ap353389 (Status: affected)
- 21.sp1 ap352337 (Status: affected)
- 21.sp1 ap352293 (Status: affected)
- 21.sp1 ap352926 (Status: affected)
- 21.sp1 ap353184 (Status: affected)
- 21.sp1 ap353154 (Status: affected)
- 21.sp1 ap353001 (Status: affected)
- 21.sp1 ap352498 (Status: affected)
- 21.sp1 ap352304 (Status: affected)
- 21.sp1 ap352927 (Status: affected)
- 21.sp1 ap352386 (Status: affected)
- 21.sp1 ap353315 (Status: affected)
- 21.sp1 ap352804 (Status: affected)
- 21.sp1 ap352880 (Status: affected)
- 21.sp1 ap352887 (Status: affected)
- 21.sp1 ap351868 (Status: affected)
- 21.sp1 ap351960 (Status: affected)
- 21.sp1 ap352805 (Status: affected)
- 21.sp1 ap351924 (Status: affected)
- 21.sp1 ap353658 (Status: affected)
- 21.sp1 ap351936 (Status: affected)
- 21.sp1 ap351925 (Status: affected)
- 21.sp1 ap352182 (Status: affected)
- 21.sp1 ap353623 (Status: affected)
- 21.sp1 ap352126 (Status: affected)
- 21.sp1 ap351942 (Status: affected)
- 21.sp1 ap352184 (Status: affected)
- 21.sp1 ap352129 (Status: affected)
- 21.sp1 ap352192 (Status: affected)
- 21.sp1 ap352143 (Status: affected)
- 21.sp1 ap353558 (Status: affected)
- 21.sp1 ap352113 (Status: affected)
- 21.sp1 ap352203 (Status: affected)
- 21.sp1 ap351603 (Status: affected)
- 21.sp1 ap351639 (Status: affected)
- 21.sp1 ap351642 (Status: affected)
- 21.sp1 ap351540 (Status: affected)
- 21.sp1 ap351602 (Status: affected)
- 21.sp1 ap351641 (Status: affected)
- 21.sp1 ap351817 (Status: affected)
- 21.sp1 ap353419 (Status: affected)
- 21.sp1 ap353515 (Status: affected)
- 21.sp1 ap351682 (Status: affected)
- 21.sp1 ap351738 (Status: affected)
- 21.sp1 ap352238 (Status: affected)
- 21.sp1 ap352264 (Status: affected)
- 21.sp1 ap351798 (Status: affected)
- 21.sp1 ap351744 (Status: affected)
- 21.sp1 ap352292 (Status: affected)
- 21.sp1 ap355353 (Status: affected)
- 21.sp1 ap355300 (Status: affected)
- 21.sp1 ap351727 (Status: affected)
- 21.sp1 ap354556 (Status: affected)
- 21.sp1 ap353865 (Status: affected)
- 21.sp1 ap355356 (Status: affected)
- 21.sp1 ap353954 (Status: affected)
- 21.sp1 ap353845 (Status: affected)
- 21.sp1 ap354445 (Status: affected)
- 21.sp1 ap355069 (Status: affected)
- 21.sp1 ap354527 (Status: affected)
- 21.sp1 ap354528 (Status: affected)
- 21.sp1 ap354077 (Status: affected)
- 21.sp1 ap353852 (Status: affected)
- 21.sp1 ap353985 (Status: affected)
- 21.sp1 ap353986 (Status: affected)
- 21.sp1 ap353870 (Status: affected)
- 21.sp1 ap353856 (Status: affected)
- 21.sp1 ap355020 (Status: affected)
- 21.sp1 ap354415 (Status: affected)
- 21.sp1 ap353879 (Status: affected)
- 21.sp1 ap354005 (Status: affected)
- 21.sp1 ap354465 (Status: affected)
- 21.sp1 ap354439 (Status: affected)
- 21.sp1 ap353812 (Status: affected)
- 21.sp1 ap354535 (Status: affected)
- 21.sp1 ap355002 (Status: affected)
- 21.sp1 ap353836 (Status: affected)
- 21.sp1 ap353794 (Status: affected)
- 21.sp1 ap353708 (Status: affected)
- 21.sp1 ap354194 (Status: affected)
- 21.sp1 ap354164 (Status: affected)
- 21.sp1 ap354719 (Status: affected)
- 21.sp1 ap354316 (Status: affected)
- 21.sp1 ap354636 (Status: affected)
- 21.sp1 ap354580 (Status: affected)
- 21.sp1 ap354909 (Status: affected)
- 21.sp1 ap354595 (Status: affected)
- 21.sp1 ap354170 (Status: affected)
- 21.sp1 ap354681 (Status: affected)
- 21.sp1 ap354685 (Status: affected)
- 21.sp1 ap354200 (Status: affected)
- 21.sp1 ap354129 (Status: affected)
- 21.sp1 ap354314 (Status: affected)
- 21.sp1 ap354726 (Status: affected)
- 21.sp1 ap354755 (Status: affected)
- 21.sp1 ap354615 (Status: affected)
- 21.sp1 ap354690 (Status: affected)
- 21.sp1 ap354154 (Status: affected)
- 21.sp1 ap354649 (Status: affected)
- 21.sp1 ap354779 (Status: affected)
- 21.sp1 ap354673 (Status: affected)
- 21.sp1 ap354616 (Status: affected)
- 21.sp1 ap355125 (Status: affected)
- 21.sp1 ap355265 (Status: affected)
- 21.sp1 ap354412 (Status: affected)
- 21.sp1 ap355112 (Status: affected)
- 21.sp1 ap355126 (Status: affected)
- 21.sp1 ap355121 (Status: affected)
- 21.sp1 ap355283 (Status: affected)
- 21.sp1 ap355201 (Status: affected)
- 21.sp1 ap355102 (Status: affected)
- 21.sp1 ap355236 (Status: affected)
- 21.sp1 ap354380 (Status: affected)
- 21.sp1 ap355124 (Status: affected)
- 21.sp1 ap355452 (Status: affected)
- 21.sp1 ap355541 (Status: affected)
- 21.sp1 ap355568 (Status: affected)
- 21.sp1 ap355384 (Status: affected)
- 21.sp1 ap355599 (Status: affected)
- 21.sp1 ap355628 (Status: affected)
- 21.sp1 ap355669 (Status: affected)
- 21.sp1 ap355664 (Status: affected)
- 21.sp1 ap355647 (Status: affected)
- 21.sp1 ap355560 (Status: affected)
- 21.sp1 ap355639 (Status: affected)
- 21.sp1 ap357347 (Status: affected)
- 21.sp1 ap357525 (Status: affected)
- 21.sp1 ap357387 (Status: affected)
- 21.sp1 ap357562 (Status: affected)
- 21.sp1 ap357560 (Status: affected)
- 21.sp1 ap357452 (Status: affected)
- 21.sp1 ap357454 (Status: affected)
- 21.sp1 ap355637 (Status: affected)
- 21.sp1 ap357366 (Status: affected)
- 21.sp1 ap357330 (Status: affected)
- 21.sp1 ap357507 (Status: affected)
- 21.sp1 ap357508 (Status: affected)
- 21.sp1 ap355670 (Status: affected)
- 21.sp1 ap357417 (Status: affected)
- 21.sp1 ap355753 (Status: affected)
- 21.sp1 ap355740 (Status: affected)
- 21.sp1 ap357357 (Status: affected)
- 21.sp1 ap357430 (Status: affected)
- 21.sp1 ap356007 (Status: affected)
- 21.sp1 ap356141 (Status: affected)
- 21.sp1 ap355961 (Status: affected)
- 21.sp1 ap356152 (Status: affected)
- 21.sp1 ap356010 (Status: affected)
- 21.sp1 ap355952 (Status: affected)
- 21.sp1 ap356142 (Status: affected)
- 21.sp1 ap356029 (Status: affected)
- 21.sp1 ap355836 (Status: affected)
- 21.sp1 ap356289 (Status: affected)
- 21.sp1 ap356254 (Status: affected)
- 21.sp1 ap356497 (Status: affected)
- 21.sp1 ap356353 (Status: affected)
- 21.sp1 ap356422 (Status: affected)
- 21.sp1 ap357597 (Status: affected)
- 21.sp1 ap355806 (Status: affected)
- 21.sp1 ap355838 (Status: affected)
- 21.sp1 ap356301 (Status: affected)
- 21.sp1 ap357610 (Status: affected)
- 21.sp1 ap356572 (Status: affected)
- 21.sp1 ap357621 (Status: affected)
- 21.sp1 ap356707 (Status: affected)
- 21.sp1 ap356575 (Status: affected)
- 21.sp1 ap356350 (Status: affected)
- 21.sp1 ap356551 (Status: affected)
- 21.sp1 ap357623 (Status: affected)
- 21.sp1 ap356253 (Status: affected)
- 21.sp1 ap356320 (Status: affected)
- 21.sp1 ap355833 (Status: affected)
- 21.sp1 ap356412 (Status: affected)
- 21.sp1 ap357608 (Status: affected)
- 21.sp1 ap357595 (Status: affected)
- 21.sp1 ap357040 (Status: affected)
- 21.sp1 ap355896 (Status: affected)
- 21.sp1 ap356842 (Status: affected)
- 21.sp1 ap357081 (Status: affected)
- 21.sp1 ap357146 (Status: affected)
- 21.sp1 ap356935 (Status: affected)
- 21.sp1 ap357194 (Status: affected)
- 21.sp1 ap357176 (Status: affected)
- 21.sp1 ap357181 (Status: affected)
- 21.sp1 ap357019 (Status: affected)
- 21.sp1 ap356749 (Status: affected)
- 21.sp1 ap355897 (Status: affected)
- 21.sp1 ap356969 (Status: affected)
- 21.sp1 ap356717 (Status: affected)
- 21.sp1 ap356804 (Status: affected)
- 21.sp1 ap357185 (Status: affected)
- 21.sp1 ap356774 (Status: affected)
- 21.sp1 ap357162 (Status: affected)
- 21.sp1 ap356970 (Status: affected)
- 21.sp1 ap357039 (Status: affected)
- 21.sp1 ap359113 (Status: affected)
- 21.sp1 ap357172 (Status: affected)
- 21.sp1 ap357105 (Status: affected)
- 21.sp1 ap357187 (Status: affected)
- 21.sp1 ap359044 (Status: affected)
- 21.sp1 ap359029 (Status: affected)
- 21.sp1 ap359118 (Status: affected)
- 21.sp1 ap359037 (Status: affected)
- 21.sp1 ap358521 (Status: affected)
- 21.sp1 ap358082 (Status: affected)
- 21.sp1 ap358241 (Status: affected)
- 21.sp1 ap358099 (Status: affected)
- 21.sp1 ap358328 (Status: affected)
- 21.sp1 ap358681 (Status: affected)
- 21.sp1 ap358338 (Status: affected)
- 21.sp1 ap358845 (Status: affected)
- 21.sp1 ap358920 (Status: affected)
- 21.sp1 ap358891 (Status: affected)
- 21.sp1 ap358089 (Status: affected)
- 21.sp1 ap358133 (Status: affected)
- 21.sp1 ap358643 (Status: affected)
- 21.sp1 ap358096 (Status: affected)
- 21.sp1 ap358145 (Status: affected)
- 21.sp1 ap358604 (Status: affected)
- 21.sp1 ap358271 (Status: affected)
- 21.sp1 ap358289 (Status: affected)
- 21.sp1 ap358568 (Status: affected)
- 21.sp1 ap358647 (Status: affected)
- 21.sp1 ap358118 (Status: affected)
- 21.sp1 ap358894 (Status: affected)
- 21.sp1 ap358314 (Status: affected)
- 21.sp1 ap358944 (Status: affected)
- 21.sp1 ap357675 (Status: affected)
- 21.sp1 ap357655 (Status: affected)
- 21.sp1 ap358365 (Status: affected)
- 21.sp1 ap357737 (Status: affected)
- 21.sp1 ap358732 (Status: affected)
- 21.sp1 ap359130 (Status: affected)
- 21.sp1 ap359218 (Status: affected)
- 21.sp1 ap359570 (Status: affected)
- 21.sp1 ap359186 (Status: affected)
- 21.sp1 ap358737 (Status: affected)
- 21.sp1 ap359121 (Status: affected)
- 21.sp1 ap359464 (Status: affected)
- 21.sp1 ap358360 (Status: affected)
- 21.sp1 ap359153 (Status: affected)
- 21.sp1 ap359191 (Status: affected)
- 21.sp1 ap359293 (Status: affected)
- 21.sp1 ap359550 (Status: affected)
- 21.sp1 ap359556 (Status: affected)
- 21.sp1 ap359298 (Status: affected)
- 21.sp1 ap359164 (Status: affected)
- 21.sp1 ap357819 (Status: affected)
- 21.sp1 ap357856 (Status: affected)
- 21.sp1 ap357802 (Status: affected)
- 21.sp1 ap359421 (Status: affected)
- 21.sp1 ap359324 (Status: affected)
- 21.sp1 ap357761 (Status: affected)
- 21.sp1 ap358026 (Status: affected)
- 21.sp1 ap357889 (Status: affected)
- 21.sp1 ap358046 (Status: affected)
- 21.sp1 ap358013 (Status: affected)
- 21.sp1 ap360943 (Status: affected)
- 21.sp1 ap360198 (Status: affected)
- 21.sp1 ap361305 (Status: affected)
- 21.sp1 ap361154 (Status: affected)
- 21.sp1 ap361353 (Status: affected)
- 21.sp1 ap360167 (Status: affected)
- 21.sp1 ap361155 (Status: affected)
- 21.sp1 ap360989 (Status: affected)
- 21.sp1 ap360992 (Status: affected)
- 21.sp1 ap359657 (Status: affected)
- 21.sp1 ap360250 (Status: affected)
- 21.sp1 ap361061 (Status: affected)
- 21.sp1 ap360319 (Status: affected)
- 21.sp1 ap361116 (Status: affected)
- 21.sp1 ap360503 (Status: affected)
- 21.sp1 ap360412 (Status: affected)
- 21.sp1 ap361016 (Status: affected)
- 21.sp1 ap361076 (Status: affected)
- 21.sp1 ap360531 (Status: affected)
- 21.sp1 ap360443 (Status: affected)
- 21.sp1 ap360362 (Status: affected)
- 21.sp1 ap360231 (Status: affected)
- 21.sp1 ap361035 (Status: affected)
- 21.sp1 ap360245 (Status: affected)
- 21.sp1 ap360464 (Status: affected)
- 21.sp1 ap359791 (Status: affected)
- 21.sp1 ap359772 (Status: affected)
- 21.sp1 ap361453 (Status: affected)
- 21.sp1 ap359767 (Status: affected)
- 21.sp1 ap360615 (Status: affected)
- 21.sp1 ap361459 (Status: affected)
- 21.sp1 ap360783 (Status: affected)
- 21.sp1 ap360627 (Status: affected)
- 21.sp1 ap360790 (Status: affected)
- 21.sp1 ap360785 (Status: affected)
- 21.sp1 ap360906 (Status: affected)
- 21.sp1 ap361443 (Status: affected)
- 21.sp1 ap359812 (Status: affected)
- 21.sp1 ap359908 (Status: affected)
- 21.sp1 ap360137 (Status: affected)
- 21.sp1 ap359973 (Status: affected)
- 21.sp1 ap359922 (Status: affected)
- 21.sp1 ap359925 (Status: affected)
- 21.sp1 ap359892 (Status: affected)
- 21.sp1 ap361643 (Status: affected)
- 21.sp1 ap361651 (Status: affected)
- 21.sp1 ap361691 (Status: affected)
- 21.sp1 ap361620 (Status: affected)
- 21.sp1 ap361637 (Status: affected)
- 21.sp1 ap362964 (Status: affected)
- 21.sp1 ap361823 (Status: affected)
- 21.sp1 ap361831 (Status: affected)
- 21.sp1 ap363023 (Status: affected)
- 21.sp1 ap362963 (Status: affected)
- 21.sp1 ap361847 (Status: affected)
- 21.sp1 ap363208 (Status: affected)
- 21.sp1 ap363221 (Status: affected)
- 21.sp1 ap363049 (Status: affected)
- 21.sp1 ap363130 (Status: affected)
- 21.sp1 ap363197 (Status: affected)
- 21.sp1 ap363361 (Status: affected)
- 21.sp1 ap363315 (Status: affected)
- 21.sp1 ap363408 (Status: affected)
- 21.sp1 ap362324 (Status: affected)
- 21.sp1 ap362314 (Status: affected)
- 21.sp1 ap362525 (Status: affected)
- 21.sp1 ap362364 (Status: affected)
- 21.sp1 ap362313 (Status: affected)
- 21.sp1 ap363233 (Status: affected)
- 21.sp1 ap363297 (Status: affected)
- 21.sp1 ap363330 (Status: affected)
- 21.sp1 ap363415 (Status: affected)
- 21.sp1 ap362365 (Status: affected)
- 21.sp1 ap362316 (Status: affected)
- 21.sp1 ap363394 (Status: affected)
- 21.sp1 ap363431 (Status: affected)
- 21.sp1 ap363247 (Status: affected)
- 21.sp1 ap362367 (Status: affected)
- 21.sp1 ap363348 (Status: affected)
- 21.sp1 ap361537 (Status: affected)
- 21.sp1 ap363305 (Status: affected)
- 21.sp1 ap361551 (Status: affected)
- 21.sp1 ap362120 (Status: affected)
- 21.sp1 ap362149 (Status: affected)
- 21.sp1 ap362262 (Status: affected)
- 21.sp1 ap362795 (Status: affected)
- 21.sp1 ap362680 (Status: affected)
- 21.sp1 ap362578 (Status: affected)
- 21.sp1 ap362707 (Status: affected)
- 21.sp1 ap363693 (Status: affected)
- 21.sp1 ap363644 (Status: affected)
- 21.sp1 ap362263 (Status: affected)
- 21.sp1 ap361930 (Status: affected)
- 21.sp1 ap362019 (Status: affected)
- 21.sp1 ap362960 (Status: affected)
- 21.sp1 ap362122 (Status: affected)
- 21.sp1 ap362708 (Status: affected)
- 21.sp1 ap363671 (Status: affected)
- 21.sp1 ap362683 (Status: affected)
- 21.sp1 ap363694 (Status: affected)
- 21.sp1 ap362798 (Status: affected)
- 21.sp1 ap362075 (Status: affected)
- 21.sp1 ap362193 (Status: affected)
- 21.sp1 ap362537 (Status: affected)
- 21.sp1 ap362269 (Status: affected)
- 21.sp1 ap361936 (Status: affected)
- 21.sp1 ap362080 (Status: affected)
- 21.sp1 ap363609 (Status: affected)
- 21.sp1 ap362261 (Status: affected)
- 21.sp1 ap362141 (Status: affected)
- 21.sp1 ap363672 (Status: affected)
- 21.sp1 ap362676 (Status: affected)
- 21.sp1 ap363577 (Status: affected)
- 21.sp1 ap363638 (Status: affected)
- 21.sp1 ap362741 (Status: affected)
- 21.sp1 ap365640 (Status: affected)
- 21.sp1 ap365900 (Status: affected)
- 21.sp1 ap365773 (Status: affected)
- 21.sp1 ap365682 (Status: affected)
- 21.sp1 ap365754 (Status: affected)
- 21.sp1 ap363768 (Status: affected)
- 21.sp1 ap365858 (Status: affected)
- 21.sp1 ap363844 (Status: affected)
- 21.sp1 ap365689 (Status: affected)
- 21.sp1 ap363845 (Status: affected)
- 21.sp1 ap363976 (Status: affected)
- 21.sp1 ap363869 (Status: affected)
- 21.sp1 ap365886 (Status: affected)
- 21.sp1 ap363824 (Status: affected)
- 21.sp1 ap363984 (Status: affected)
- 21.sp1 ap364371 (Status: affected)
- 21.sp1 ap365058 (Status: affected)
- 21.sp1 ap365186 (Status: affected)
- 21.sp1 ap365530 (Status: affected)
- 21.sp1 ap366120 (Status: affected)
- 21.sp1 ap365155 (Status: affected)
- 21.sp1 ap364906 (Status: affected)
- 21.sp1 ap364372 (Status: affected)
- 21.sp1 ap365060 (Status: affected)
- 21.sp1 ap365030 (Status: affected)
- 21.sp1 ap365979 (Status: affected)
- 21.sp1 ap366179 (Status: affected)
- 21.sp1 ap364956 (Status: affected)
- 21.sp1 ap364381 (Status: affected)
- 21.sp1 ap365066 (Status: affected)
- 21.sp1 ap365984 (Status: affected)
- 21.sp1 ap365558 (Status: affected)
- 21.sp1 ap364960 (Status: affected)
- 21.sp1 ap366201 (Status: affected)
- 21.sp1 ap365124 (Status: affected)
- 21.sp1 ap365040 (Status: affected)
- 21.sp1 ap364148 (Status: affected)
- 21.sp1 ap364532 (Status: affected)
- 21.sp1 ap364101 (Status: affected)
- 21.sp1 ap364110 (Status: affected)
- 21.sp1 ap364075 (Status: affected)
- 21.sp1 ap364635 (Status: affected)
- 21.sp1 ap364862 (Status: affected)
- 21.sp1 ap364754 (Status: affected)
- 21.sp1 ap364146 (Status: affected)
- 21.sp1 ap364705 (Status: affected)
- 21.sp1 ap364778 (Status: affected)
- 21.sp1 ap364611 (Status: affected)
- 21.sp1 ap366217 (Status: affected)
- 21.sp1 ap364863 (Status: affected)
- 21.sp1 ap364795 (Status: affected)
- 21.sp1 ap364711 (Status: affected)
- 21.sp1 ap364755 (Status: affected)
- 21.sp1 ap366247 (Status: affected)
- 21.sp1 ap364562 (Status: affected)
- 21.sp1 ap366252 (Status: affected)
- 21.sp1 ap364718 (Status: affected)
- 21.sp1 ap364770 (Status: affected)
- 21.sp1 ap364825 (Status: affected)
- 21.sp1 ap364518 (Status: affected)
- 21.sp1 ap364753 (Status: affected)
- 21.sp1 ap364622 (Status: affected)
- 21.sp1 ap364843 (Status: affected)
- 21.sp1 ap363753 (Status: affected)
- 21.sp1 ap364210 (Status: affected)
- 21.sp1 ap364241 (Status: affected)
- 21.sp1 ap364347 (Status: affected)
- 21.sp1 ap364248 (Status: affected)
- 21.sp1 ap366352 (Status: affected)
- 21.sp1 ap364367 (Status: affected)
- 21.sp1 ap366334 (Status: affected)
- 21.sp1 ap366366 (Status: affected)
- 21.sp1 ap366383 (Status: affected)
- 21.sp1 ap366395 (Status: affected)
- 21.sp1 ap366358 (Status: affected)
- 21.sp1 ap366335 (Status: affected)
- 21.sp1 ap366398 (Status: affected)
- 21.sp1 ap366661 (Status: affected)
- 21.sp1 ap366525 (Status: affected)
- 21.sp1 ap366683 (Status: affected)
- 21.sp1 ap366715 (Status: affected)
- 21.sp1 ap366296 (Status: affected)
- 21.sp1 ap367406 (Status: affected)
- 21.sp1 ap366797 (Status: affected)
- 21.sp1 ap367413 (Status: affected)
- 21.sp1 ap366835 (Status: affected)
- 21.sp1 ap367895 (Status: affected)
- 21.sp1 ap369276 (Status: affected)
- 21.sp1 ap368179 (Status: affected)
- 21.sp1 ap368153 (Status: affected)
- 21.sp1 ap368306 (Status: affected)
- 21.sp1 ap367419 (Status: affected)
- 21.sp1 ap368352 (Status: affected)
- 21.sp1 ap367810 (Status: affected)
- 21.sp1 ap369284 (Status: affected)
- 21.sp1 ap368195 (Status: affected)
- 21.sp1 ap368127 (Status: affected)
- 21.sp1 ap367827 (Status: affected)
- 21.sp1 ap368000 (Status: affected)
- 21.sp1 ap369300 (Status: affected)
- 21.sp1 ap366411 (Status: affected)
- 21.sp1 ap367477 (Status: affected)
- 21.sp1 ap367488 (Status: affected)
- 21.sp1 ap366443 (Status: affected)
- 21.sp1 ap369881 (Status: affected)
- 21.sp1 ap369127 (Status: affected)
- 21.sp1 ap369763 (Status: affected)
- 21.sp1 ap368651 (Status: affected)
- 21.sp1 ap368854 (Status: affected)
- 21.sp1 ap369489 (Status: affected)
- 21.sp1 ap367781 (Status: affected)
- 21.sp1 ap368682 (Status: affected)
- 21.sp1 ap368874 (Status: affected)
- 21.sp1 ap369509 (Status: affected)
- 21.sp1 ap368517 (Status: affected)
- 21.sp1 ap369770 (Status: affected)
- 21.sp1 ap369885 (Status: affected)
- 21.sp1 ap369623 (Status: affected)
- 21.sp1 ap368503 (Status: affected)
- 21.sp1 ap367547 (Status: affected)
- 21.sp1 ap369021 (Status: affected)
- 21.sp1 ap369136 (Status: affected)
- 21.sp1 ap368827 (Status: affected)
- 21.sp1 ap368458 (Status: affected)
- 21.sp1 ap369675 (Status: affected)
- 21.sp1 ap368590 (Status: affected)
- 21.sp1 ap369521 (Status: affected)
- 21.sp1 ap369775 (Status: affected)
- 21.sp1 ap369035 (Status: affected)
- 21.sp1 ap368634 (Status: affected)
- 21.sp1 ap368830 (Status: affected)
- 21.sp1 ap367487 (Status: affected)
- 21.sp1 ap369928 (Status: affected)
- 21.sp1 ap369783 (Status: affected)
- 21.sp1 ap366999 (Status: affected)
- 21.sp1 ap367222 (Status: affected)
- 21.sp1 ap366905 (Status: affected)
- 21.sp1 ap367324 (Status: affected)
- 21.sp1 ap367007 (Status: affected)
- 21.sp1 ap367332 (Status: affected)
- 21.sp1 ap366968 (Status: affected)
- 21.sp1 ap367263 (Status: affected)
- 21.sp1 ap367325 (Status: affected)
- 21.sp1 ap366836 (Status: affected)
- 21.sp1 ap369580 (Status: affected)
- 21.sp1 ap369731 (Status: affected)
- 21.sp1 ap367292 (Status: affected)
- 21.sp1 ap367129 (Status: affected)
- 21.sp1 ap366984 (Status: affected)
- 21.sp1 ap367307 (Status: affected)
- 21.sp1 ap366982 (Status: affected)
- 21.sp1 ap374641 (Status: affected)
- 21.sp1 ap375370 (Status: affected)
- 21.sp1 ap374794 (Status: affected)
- 21.sp1 ap374355 (Status: affected)
- 21.sp1 ap374472 (Status: affected)
- 21.sp1 ap375207 (Status: affected)
- 21.sp1 ap374480 (Status: affected)
- 21.sp1 ap374411 (Status: affected)
- 21.sp1 ap374286 (Status: affected)
- 21.sp1 ap374786 (Status: affected)
- 21.sp1 ap375351 (Status: affected)
- 21.sp1 ap375039 (Status: affected)
- 21.sp1 ap374869 (Status: affected)
- 21.sp1 ap375382 (Status: affected)
- 21.sp1 ap374255 (Status: affected)
- 21.sp1 ap374315 (Status: affected)
- 21.sp1 ap375094 (Status: affected)
- 21.sp1 ap374249 (Status: affected)
- 21.sp1 ap375153 (Status: affected)
- 21.sp1 ap374454 (Status: affected)
- 21.sp1 ap371506 (Status: affected)
- 21.sp1 ap374600 (Status: affected)
- 21.sp1 ap374793 (Status: affected)
- 21.sp1 ap371365 (Status: affected)
- 21.sp1 ap375205 (Status: affected)
- 21.sp1 ap372107 (Status: affected)
- 21.sp1 ap372422 (Status: affected)
- 21.sp1 ap373294 (Status: affected)
- 21.sp1 ap373534 (Status: affected)
- 21.sp1 ap372533 (Status: affected)
- 21.sp1 ap372453 (Status: affected)
- 21.sp1 ap374892 (Status: affected)
- 21.sp1 ap373137 (Status: affected)
- 21.sp1 ap372796 (Status: affected)
- 21.sp1 ap372015 (Status: affected)
- 21.sp1 ap373047 (Status: affected)
- 21.sp1 ap373330 (Status: affected)
- 21.sp1 ap372623 (Status: affected)
- 21.sp1 ap372405 (Status: affected)
- 21.sp1 ap373182 (Status: affected)
- 21.sp1 ap372578 (Status: affected)
- 21.sp1 ap372207 (Status: affected)
- 21.sp1 ap373197 (Status: affected)
- 21.sp1 ap373332 (Status: affected)
- 21.sp1 ap372610 (Status: affected)
- 21.sp1 ap372420 (Status: affected)
- 21.sp1 ap372432 (Status: affected)
- 21.sp1 ap372480 (Status: affected)
- 21.sp1 ap372345 (Status: affected)
- 21.sp1 ap372622 (Status: affected)
- 21.sp1 ap372436 (Status: affected)
- 21.sp1 ap372077 (Status: affected)
- 21.sp1 ap372505 (Status: affected)
- 21.sp1 ap370194 (Status: affected)
- 21.sp1 ap369997 (Status: affected)
- 21.sp1 ap370147 (Status: affected)
- 21.sp1 ap371768 (Status: affected)
- 21.sp1 ap370249 (Status: affected)
- 21.sp1 ap371886 (Status: affected)
- 21.sp1 ap370329 (Status: affected)
- 21.sp1 ap371582 (Status: affected)
- 21.sp1 ap370036 (Status: affected)
- 21.sp1 ap371977 (Status: affected)
- 21.sp1 ap371917 (Status: affected)
- 21.sp1 ap370218 (Status: affected)
- 21.sp1 ap371721 (Status: affected)
- 21.sp1 ap371956 (Status: affected)
- 21.sp1 ap370017 (Status: affected)
- 21.sp1 ap371982 (Status: affected)
- 21.sp1 ap371922 (Status: affected)
- 21.sp1 ap371634 (Status: affected)
- 21.sp1 ap370085 (Status: affected)
- 21.sp1 ap371612 (Status: affected)
- 21.sp1 ap371868 (Status: affected)
- 21.sp1 ap372850 (Status: affected)
- 21.sp1 ap370347 (Status: affected)
- 21.sp1 ap373875 (Status: affected)
- 21.sp1 ap374162 (Status: affected)
- 21.sp1 ap374131 (Status: affected)
- 21.sp1 ap373882 (Status: affected)
- 21.sp1 ap373004 (Status: affected)
- 21.sp1 ap374055 (Status: affected)
- 21.sp1 ap373872 (Status: affected)
- 21.sp1 ap373861 (Status: affected)
- 21.sp1 ap374037 (Status: affected)
- 21.sp1 ap374122 (Status: affected)
- 21.sp1 ap371281 (Status: affected)
- 21.sp1 ap370936 (Status: affected)
- 21.sp1 ap371254 (Status: affected)
- 21.sp1 ap371258 (Status: affected)
- 21.sp1 ap370362 (Status: affected)
- 21.sp1 ap370538 (Status: affected)
- 21.sp1 ap370539 (Status: affected)
- 21.sp1 ap370442 (Status: affected)
- 21.sp1 ap371259 (Status: affected)
- 21.sp1 ap376817 (Status: affected)
- 21.sp1 ap376706 (Status: affected)
- 21.sp1 ap376935 (Status: affected)
- 21.sp1 ap376594 (Status: affected)
- 21.sp1 ap370908 (Status: affected)
- 21.sp1 ap376666 (Status: affected)
- 21.sp1 ap371233 (Status: affected)
- 21.sp1 ap376156 (Status: affected)
- 21.sp1 ap376317 (Status: affected)
- 21.sp1 ap376001 (Status: affected)
- 21.sp1 ap377033 (Status: affected)
- 21.sp1 ap376696 (Status: affected)
- 21.sp1 ap376889 (Status: affected)
- 21.sp1 ap376798 (Status: affected)
- 21.sp1 ap376042 (Status: affected)
- 21.sp1 ap376809 (Status: affected)
- 21.sp1 ap376024 (Status: affected)
- 21.sp1 ap376308 (Status: affected)
- 21.sp1 ap376699 (Status: affected)
- 21.sp1 ap376934 (Status: affected)
- 21.sp1 ap370720 (Status: affected)
- 21.sp1 ap375430 (Status: affected)
- 21.sp1 ap379493 (Status: affected)
- 21.sp1 ap375466 (Status: affected)
- 21.sp9 ap356817 (Status: affected)
- 21.sp9 ap360362 (Status: affected)
- 21.sp9 ap355353 (Status: affected)
- 21.sp9 ap349872 (Status: affected)
- 21.sp9 ap361945 (Status: affected)
- 21.sp1 ap375398 (Status: affected)
- 21.sp9 ap350799 (Status: affected)
- 21.sp9 ap359029 (Status: affected)
- 21.sp9 ap352337 (Status: affected)
- 21.sp9 ap363332 (Status: affected)
- 21.sp9 ap371587 (Status: affected)
- 21.sp9 ap351160 (Status: affected)
- 21.sp9 ap359674 (Status: affected)
- 21.sp9 ap369134 (Status: affected)
- 21.sp9 ap368399 (Status: affected)
- 21.sp9 ap375382 (Status: affected)
- 21.sp9 ap352372 (Status: affected)
- 21.sp9 ap373875 (Status: affected)
- 21.sp9 ap355774 (Status: affected)
- 21.sp9 ap357347 (Status: affected)
- 21.sp9 ap375625 (Status: affected)
- 21.sp9 ap372098 (Status: affected)
- 21.sp9 ap374131 (Status: affected)
- 21.sp1 ap379600 (Status: affected)
- 21.sp9 ap364239 (Status: affected)
- 21.sp9 ap350032 (Status: affected)
- 21.sp9 ap360401 (Status: affected)
- 21.sp9 ap343774 (Status: affected)
- 21.sp9 (Status: affected)
- 21.sp9 ap362075 (Status: affected)
- 21.sp1 ap380506 (Status: affected)
- 21.sp9 ap351248 (Status: affected)
- 21.sp9 ap354646 (Status: affected)
- 21.sp9 ap362575 (Status: affected)
- 21.sp9 ap360506 (Status: affected)
- 21.sp9 ap350110 (Status: affected)
- 21.sp9 ap374965 (Status: affected)
- 21.sp9 ap357436 (Status: affected)
- 21.sp1 ap379775 (Status: affected)
- 21.sp9 ap360116 (Status: affected)
- 21.sp9 ap356253 (Status: affected)
- 21.sp9 ap366880 (Status: affected)
- 21.sp9 ap369748 (Status: affected)
- 21.sp9 ap376766 (Status: affected)
- 21.sp9 ap356749 (Status: affected)
- 21.sp9 ap347741 (Status: affected)
- 21.sp9 ap360250 (Status: affected)
- 21.sp9 ap358886 (Status: affected)
- 21.sp9 ap355300 (Status: affected)
- 21.sp9 ap372623 (Status: affected)
- 21.sp9 ap352304 (Status: affected)
- 21.sp9 ap350573 (Status: affected)
- 21.sp9 ap377934 (Status: affected)
- 21.sp9 ap360912 (Status: affected)
- 21.sp9 ap375217 (Status: affected)
- 21.sp1 ap377241 (Status: affected)
- 21.sp9 ap369881 (Status: affected)
- 21.sp1 ap378154 (Status: affected)
- 21.sp1 ap377737 (Status: affected)
- 21.sp9 ap362582 (Status: affected)
- 21.sp1 ap378886 (Status: affected)
- 21.sp9 ap373770 (Status: affected)
- 21.sp9 ap367207 (Status: affected)
- 21.sp1 ap377555 (Status: affected)
- 21.sp1 ap378818 (Status: affected)
- 21.sp1 ap378029 (Status: affected)
- 21.sp1 ap377569 (Status: affected)
- 21.sp1 ap378143 (Status: affected)
- 21.sp1 ap378242 (Status: affected)
- 21.sp1 ap377091 (Status: affected)
- 21.sp1 ap378144 (Status: affected)
- 21.sp1 ap375748 (Status: affected)
- 21.sp1 ap375625 (Status: affected)
- 21.sp1 ap375502 (Status: affected)
- 21.sp1 ap375661 (Status: affected)
- 21.sp1 ap375539 (Status: affected)
- 21.sp1 ap375469 (Status: affected)
- 21.sp1 ap375603 (Status: affected)
- 21.sp1 ap375488 (Status: affected)
- 21.0 ap339021 (Status: affected)
- 21.0 ap342832 (Status: affected)
- 21.0 ap344457 (Status: affected)
- 21.0 ap349623 (Status: affected)
- 21.0 ap350090 (Status: affected)
- 21.0 ap355806 (Status: affected)
- 21.0 ap356422 (Status: affected)
- 21.0 ap362262 (Status: affected)
- 21.sp1 ap342851 (Status: affected)
- 21.sp1 ap343504 (Status: affected)
- 21.sp1 ap343782 (Status: affected)
- 21.sp1 ap345470 (Status: affected)
- 21.sp1 ap347008 (Status: affected)
- 21.sp1 ap351956 (Status: affected)
- 21.sp1 ap352170 (Status: affected)
- 21.sp1 ap356752 (Status: affected)
- 21.sp1 ap365257 (Status: affected)
- 21.sp1 ap369784 (Status: affected)
- 21.sp1 ap373016 (Status: affected)
- 21.sp9 ap378993 (Status: affected)
- RI.2021.02 (Status: affected)
- RI.2021.08 (Status: affected)
- RI.2021.09 (Status: affected)
- RI.2021.10 (Status: affected)
- RI.2021.11 (Status: affected)
- RI.2021.12 (Status: affected)
- RI.2022.02 (Status: affected)
- RI.2022.03 (Status: affected)
- RI.2022.04 (Status: affected)
- RI.2022.07 (Status: affected)
- RI.2022.06 (Status: affected)
- RI.2022.05 (Status: affected)
- RI.2022.08 (Status: affected)
- RI.2022.09 (Status: affected)
- RI.2022.10 (Status: affected)
- RI.2022.12 (Status: affected)
- RI.2023.01 (Status: affected)
- RI.2023.03 (Status: affected)
- RI.2023.02 (Status: affected)
- RI.2023.04 (Status: affected)
- RI.2023.05 (Status: affected)
- RI.2023.07 (Status: affected)
- RI.2023.08 (Status: affected)
- RI.2023.09 (Status: affected)
- RI.2023.10 (Status: affected)
### References
1. [cisco-sa-broadworks-xss-6syj82Ju](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-6syj82Ju)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-9098, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-9098 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9098
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:09 UTC
- **Last Updated**: March 20, 2025 at 18:36 UTC
- **Reserved Date**: September 23, 2024 at 10:15 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
In lunary-ai/lunary before version 1.4.30, a privilege escalation vulnerability exists where admins can invite new members with billing permissions, thereby gaining unauthorized access to billing resources. This issue arises because the user creation endpoint does not restrict admins from inviting users with billing roles. As a result, admins can circumvent the intended access control, posing a risk to the organization's financial resources.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**lunary-ai - lunary-ai/lunary**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/75d466ae-8591-44d5-9160-eea7cad0c4fc)
2. [](https://github.com/lunary-ai/lunary/commit/a8d7b2959e87c30fbafdb12af7ffa093385dcc60)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-9371, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-9371 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9371
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 21:46 UTC
- **Reserved Date**: February 28, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In libvpx, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-132783254
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10)
2. [[oss-security] 20191025 Security fixes from Android 10 release which are relevant outside the Android ecosystem?](http://www.openwall.com/lists/oss-security/2019/10/25/17)
3. [[oss-security] 20191026 Re: Security fixes from Android 10 release which are relevant outside the Android ecosystem?](http://www.openwall.com/lists/oss-security/2019/10/27/1)
4. [[oss-security] 20191107 Re: Security fixes from Android 10 release which are relevant outside the Android ecosystem?](http://www.openwall.com/lists/oss-security/2019/11/07/1)
5. [USN-4199-1](https://usn.ubuntu.com/4199-1/)
6. [20191128 [SECURITY] [DSA 4578-1] libvpx security update](https://seclists.org/bugtraq/2019/Nov/43)
7. [DSA-4578](https://www.debian.org/security/2019/dsa-4578)
8. [FEDORA-2020-65eac1b48b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/)
9. [FEDORA-2020-6cd410d9e4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/)
10. [openSUSE-SU-2020:0105](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html)
11. [GLSA-202003-59](https://security.gentoo.org/glsa/202003-59)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-1993, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-1993 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1993
- **State**: PUBLISHED
- **Published Date**: November 08, 2015 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 05:02 UTC
- **Reserved Date**: February 19, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security QRadar Incident Forensics 7.2.x before 7.2.5 Patch 5 does not set the secure flag for unspecified cookies in an https session, which makes it easier for remote attackers to capture these cookies by intercepting their transmission within an http session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21968270)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-42784, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-42784 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42784
- **State**: PUBLISHED
- **Published Date**: December 12, 2023 at 10:02 UTC
- **Last Updated**: October 08, 2024 at 08:39 UTC
- **Reserved Date**: October 11, 2022 at 11:45 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA1) (All versions >= V8.3), LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) (All versions >= V8.3), LOGO! 230RCE (6ED1052-1FB08-0BA1) (All versions >= V8.3), LOGO! 230RCEo (6ED1052-2FB08-0BA1) (All versions >= V8.3), LOGO! 24CE (6ED1052-1CC08-0BA1) (All versions >= V8.3), LOGO! 24CEo (6ED1052-2CC08-0BA1) (All versions >= V8.3), LOGO! 24RCE (6ED1052-1HB08-0BA1) (All versions >= V8.3), LOGO! 24RCEo (6ED1052-2HB08-0BA1) (All versions >= V8.3), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) (All versions >= V8.3). Affected devices are vulnerable to an electromagnetic fault injection. This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed by the product CA. The generation of a custom certificate allows communication with, and impersonation of, any device of the same version.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-1319: Security Weakness
### Affected Products
**Siemens - LOGO! 12/24RCE**
Affected versions:
- V8.3 (Status: affected)
**Siemens - LOGO! 12/24RCEo**
Affected versions:
- V8.3 (Status: affected)
**Siemens - LOGO! 230RCE**
Affected versions:
- V8.3 (Status: affected)
**Siemens - LOGO! 230RCEo**
Affected versions:
- V8.3 (Status: affected)
**Siemens - LOGO! 24CE**
Affected versions:
- V8.3 (Status: affected)
**Siemens - LOGO! 24CEo**
Affected versions:
- V8.3 (Status: affected)
**Siemens - LOGO! 24RCE**
Affected versions:
- V8.3 (Status: affected)
**Siemens - LOGO! 24RCEo**
Affected versions:
- V8.3 (Status: affected)
**Siemens - SIPLUS LOGO! 12/24RCE**
Affected versions:
- V8.3 (Status: affected)
**Siemens - SIPLUS LOGO! 12/24RCEo**
Affected versions:
- V8.3 (Status: affected)
**Siemens - SIPLUS LOGO! 230RCE**
Affected versions:
- V8.3 (Status: affected)
**Siemens - SIPLUS LOGO! 230RCEo**
Affected versions:
- V8.3 (Status: affected)
**Siemens - SIPLUS LOGO! 24CE**
Affected versions:
- V8.3 (Status: affected)
**Siemens - SIPLUS LOGO! 24CEo**
Affected versions:
- V8.3 (Status: affected)
**Siemens - SIPLUS LOGO! 24RCE**
Affected versions:
- V8.3 (Status: affected)
**Siemens - SIPLUS LOGO! 24RCEo**
Affected versions:
- V8.3 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-844582.pdf)
2. [](https://cert-portal.siemens.com/productcert/html/ssa-844582.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-2482, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-2482 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2482
- **State**: PUBLISHED
- **Published Date**: June 08, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 23:00 UTC
- **Reserved Date**: June 15, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A certain Red Hat patch to the sctp_sock_migrate function in net/sctp/socket.c in the Linux kernel before 2.6.21, as used in Red Hat Enterprise Linux (RHEL) 5, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted SCTP packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=714867)
2. [RHSA-2011:1212](http://rhn.redhat.com/errata/RHSA-2011-1212.html)
3. [[oss-security] 20110830 kernel: CVE-2011-2482/2519](http://www.openwall.com/lists/oss-security/2011/08/30/1)
4. [](http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21)
5. [](https://github.com/torvalds/linux/commit/ea2bc483ff5caada7c4aa0d5fbf87d3a6590273d)
6. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea2bc483ff5caada7c4aa0d5fbf87d3a6590273d)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-39500, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-39500 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-39500
- **State**: PUBLISHED
- **Published Date**: May 23, 2025 at 12:43 UTC
- **Last Updated**: May 23, 2025 at 13:30 UTC
- **Reserved Date**: April 16, 2025 at 06:24 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in GoodLayers Goodlayers Hostel allows Object Injection. This issue affects Goodlayers Hostel: from n/a through 3.1.2.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**GoodLayers - Goodlayers Hostel**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/gdlr-hostel/vulnerability/wordpress-goodlayers-hostel-plugin-3-1-2-php-object-injection-vulnerability?_s_id=cve)
### Credits
- Bonds (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-21201, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-21201 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21201
- **State**: PUBLISHED
- **Published Date**: June 28, 2023 at 00:00 UTC
- **Last Updated**: December 03, 2024 at 19:41 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In on_create_record_event of btif_sdp_server.cc, there is a possible out of bounds read due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-263545186
### Affected Products
**n/a - Android**
Affected versions:
- Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2023-06-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-0227, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-0227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0227
- **State**: PUBLISHED
- **Published Date**: January 07, 2010 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 16:53 UTC
- **Reserved Date**: January 07, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Verbatim Corporate Secure and Corporate Secure FIPS Edition USB flash drives validate passwords with a program running on the host computer rather than the device hardware, which allows physically proximate attackers to access the cleartext drive contents via a modified program.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1023409](http://securitytracker.com/id?1023409)
2. [](http://it.slashdot.org/story/10/01/05/1734242/)
3. [](http://www.h-online.com/security/news/item/NIST-certified-USB-Flash-drives-with-hardware-encryption-cracked-895308.html)
4. [](http://www.verbatim.com/security/security-update.cfm)
5. [](http://blogs.zdnet.com/hardware/?p=6655)
6. [](https://www.ironkey.com/usb-flash-drive-flaw-exposed)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-38571, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-38571 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38571
- **State**: PUBLISHED
- **Published Date**: August 28, 2022 at 16:39 UTC
- **Last Updated**: August 03, 2024 at 11:02 UTC
- **Reserved Date**: August 22, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda M3 V1.0.0.12(4856) was discovered to contain a buffer overflow in the function formSetGuideListItem.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetGuideListItem)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10242, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10242
- **State**: PUBLISHED
- **Published Date**: May 16, 2017 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 03:14 UTC
- **Reserved Date**: March 01, 2017 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A time-of-check time-of-use race condition could potentially exist in the secure file system in all Android releases from CAF using the Linux kernel.
### Affected Products
**Qualcomm, Inc. - All Qualcomm Products**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [98555](http://www.securityfocus.com/bid/98555)
2. [](https://source.android.com/security/bulletin/2017-04-01)
3. [1038201](http://www.securitytracker.com/id/1038201)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.