CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-20715
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07796900; Issue ID: ALPS07796900.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.760Z
2023-06-06T12:11:57.207Z
2023-06-06T12:11:57.207Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT5221, MT6789, MT6855, MT6879, MT6895, MT6983, MT7663, MT7668, MT7902, MT7921, MT8167S, MT8168, MT8175, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8673, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797', 'Versions': 'Android 12.0, 13.0 / Yocto 4.0 / Iot-Yocto 22.2 / Linux 4.19 (For MT5221 only)'}
CVE-2023-20596
Improper input validation in the SMM Supervisor may allow an attacker with a compromised SMI handler to gain Ring0 access potentially leading to arbitrary code execution.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7011
2022-10-27T18:53:39.763Z
2023-11-14T18:55:14.665Z
2023-11-14T18:55:14.665Z
{'Vendor': 'AMD', 'Product': 'Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics Formerly codenamed “Cezanne” AM4', 'Versions': 'various '}
CVE-2023-20083
A vulnerability in ICMPv6 inspection when configured with the Snort 2 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the CPU of an affected device to spike to 100 percent, which could stop all traffic processing and result in a denial of service (DoS) condition. FTD management traffic is not affected by this vulnerability. This vulnerability is due to improper error checking when parsing fields within the ICMPv6 header. An attacker could exploit this vulnerability by sending a crafted ICMPv6 packet through an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition. Note: To recover from the DoS condition, the Snort 2 Detection Engine or the Cisco FTD device may need to be restarted.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-icmpv6-dos-4eMkLuN
2022-10-27T18:47:50.334Z
2023-11-01T17:16:49.598Z
2024-01-25T16:57:42.164Z
{'Vendor': 'Cisco', 'Product': 'Cisco Firepower Threat Defense Software', 'Versions': '6.2.3, 6.2.3.1, 6.2.3.2, 6.2.3.3, 6.2.3.4, 6.2.3.5, 6.2.3.6, 6.2.3.7, 6.2.3.8, 6.2.3.10, 6.2.3.11, 6.2.3.9, 6.2.3.12, 6.2.3.13, 6.2.3.14, 6.2.3.15, 6.2.3.16, 6.2.3.17, 6.2.3.18, 6.6.0, 6.6.0.1, 6.6.1, 6.6.3, 6.6.4, 6.6.5, 6.6.5.1, 6.6.5.2, 6.6.7, 6.6.7.1, 6.4.0, 6.4.0.1, 6.4.0.3, 6.4.0.2, 6.4.0.4, 6.4.0.5, 6.4.0.6, 6.4.0.7, 6.4.0.8, 6.4.0.9, 6.4.0.10, 6.4.0.11, 6.4.0.12, 6.4.0.13, 6.4.0.14, 6.4.0.15, 6.4.0.16, 6.4.0.17, 6.7.0, 6.7.0.1, 6.7.0.2, 6.7.0.3, 7.0.0, 7.0.0.1, 7.0.1, 7.0.1.1, 7.0.2, 7.0.2.1, 7.0.3, 7.0.4, 7.0.5, 7.1.0, 7.1.0.1, 7.1.0.2, 7.1.0.3, 7.2.0, 7.2.0.1, 7.2.1, 7.2.2, 7.2.3, 7.3.0, 7.3.1, 7.3.1.1'}
CVE-2023-20129
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow a remote attacker to obtain privileged information and conduct cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks. For more information about these vulnerabilities, see the Details section of this advisory.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-eRPWAXLe
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Prime Infrastructure ', 'Versions': 'n/a'}
CVE-2023-20980
In btu_ble_ll_conn_param_upd_evt of btu_hcif.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260230274
https://source.android.com/security/bulletin/pixel/2023-06-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20607
In ccu, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07512839; Issue ID: ALPS07512839.
https://corp.mediatek.com/product-security-bulletin/February-2023
2022-10-28T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6765, MT6768, MT8786', 'Versions': 'Android 11.0, 12.0'}
CVE-2023-20257
A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct cross-site scripting attacks. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by submitting malicious input containing script or HTML content within requests that would stored within the application interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks against other users of the affected application.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq
2022-10-27T18:47:50.372Z
2024-01-17T16:55:42.034Z
2024-01-17T16:56:09.435Z
{'Vendor': 'Cisco', 'Product': 'Cisco Prime Infrastructure', 'Versions': '2.0.0, 2.0.10, 2.0.39, 2.1.0, 2.1.1, 2.1.2, 2.1.56, 2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.10, 2.2.8, 2.2.4, 2.2.7, 2.2.5, 2.2.9, 2.2.1 Update 01, 2.2.2 Update 03, 2.2.2 Update 04, 2.2.3 Update 02, 2.2.3 Update 03, 2.2.3 Update 04, 2.2.3 Update 05, 2.2.3 Update 06, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.6, 3.0.5, 3.0.7, 3.1.0, 3.1.1, 3.1.7, 3.1.5, 3.1.2, 3.1.3, 3.1.4, 3.1.6, 3.2.2, 3.2.0-FIPS, 3.2.1, 3.3.0, 3.3.1, 3.3.0 Update 01, 3.4.0, 3.4.1, 3.4.2, 3.4.1 Update 01, 3.4.1 Update 02, 3.4.2 Update 01, 3.5.0, 3.5.1, 3.5.0 Update 01, 3.5.0 Update 02, 3.5.0 Update 03, 3.5.1 Update 01, 3.5.1 Update 02, 3.5.1 Update 03, 3.6.0, 3.6.0 Update 01, 3.6.0 Update 02, 3.6.0 Update 03, 3.6.0 Update 04, 2.1, 2.2, 3.2, 3.4_DP1, 3.4_DP3, 3.4_DP2, 3.5_DP1, 3.4_DP7, 3.4_DP10, 3.4_DP5, 3.1_DP15, 3.4_DP11, 3.4_DP8, 3.7_DP1, 3.3_DP4, 3.10_DP1, 3.8_DP1, 3.7_DP2, 3.6_DP1, 3.1_DP16, 3.5_DP4, 3.3_DP3, 3.2_DP2, 3.4_DP4, 3.1_DP14, 3.1_DP6, 3.1_DP9, 3.4_DP6, 3.2_DP3, 3.4_DP9, 3.3_DP2, 3.2_DP1, 3.1_DP10, 3.9_DP1, 3.3_DP1, 3.1_DP13, 3.5_DP2, 3.1_DP12, 3.1_DP4, 3.5_DP3, 3.1_DP8, 3.1_DP7, 3.2_DP4, 3.1_DP11, 3.1_DP5, 3.7.0, 3.7.1, 3.7.1 Update 04, 3.7.1 Update 06, 3.7.1 Update 07, 3.7.1 Update 03, 3.7.0 Update 03, 3.7.1 Update 01, 3.7.1 Update 02, 3.7.1 Update 05, 3.8.0, 3.8.1, 3.8.1 Update 02, 3.8.1 Update 04, 3.8.1 Update 01, 3.8.1 Update 03, 3.8.0 Update 01, 3.8.0 Update 02, 3.9.0, 3.9.1, 3.9.1 Update 02, 3.9.1 Update 03, 3.9.1 Update 01, 3.9.1 Update 04, 3.9.0 Update 01, 3.10.0, 3.10.3, 3.10.1, 3.10.2, 3.10 Update 01, 3.10.4, 3.10.4 Update 01'}
CVE-2023-20742
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628591; Issue ID: ALPS07628540.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.768Z
2023-06-06T12:11:35.201Z
2023-06-06T12:11:35.201Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20191
A vulnerability in the access control list (ACL) processing on MPLS interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to incomplete support for this feature. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device. There are workarounds that address this vulnerability. This advisory is part of the September 2023 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2023 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication .
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnx-acl-PyzDkeYF
2022-10-27T18:47:50.364Z
2023-09-13T16:41:32.625Z
2024-01-25T16:57:53.685Z
{'Vendor': 'Cisco', 'Product': 'Cisco IOS XR Software', 'Versions': '6.4.1, 6.5.1, 6.5.2, 6.5.3, 6.6.2, 6.6.3, 6.6.25, 6.6.4, 7.0.1, 7.0.2, 7.1.1, 7.1.2, 7.2.1, 7.2.2, 7.3.1, 7.3.2, 7.3.3, 7.3.5, 7.4.1, 7.4.2, 7.5.1, 7.5.3, 7.5.2, 7.5.4, 7.6.1, 7.6.2, 7.7.1, 7.7.2, 7.8.1, 7.8.2, 7.9.1'}
CVE-2023-20938
In binder_transaction_buffer_release of binder.c, there is a possible use after free due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257685302References: Upstream kernel
https://source.android.com/security/bulletin/2023-02-01
2022-11-03T00:00:00
2023-02-28T00:00:00
2023-02-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-20892
The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit heap-overflow vulnerability to execute arbitrary code on the underlying operating system that hosts vCenter Server.
https://www.vmware.com/security/advisories/VMSA-2023-0014.html
2022-11-01T15:41:50.394Z
2023-06-22T11:47:19.390Z
2023-06-22T11:47:25.876Z
{'Vendor': 'VMware', 'Product': 'VMware vCenter Server (vCenter Server)', 'Versions': '8.0, 7.0'}
CVE-2023-20241
Multiple vulnerabilities in Cisco Secure Client Software, formerly AnyConnect Secure Mobility Client, could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system. These vulnerabilities are due to an out-of-bounds memory read from Cisco Secure Client Software. An attacker could exploit these vulnerabilities by logging in to an affected device at the same time that another user is accessing Cisco Secure Client on the same system, and then sending crafted packets to a port on that local host. A successful exploit could allow the attacker to crash the VPN Agent service, causing it to be unavailable to all users of the system. To exploit these vulnerabilities, the attacker must have valid credentials on a multi-user system.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8
2022-10-27T18:47:50.370Z
2023-11-22T17:10:45.694Z
2024-01-25T16:58:29.398Z
{'Vendor': 'Cisco', 'Product': 'Cisco Secure Client', 'Versions': '4.9.00086, 4.9.01095, 4.9.02028, 4.9.03047, 4.9.03049, 4.9.04043, 4.9.04053, 4.9.05042, 4.9.06037, 4.10.00093, 4.10.01075, 4.10.02086, 4.10.03104, 4.10.04065, 4.10.04071, 4.10.05085, 4.10.05095, 4.10.05111, 4.10.06079, 4.10.06090, 4.10.07061, 4.10.07062, 4.10.07073, 5.0.00238, 5.0.00529, 5.0.00556, 5.0.01242, 5.0.02075, 5.0.03072, 5.0.03076, 5.0.04032'}
CVE-2023-20611
In gpu, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588678; Issue ID: ALPS07588678.
https://corp.mediatek.com/product-security-bulletin/February-2023
2022-10-28T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8168, MT8365', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20754
In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07588343.
https://corp.mediatek.com/product-security-bulletin/July-2023
2022-10-28T02:03:10.771Z
2023-07-04T01:44:02.816Z
2023-07-04T01:44:02.816Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797', 'Versions': 'Android 11.0, 12.0, 13.0'}
CVE-2023-20884
VMware Workspace ONE Access and VMware Identity Manager contain an insecure redirect vulnerability. An unauthenticated malicious actor may be able to redirect a victim to an attacker controlled domain due to improper path handling leading to sensitive information disclosure.
https://www.vmware.com/security/advisories/VMSA-2023-0011.html
2022-11-01T15:41:50.393Z
2023-05-30T15:05:53.284Z
2023-05-30T15:06:05.576Z
{'Vendor': 'n/a', 'Product': 'VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware Cloud Foundation (Cloud Foundation)', 'Versions': 'Workspace ONE Access 22.09.1.0, Workspace ONE Access 22.09.0.0, Workspace ONE Access 21.08.x, VMware Identity Manager 3.3.7, VMware Identity Manager 3.3.6'}
CVE-2023-20187
A vulnerability in the Multicast Leaf Recycle Elimination (mLRE) feature of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect handling of certain IPv6 multicast packets when they are fanned out more than seven times on an affected device. An attacker could exploit this vulnerability by sending a specific IPv6 multicast or IPv6 multicast VPN (MVPNv6) packet through the affected device. A successful exploit could allow the attacker to cause a reload of the affected device, resulting in a DoS condition.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlre-H93FswRz
2022-10-27T18:47:50.364Z
2023-09-27T17:19:44.488Z
2024-01-25T16:57:52.741Z
{'Vendor': 'Cisco', 'Product': 'Cisco IOS XE Software', 'Versions': '3.7.1S, 3.7.2S, 3.7.3S, 3.7.4S, 3.7.5S, 3.7.6S, 3.7.7S, 3.7.2tS, 3.8.0S, 3.8.1S, 3.8.2S, 3.9.1S, 3.9.0S, 3.9.2S, 3.10.0S, 3.10.1S, 3.10.2S, 3.10.3S, 3.10.4S, 3.10.5S, 3.10.6S, 3.10.7S, 3.10.1xbS, 3.10.8S, 3.10.8aS, 3.10.9S, 3.10.10S, 3.11.1S, 3.11.2S, 3.11.0S, 3.11.3S, 3.11.4S, 3.12.0S, 3.12.1S, 3.12.2S, 3.12.3S, 3.12.4S, 3.13.0S, 3.13.1S, 3.13.2S, 3.13.3S, 3.13.4S, 3.13.5S, 3.13.2aS, 3.13.5aS, 3.13.6S, 3.13.7S, 3.13.6aS, 3.13.8S, 3.13.9S, 3.13.10S, 3.14.0S, 3.14.1S, 3.14.2S, 3.14.3S, 3.14.4S, 3.15.0S, 3.15.1S, 3.15.2S, 3.15.3S, 3.15.4S, 3.16.0S, 3.16.1aS, 3.16.2S, 3.16.3S, 3.16.2bS, 3.16.4aS, 3.16.4bS, 3.16.5S, 3.16.6S, 3.16.7S, 3.16.6bS, 3.16.7aS, 3.16.7bS, 3.16.8S, 3.16.9S, 3.16.10S, 3.17.0S, 3.17.1S, 3.17.2S, 3.17.1aS, 3.17.3S, 3.17.4S, 16.2.1, 16.2.2, 16.3.1, 16.3.2, 16.3.3, 16.3.1a, 16.3.4, 16.3.5, 16.3.6, 16.3.7, 16.3.8, 16.3.9, 16.3.10, 16.3.11, 16.4.1, 16.4.2, 16.4.3, 16.5.1, 16.5.1b, 16.5.2, 16.5.3, 16.6.1, 16.6.2, 16.6.3, 16.6.4, 16.6.5, 16.6.6, 16.6.7, 16.6.8, 16.6.9, 16.6.10, 16.7.1, 16.7.2, 16.7.3, 16.8.1, 16.8.1s, 16.8.2, 16.8.3, 16.9.1, 16.9.2, 16.9.1s, 16.9.3, 16.9.4, 16.9.5, 16.9.6, 16.9.7, 16.9.8, 16.10.1, 16.10.1a, 16.10.1s, 16.10.1e, 16.10.2, 16.10.3, 16.11.1, 16.11.1a, 16.11.2, 16.11.1s, 16.12.1, 16.12.1s, 16.12.1a, 16.12.1c, 16.12.2, 16.12.3, 16.12.8, 16.12.2s, 16.12.4, 16.12.3s, 16.12.5, 16.12.6, 16.12.7, 16.12.10a, 17.1.1, 17.1.1s, 17.1.1t, 17.1.3, 17.2.1, 17.2.1r, 17.2.1v, 17.2.2, 17.2.3, 17.3.1, 17.3.2, 17.3.3, 17.3.1a, 17.3.4, 17.3.5, 17.3.4a, 17.3.6, 17.3.7, 17.4.1, 17.4.2, 17.4.1a, 17.4.1b, 17.5.1, 17.5.1a, 17.5.1b, 17.5.1c, 17.6.1, 17.6.2, 17.6.1a, 17.6.3, 17.6.3a, 17.6.4, 17.6.5, 17.6.5a, 17.7.1, 17.7.1a, 17.7.2, 17.10.1, 17.10.1a, 17.8.1, 17.8.1a, 17.9.1, 17.9.2, 17.9.1a, 17.9.3, 17.9.2a, 17.9.3a, 17.11.1, 17.11.1a'}
CVE-2023-20168
A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m
2022-10-27T18:47:50.362Z
2023-08-23T18:07:53.428Z
2024-01-25T16:57:48.712Z
{'Vendor': 'Cisco', 'Product': 'Cisco NX-OS Software', 'Versions': '4.2(1)SV1(4), 4.2(1)SV1(4a), 4.2(1)SV1(4b), 4.2(1)SV1(5.1), 4.2(1)SV1(5.1a), 4.2(1)SV1(5.2), 4.2(1)SV1(5.2b), 4.2(1)SV2(1.1), 4.2(1)SV2(1.1a), 4.2(1)SV2(2.1), 4.2(1)SV2(2.1a), 4.2(1)SV2(2.2), 4.2(1)SV2(2.3), 5.2(1)SM1(5.1), 5.2(1)SM1(5.2), 5.2(1)SM1(5.2a), 5.2(1)SM1(5.2b), 5.2(1)SM1(5.2c), 5.2(1)SM3(1.1), 5.2(1)SM3(1.1a), 5.2(1)SM3(1.1b), 5.2(1)SM3(1.1c), 5.2(1)SM3(2.1), 5.2(1)SV3(1.4), 5.2(1)SV3(1.1), 5.2(1)SV3(1.3), 5.2(1)SV3(1.5a), 5.2(1)SV3(1.5b), 5.2(1)SV3(1.6), 5.2(1)SV3(1.10), 5.2(1)SV3(1.15), 5.2(1)SV3(2.1), 5.2(1)SV3(2.5), 5.2(1)SV3(2.8), 5.2(1)SV3(3.1), 5.2(1)SV3(1.2), 5.2(1)SV3(1.4b), 5.2(1)SV3(3.15), 5.2(1)SV3(4.1), 5.2(1)SV3(4.1a), 5.2(1)SV3(4.1b), 5.2(1)SV3(4.1c), 6.0(2)A3(1), 6.0(2)A3(2), 6.0(2)A3(4), 6.0(2)A4(1), 6.0(2)A4(2), 6.0(2)A4(3), 6.0(2)A4(4), 6.0(2)A4(5), 6.0(2)A4(6), 6.0(2)A6(1), 6.0(2)A6(1a), 6.0(2)A6(2), 6.0(2)A6(2a), 6.0(2)A6(3), 6.0(2)A6(3a), 6.0(2)A6(4), 6.0(2)A6(4a), 6.0(2)A6(5), 6.0(2)A6(5a), 6.0(2)A6(5b), 6.0(2)A6(6), 6.0(2)A6(7), 6.0(2)A6(8), 6.0(2)A7(1), 6.0(2)A7(1a), 6.0(2)A7(2), 6.0(2)A7(2a), 6.0(2)A8(1), 6.0(2)A8(2), 6.0(2)A8(3), 6.0(2)A8(4), 6.0(2)A8(4a), 6.0(2)A8(5), 6.0(2)A8(6), 6.0(2)A8(7), 6.0(2)A8(7a), 6.0(2)A8(7b), 6.0(2)A8(8), 6.0(2)A8(9), 6.0(2)A8(10a), 6.0(2)A8(10), 6.0(2)A8(11), 6.0(2)A8(11a), 6.0(2)A8(11b), 6.0(2)U2(1), 6.0(2)U2(2), 6.0(2)U2(3), 6.0(2)U2(4), 6.0(2)U2(5), 6.0(2)U2(6), 6.0(2)U3(1), 6.0(2)U3(2), 6.0(2)U3(3), 6.0(2)U3(4), 6.0(2)U3(5), 6.0(2)U3(6), 6.0(2)U3(7), 6.0(2)U3(8), 6.0(2)U3(9), 6.0(2)U4(1), 6.0(2)U4(2), 6.0(2)U4(3), 6.0(2)U4(4), 6.0(2)U5(1), 6.0(2)U5(2), 6.0(2)U5(3), 6.0(2)U5(4), 6.0(2)U6(1), 6.0(2)U6(2), 6.0(2)U6(3), 6.0(2)U6(4), 6.0(2)U6(5), 6.0(2)U6(6), 6.0(2)U6(7), 6.0(2)U6(8), 6.0(2)U6(1a), 6.0(2)U6(2a), 6.0(2)U6(3a), 6.0(2)U6(4a), 6.0(2)U6(5a), 6.0(2)U6(5b), 6.0(2)U6(5c), 6.0(2)U6(9), 6.0(2)U6(10), 6.2(2), 6.2(2a), 6.2(6), 6.2(6b), 6.2(8), 6.2(8a), 6.2(8b), 6.2(10), 6.2(12), 6.2(18), 6.2(16), 6.2(14), 6.2(6a), 6.2(20), 6.2(1), 6.2(3), 6.2(5), 6.2(5a), 6.2(5b), 6.2(7), 6.2(9), 6.2(9a), 6.2(9b), 6.2(9c), 6.2(11), 6.2(11b), 6.2(11c), 6.2(11d), 6.2(11e), 6.2(13), 6.2(13a), 6.2(13b), 6.2(15), 6.2(17), 6.2(19), 6.2(21), 6.2(23), 6.2(20a), 6.2(25), 6.2(22), 6.2(27), 6.2(29), 6.2(24), 6.2(31), 6.2(24a), 6.2(33), 7.0(3)F1(1), 7.0(3)F2(1), 7.0(3)F2(2), 7.0(3)F3(1), 7.0(3)F3(2), 7.0(3)F3(3), 7.0(3)F3(3a), 7.0(3)F3(4), 7.0(3)F3(3c), 7.0(3)F3(5), 7.0(3)I2(2a), 7.0(3)I2(2b), 7.0(3)I2(2c), 7.0(3)I2(2d), 7.0(3)I2(2e), 7.0(3)I2(3), 7.0(3)I2(4), 7.0(3)I2(5), 7.0(3)I2(1), 7.0(3)I2(1a), 7.0(3)I2(2), 7.0(3)I3(1), 7.0(3)I4(1), 7.0(3)I4(2), 7.0(3)I4(3), 7.0(3)I4(4), 7.0(3)I4(5), 7.0(3)I4(6), 7.0(3)I4(7), 7.0(3)I4(8), 7.0(3)I4(8a), 7.0(3)I4(8b), 7.0(3)I4(8z), 7.0(3)I4(9), 7.0(3)I5(1), 7.0(3)I5(2), 7.0(3)I6(1), 7.0(3)I6(2), 7.0(3)I7(1), 7.0(3)I7(2), 7.0(3)I7(3), 7.0(3)I7(4), 7.0(3)I7(5), 7.0(3)I7(5a), 7.0(3)I7(6), 7.0(3)I7(7), 7.0(3)I7(8), 7.0(3)I7(9), 7.0(3)I7(10), 7.1(0)N1(1a), 7.1(0)N1(1b), 7.1(0)N1(1), 7.1(1)N1(1), 7.1(2)N1(1), 7.1(3)N1(1), 7.1(3)N1(2), 7.1(4)N1(1), 7.1(5)N1(1), 7.1(5)N1(1b), 7.2(0)D1(1), 7.2(1)D1(1), 7.2(2)D1(2), 7.2(2)D1(1), 7.3(0)D1(1), 7.3(0)DX(1), 7.3(0)DY(1), 7.3(0)N1(1), 7.3(1)D1(1), 7.3(1)DY(1), 7.3(1)N1(1), 7.3(2)D1(1), 7.3(2)D1(2), 7.3(2)D1(3), 7.3(2)D1(3a), 7.3(2)N1(1), 7.3(3)N1(1), 8.0(1), 8.1(1), 8.1(2), 8.1(2a), 8.1(1a), 8.1(1b), 8.2(1), 8.2(2), 8.2(3), 8.2(4), 8.2(5), 8.2(6), 8.2(7), 8.2(7a), 8.2(8), 8.2(9), 8.3(1), 8.3(2), 9.2(1), 9.2(2), 9.2(2t), 9.2(3), 9.2(4), 9.2(2v), 9.2(1a), 7.3(4)N1(1), 7.3(3)D1(1), 7.3(4)D1(1), 7.3(5)N1(1), 5.2(1)SK3(1.1), 5.2(1)SK3(2.1), 5.2(1)SK3(2.2), 5.2(1)SK3(2.2b), 5.2(1)SK3(2.1a), 5.2(1)SV5(1.1), 5.2(1)SV5(1.2), 5.2(1)SV5(1.3), 5.2(1)SV5(1.3a), 5.2(1)SV5(1.3b), 5.2(1)SV5(1.3c), 8.4(1), 8.4(1a), 8.4(2), 8.4(2a), 8.4(3), 8.4(2b), 8.4(4), 8.4(2c), 8.4(4a), 8.4(5), 8.4(2d), 8.4(6), 8.4(2e), 8.4(6a), 8.4(7), 8.4(2f), 9.3(1), 9.3(2), 9.3(3), 9.3(4), 9.3(5), 9.3(6), 9.3(7), 9.3(7a), 9.3(8), 9.3(9), 9.3(10), 9.3(11), 7.3(6)N1(1), 7.3(5)D1(1), 7.3(7)N1(1), 7.3(7)N1(1a), 7.3(7)N1(1b), 7.3(6)D1(1), 7.3(8)N1(1), 7.3(7)D1(1), 7.3(9)N1(1), 10.1(1), 10.1(2), 10.1(2t), 8.5(1), 7.3(10)N1(1), 7.3(8)D1(1), 10.2(1), 10.2(1q), 10.2(2), 10.2(3), 10.2(3t), 10.2(4), 10.2(5), 7.3(9)D1(1), 7.3(11)N1(1), 7.3(12)N1(1), 10.3(1), 10.3(2), 7.3(13)N1(1)'}
CVE-2023-20646
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628536; Issue ID: ALPS07628536.
https://corp.mediatek.com/product-security-bulletin/March-2023
2022-10-28T00:00:00
2023-03-07T00:00:00
2023-05-09T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20216
A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system. This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system. A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions. There are workarounds that address this vulnerability.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-priv-esc-qTgUZOsQ
2022-10-27T18:47:50.368Z
2023-08-03T21:18:55.966Z
2024-01-25T16:58:21.370Z
{'Vendor': 'Cisco', 'Product': 'Cisco BroadWorks', 'Versions': '23.0, 23.0 ap380391, 23.0 ap380396, 23.0 ap379795, 23.0 ap373098, 23.0 ap382358, 23.0 ap382281, 23.0 ap367434, 23.0 ap376661, 23.0 ap380691, 23.0 ap383569, 23.0 ap375601, 23.0 ap375218, 23.0 ap383519, 23.0 ap375345, 23.0 ap371300, 23.0 ap380771, 23.0 ap351263, 23.0 ap376010, 23.0 ap382487, 23.0 ap383710, 23.0 ap375383, 23.0 ap375465, 23.0 ap380041, 23.0 ap379201, 23.0 ap377147, 23.0 ap378864, 23.0 ap381243, 23.0 ap381271, 23.0 ap382195, 23.0 ap383716, 23.0 ap383943, 23.0 ap383955, 23.0 ap383838, 23.0 ap384023, 23.0 ap383717, 23.0 ap383797, 23.0 ap383815, 23.0 ap384015, 23.0 ap384127, 23.0 ap384173, 23.0 ap384185, 23.0 ap384211, 23.0 ap384245, 23.0 ap363366, 23.0 ap365170, 23.0 ap365858, 23.0 ap366221, 23.0 ap366294, 23.0 ap365801, 23.0 ap366170, 23.0 ap364925, 23.0 ap366295, 23.0 ap366346, 23.0 ap366348, 23.0 ap364295, 23.0 ap364559, 23.0 ap366118, 23.0 ap363815, 23.0 ap363729, 23.0 ap365390, 23.0 ap364932, 23.0 ap365239, 23.0 ap365759, 23.0 ap366211, 23.0 ap366290, 23.0 ap365223, 23.0 ap366117, 23.0 ap365730, 23.0 ap366261, 23.0 ap365889, 23.0 ap366181, 23.0 ap365115, 23.0 ap364048, 23.0 ap366298, 23.0 ap364699, 23.0 ap345032, 23.0 ap363361, 23.0 ap352969, 23.0 ap359103, 23.0 ap366375, 23.0 ap366912, 23.0 ap367109, 23.0 ap366397, 23.0 ap354354, 23.0 ap349850, 23.0 ap366880, 23.0 ap360007, 23.0 ap366744, 23.0 ap366747, 23.0 ap362771, 23.0 ap367291, 23.0 ap366916, 23.0 ap367207, 23.0 ap363363, 23.0 ap366959, 23.0 ap351530, 23.0 ap366898, 23.0 ap361533, 23.0 ap366827, 23.0 ap352962, 23.0 ap369295, 23.0 ap366358, 23.0 ap366677, 23.0 ap366882, 23.0 ap366972, 23.0 ap366486, 23.0 ap366803, 23.0 ap363265, 23.0 ap363128, 23.0 ap366701, 23.0 ap366373, 23.0 ap369674, 23.0 ap369206, 23.0 ap369065, 23.0 ap368327, 23.0 ap368632, 23.0 ap367290, 23.0 ap369302, 23.0 ap368419, 23.0 ap369501, 23.0 ap369219, 23.0 ap368604, 23.0 ap368706, 23.0 ap368461, 23.0 ap368552, 23.0 ap369529, 23.0 ap369748, 23.0 ap368218, 23.0 ap368913, 23.0 ap369607, 23.0 ap369693, 23.0 ap368510, 23.0 ap368445, 23.0 ap369106, 23.0 ap369257, 23.0 ap368987, 23.0 ap369150, 23.0 ap368695, 23.0 ap368167, 23.0 ap370361, 23.0 ap367969, 23.0 ap367367, 23.0 ap369434, 23.0 ap369132, 23.0 ap367678, 23.0 ap367517, 23.0 ap369863, 23.0 ap369227, 23.0 ap369454, 23.0 ap367332, 23.0 ap367794, 23.0 ap369934, 23.0 ap370196, 23.0 ap367358, 23.0 ap367453, 23.0 ap367732, 23.0 ap367646, 23.0 ap367874, 23.0 ap367524, 23.0 ap368153, 23.0 ap368087, 23.0 ap368180, 23.0 ap367726, 23.0 ap370103, 23.0 ap367396, 23.0 ap367340, 23.0 ap368140, 23.0 ap367998, 23.0 ap372337, 23.0 ap372706, 23.0 ap368032, 23.0 ap370138, 23.0 ap372380, 23.0 ap372246, 23.0 ap370193, 23.0 ap372643, 23.0 ap372560, 23.0 ap367513, 23.0 ap369931, 23.0 ap372243, 23.0 ap368216, 23.0 ap369929, 23.0 ap367782, 23.0 ap367675, 23.0 ap372757, 23.0 ap372641, 23.0 ap371050, 23.0 ap372338, 23.0 ap372422, 23.0 ap372033, 23.0 ap371516, 23.0 ap372351, 23.0 ap372708, 23.0 ap372100, 23.0 ap372504, 23.0 ap371961, 23.0 ap370590, 23.0 ap370544, 23.0 ap371836, 23.0 ap372674, 23.0 ap370911, 23.0 ap370817, 23.0 ap372043, 23.0 ap370802, 23.0 ap370926, 23.0 ap370884, 23.0 ap371366, 23.0 ap370952, 23.0 ap371281, 23.0 ap371436, 23.0 ap371153, 23.0 ap371033, 23.0 ap371627, 23.0 ap371155, 23.0 ap371295, 23.0 ap372152, 23.0 ap371760, 23.0 ap370627, 23.0 ap371583, 23.0 ap371770, 23.0 ap371437, 23.0 ap372091, 23.0 ap372163, 23.0 ap370737, 23.0 ap370465, 23.0 ap371587, 23.0 ap375133, 23.0 ap375266, 23.0 ap375254, 23.0 ap372016, 23.0 ap372177, 23.0 ap375242, 23.0 ap375291, 23.0 ap371775, 23.0 ap375688, 23.0 ap375634, 23.0 ap375449, 23.0 ap375321, 23.0 ap375685, 23.0 ap375509, 23.0 ap375719, 23.0 ap375720, 23.0 ap375343, 23.0 ap375533, 23.0 ap375672, 23.0 ap375545, 23.0 ap375264, 23.0 ap375646, 23.0 ap375304, 23.0 ap375097, 23.0 ap373664, 23.0 ap373562, 23.0 ap372932, 23.0 ap374339, 23.0 ap374265, 23.0 ap374230, 23.0 ap374430, 23.0 ap373102, 23.0 ap375655, 23.0 ap373777, 23.0 ap374113, 23.0 ap373015, 23.0 ap374971, 23.0 ap374803, 23.0 ap372974, 23.0 ap373117, 23.0 ap374312, 23.0 ap375018, 23.0 ap373018, 23.0 ap374506, 23.0 ap374588, 23.0 ap373950, 23.0 ap375038, 23.0 ap373480, 23.0 ap372845, 23.0 ap373564, 23.0 ap372994, 23.0 ap373034, 23.0 ap374324, 23.0 ap374031, 23.0 ap374093, 23.0 ap374507, 23.0 ap373684, 23.0 ap374356, 23.0 ap373820, 23.0 ap373104, 23.0 ap373954, 23.0 ap373644, 23.0 ap373899, 23.0 ap374822, 23.0 ap374254, 23.0 ap375069, 23.0 ap373918, 23.0 ap374557, 23.0 ap372854, 23.0 ap373647, 23.0 ap374838, 23.0 ap374330, 23.0 ap374799, 23.0 ap374428, 23.0 ap375936, 23.0 ap376041, 23.0 ap374895, 23.0 ap373046, 23.0 ap376181, 23.0 ap375003, 23.0 ap373539, 23.0 ap373111, 23.0 ap375734, 23.0 ap375743, 23.0 ap376087, 23.0 ap376179, 23.0 ap373303, 23.0 ap375908, 23.0 ap376356, 23.0 ap375865, 23.0 ap373257, 23.0 ap376218, 23.0 ap373212, 23.0 ap373271, 23.0 ap376509, 23.0 ap376252, 23.0 ap376602, 23.0 ap373452, 23.0 ap376429, 23.0 ap376860, 23.0 ap376710, 23.0 ap376410, 23.0 ap376298, 23.0 ap373189, 23.0 ap376426, 23.0 ap376668, 23.0 ap376670, 23.0 ap376485, 23.0 ap376652, 23.0 ap376523, 23.0 ap376656, 23.0 ap376620, 23.0 ap376531, 23.0 ap377412, 23.0 ap376541, 23.0 ap376671, 23.0 ap376701, 23.0 ap376614, 23.0 ap377578, 23.0 ap377496, 23.0 ap377508, 23.0 ap376416, 23.0 ap377778, 23.0 ap377644, 23.0 ap377755, 23.0 ap377523, 23.0 ap377581, 23.0 ap377727, 23.0 ap378436, 23.0 ap377515, 23.0 ap378400, 23.0 ap377566, 23.0 ap377494, 23.0 ap377799, 23.0 ap377779, 23.0 ap378165, 23.0 ap378332, 23.0 ap377757, 23.0 ap377908, 23.0 ap377802, 23.0 ap378134, 23.0 ap378545, 23.0 ap378863, 23.0 ap378882, 23.0 ap379016, 23.0 ap378599, 23.0 ap378218, 23.0 ap378164, 23.0 ap379085, 23.0 ap378880, 23.0 ap378862, 23.0 ap378425, 23.0 ap378259, 23.0 ap378970, 23.0 ap378153, 23.0 ap378585, 23.0 ap378509, 23.0 ap378471, 23.0 ap378966, 23.0 ap379049, 23.0 ap379012, 23.0 ap379080, 23.0 ap378865, 23.0 ap378140, 23.0 ap378440, 23.0 ap378823, 23.0 ap378603, 23.0 ap379397, 23.0 ap378953, 23.0 ap378866, 23.0 ap379008, 23.0 ap378924, 23.0 ap378581, 23.0 ap378999, 23.0 ap378080, 23.0 ap380161, 23.0 ap379046, 23.0 ap379874, 23.0 ap378391, 23.0 ap380239, 23.0 ap379772, 23.0 ap379531, 23.0 ap379888, 23.0 ap379167, 23.0 ap380167, 23.0 ap380099, 23.0 ap379847, 23.0 ap379098, 23.0 ap379972, 23.0 ap379438, 23.0 ap380143, 23.0 ap380187, 23.0 ap380045, 23.0 ap379848, 23.0 ap377384, 23.0 ap376984, 23.0 ap380128, 23.0 ap377149, 23.0 ap379694, 23.0 ap379780, 23.0 ap380371, 23.0 ap380180, 23.0 ap380042, 23.0 ap379487, 23.0 ap379934, 23.0 ap379833, 23.0 ap380473, 23.0 ap380535, 23.0 ap377068, 23.0 ap379853, 23.0 ap380998, 23.0 ap380626, 23.0 ap377079, 23.0 ap377329, 23.0 ap381091, 23.0 ap380751, 23.0 ap381270, 23.0 ap380817, 23.0 ap380739, 23.0 ap380783, 23.0 ap380537, 23.0 ap380697, 23.0 ap380936, 23.0 ap380486, 23.0 ap380512, 23.0 ap380737, 23.0 ap381118, 23.0 ap381072, 23.0 ap381584, 23.0 ap382053, 23.0 ap381523, 23.0 ap381732, 23.0 ap382252, 23.0 ap383002, 23.0 ap382857, 23.0 ap382846, 23.0 ap382253, 23.0 ap381322, 23.0 ap382057, 23.0 ap382386, 23.0 ap382709, 23.0 ap382954, 23.0 ap382717, 23.0 ap381594, 23.0 ap381410, 23.0 ap382463, 23.0 ap382198, 23.0 ap381526, 23.0 ap381498, 23.0 ap381418, 23.0 ap383573, 23.0 ap381609, 23.0 ap381548, 23.0 ap383706, 23.0 ap382945, 23.0 ap382300, 23.0 ap382977, 23.0 ap383547, 23.0 ap382158, 23.0 ap382240, 23.0 ap383515, 23.0 ap383754, 23.0 ap381961, 23.0 ap382951, 23.0 ap382824, 23.0 ap383536, 23.0 ap383247, 23.0 ap383170, 23.0 ap382032, 23.0 ap383365, 23.0 ap381569, 23.0 ap381348, 23.0 ap382192, 23.0 ap381367, 23.0 ap383597, 23.0 ap383309, 23.0 ap383064, 23.0 ap383168, 23.0 ap382434, 23.0 ap384431, 23.0 ap383514, 23.0 ap384441, 23.0 ap352264, 23.0 ap355907, 23.0 ap356752, 23.0 ap358046, 23.0 ap361930, 23.0 ap363247, 23.0 ap363431, 23.0 ap363672, 23.0 ap364532, 23.0 ap365646, 23.0 ap365661, 23.0 ap365770, 23.0 ap365984, 23.0 ap366661, 23.0 ap366835, 23.0 ap366836, 23.0 ap366905, 23.0 ap366940, 23.0 ap367112, 23.0 ap367113, 23.0 ap367781, 23.0 ap367991, 23.0 ap368485, 23.0 ap368605, 23.0 ap368933, 23.0 ap369052, 23.0 ap369103, 23.0 ap369127, 23.0 ap369211, 23.0 ap369300, 23.0 ap369469, 23.0 ap369535, 23.0 ap369595, 23.0 ap369619, 23.0 ap369680, 23.0 ap369878, 23.0 ap369885, 23.0 ap369902, 23.0 ap369903, 23.0 ap370093, 23.0 ap370199, 23.0 ap370222, 23.0 ap370244, 23.0 ap370300, 23.0 ap370326, 23.0 ap370347, 23.0 ap370539, 23.0 ap370578, 23.0 ap370662, 23.0 ap370720, 23.0 ap370735, 23.0 ap370907, 23.0 ap370918, 23.0 ap371056, 23.0 ap371080, 23.0 ap371151, 23.0 ap371254, 23.0 ap371301, 23.0 ap371423, 23.0 ap371490, 23.0 ap371529, 23.0 ap371539, 23.0 ap371557, 23.0 ap371733, 23.0 ap371768, 23.0 ap371772, 23.0 ap371886, 23.0 ap371917, 23.0 ap371922, 23.0 ap372011, 23.0 ap372077, 23.0 ap372286, 23.0 ap372293, 23.0 ap372432, 23.0 ap372475, 23.0 ap372502, 23.0 ap372505, 23.0 ap372617, 23.0 ap372655, 23.0 ap372890, 23.0 ap372943, 23.0 ap372989, 23.0 ap373146, 23.0 ap373197, 23.0 ap373284, 23.0 ap373340, 23.0 ap373412, 23.0 ap373521, 23.0 ap373872, 23.0 ap374211, 23.0 ap375804, 23.0 ap381734, 23.0 ap381809, 23.0 ap384622, 23.0 ap384639, 23.0 ap384650, 23.0 ap384591, 23.0 ap384745, 23.0 ap384876, 23.0 ap384901, 23.0 ap384930, 23.0 ap384931, 23.0 ap385048, 23.0 ap385072, 23.0 ap362738, 23.0 ap364904, 23.0 ap365813, 23.0 ap366965, 23.0 ap368128, 23.0 ap369581, 23.0 ap370476, 23.0 ap377960, 23.0 ap381844, 23.0 ap384217, 23.0 ap384772, 23.0 ap384793, 23.0 ap384879, 23.0 ap384920, 23.0 ap384947, 23.0 ap385046, 23.0 ap385052, 23.0 ap385071, 23.0 ap385104, 23.0 ap385107, 23.0 ap385115, 23.0 ap385117, 23.0 ap385136, 23.0 ap385236, 23.0 ap385244, 23.0 ap385247, 23.0 ap385251, 23.0 ap385266, 23.0 ap385268, 23.0 ap385276, 23.0 ap385280, 23.0 ap385274, 22.0, 22.0 ap379636, 22.0 ap375345, 22.0 ap355095, 22.0 ap352969, 22.0 ap349872, 22.0 ap375197, 22.0 ap382358, 22.0 ap356705, 22.0 ap347741, 22.0 ap375601, 22.0 ap383686, 22.0 ap374901, 22.0 ap377577, 22.0 ap383600, 22.0 ap382057, 22.0 ap383720, 22.0 ap339395, 22.0 ap366268, 22.0 ap372620, 22.0 ap372243, 22.0 ap365170, 22.0 ap372504, 22.0 ap356317, 22.0 ap366181, 22.0 ap366290, 22.0 ap354474, 22.0 ap353530, 22.0 ap339206, 22.0 ap351160, 22.0 ap366373, 22.0 ap366298, 22.0 ap360116, 22.0 ap368497, 22.0 ap368125, 22.0 ap352359, 22.0 ap364168, 22.0 ap368419, 22.0 ap364925, 22.0 ap367732, 22.0 ap357506, 22.0 ap380486, 22.0 ap379780, 22.0 ap359119, 22.0 ap364384, 22.0 ap351263, 22.0 ap360568, 22.0 ap361308, 22.0 ap364369, 22.0 ap365341, 22.0 ap383754, 22.0 ap364879, 22.0 ap363366, 22.0 ap366916, 22.0 ap363363, 22.0 ap374557, 22.0 ap374507, 22.0 ap375533, 22.0 ap372845, 22.0 ap373708, 22.0 ap373684, 22.0 ap367794, 22.0 ap366898, 22.0 ap369778, 22.0 ap368180, 22.0 ap373969, 22.0 ap366882, 22.0 ap358889, 22.0 ap369774, 22.0 ap348431, 22.0 ap358699, 22.0 ap348100, 22.0 ap353184, 22.0 ap352248, 22.0 ap361590, 22.0 ap355907, 22.0 ap363730, 22.0 ap356817, 22.0 ap356375, 22.0 ap373015, 22.0 ap374269, 22.0 ap355114, 22.0 ap365239, 22.0 ap367782, 22.0 ap365223, 22.0 ap359972, 22.0 ap360306, 22.0 ap359433, 22.0 ap359991, 22.0 ap359729, 22.0 ap358357, 22.0 ap381513, 22.0 ap365889, 22.0 ap367349, 22.0 ap360244, 22.0 ap369931, 22.0 ap367874, 22.0 ap360966, 22.0 ap377079, 22.0 ap376710, 22.0 ap357166, 22.0 ap380691, 22.0 ap383716, 22.0 ap383797, 22.0 ap384211, 22.0 ap348078, 22.0 ap342836, 22.0 ap343616, 22.0 ap346307, 22.0 ap345032, 22.0 ap339371, 22.0 ap354355, 22.0 ap353903, 22.0 ap354070, 22.0 ap354354, 22.0 ap349850, 22.0 ap354027, 22.0 ap354069, 22.0 ap353915, 22.0 ap348472, 22.0 ap350217, 22.0 ap353841, 22.0 ap350179, 22.0 ap354313, 22.0 ap354098, 22.0 ap353975, 22.0 ap348945, 22.0 ap354090, 22.0 ap352325, 22.0 ap350176, 22.0 ap352402, 22.0 ap350405, 22.0 ap352928, 22.0 ap350573, 22.0 ap353357, 22.0 ap352516, 22.0 ap352109, 22.0 ap352330, 22.0 ap353120, 22.0 ap351250, 22.0 ap353384, 22.0 ap353490, 22.0 ap352421, 22.0 ap352766, 22.0 ap351924, 22.0 ap353676, 22.0 ap352178, 22.0 ap352962, 22.0 ap351721, 22.0 ap352795, 22.0 ap352703, 22.0 ap353549, 22.0 ap353418, 22.0 ap353358, 22.0 ap353179, 22.0 ap351960, 22.0 ap353162, 22.0 ap353520, 22.0 ap353390, 22.0 ap351700, 22.0 ap351973, 22.0 ap352372, 22.0 ap352205, 22.0 ap352515, 22.0 ap353360, 22.0 ap352932, 22.0 ap354921, 22.0 ap352726, 22.0 ap355000, 22.0 ap352896, 22.0 ap355757, 22.0 ap352972, 22.0 ap353577, 22.0 ap352493, 22.0 ap356603, 22.0 ap354784, 22.0 ap354448, 22.0 ap355894, 22.0 ap355385, 22.0 ap353458, 22.0 ap354646, 22.0 ap353372, 22.0 ap355083, 22.0 ap357047, 22.0 ap353681, 22.0 ap356164, 22.0 ap355027, 22.0 ap356848, 22.0 ap356706, 22.0 ap356474, 22.0 ap354750, 22.0 ap356799, 22.0 ap356432, 22.0 ap354927, 22.0 ap353699, 22.0 ap355443, 22.0 ap356330, 22.0 ap356512, 22.0 ap357083, 22.0 ap355647, 22.0 ap356328, 22.0 ap355774, 22.0 ap354519, 22.0 ap355343, 22.0 ap355091, 22.0 ap354785, 22.0 ap354793, 22.0 ap354374, 22.0 ap355905, 22.0 ap354764, 22.0 ap355672, 22.0 ap355080, 22.0 ap355070, 22.0 ap355365, 22.0 ap355353, 22.0 ap355286, 22.0 ap356434, 22.0 ap356000, 22.0 ap354964, 22.0 ap355916, 22.0 ap355555, 22.0 ap355775, 22.0 ap354936, 22.0 ap356271, 22.0 ap355285, 22.0 ap355616, 22.0 ap355674, 22.0 ap356538, 22.0 ap356960, 22.0 ap355922, 22.0 ap355812, 22.0 ap356458, 22.0 ap353701, 22.0 ap356140, 22.0 ap354413, 22.0 ap357378, 22.0 ap357395, 22.0 ap357400, 22.0 ap357632, 22.0 ap356390, 22.0 ap357607, 22.0 ap357525, 22.0 ap354769, 22.0 ap358893, 22.0 ap357560, 22.0 ap357645, 22.0 ap359029, 22.0 ap357768, 22.0 ap357859, 22.0 ap358578, 22.0 ap359145, 22.0 ap357471, 22.0 ap358092, 22.0 ap357571, 22.0 ap359111, 22.0 ap357769, 22.0 ap358469, 22.0 ap359525, 22.0 ap357795, 22.0 ap358399, 22.0 ap358493, 22.0 ap359049, 22.0 ap358971, 22.0 ap358246, 22.0 ap358234, 22.0 ap358345, 22.0 ap359112, 22.0 ap358059, 22.0 ap358582, 22.0 ap359589, 22.0 ap358453, 22.0 ap357791, 22.0 ap359156, 22.0 ap358034, 22.0 ap357718, 22.0 ap358454, 22.0 ap357775, 22.0 ap358132, 22.0 ap358603, 22.0 ap358515, 22.0 ap358563, 22.0 ap359103, 22.0 ap359227, 22.0 ap359127, 22.0 ap358887, 22.0 ap359106, 22.0 ap363144, 22.0 ap359829, 22.0 ap359649, 22.0 ap358995, 22.0 ap361101, 22.0 ap359470, 22.0 ap359465, 22.0 ap360164, 22.0 ap360007, 22.0 ap359001, 22.0 ap359748, 22.0 ap360495, 22.0 ap360931, 22.0 ap360817, 22.0 ap360459, 22.0 ap359911, 22.0 ap363146, 22.0 ap360201, 22.0 ap360586, 22.0 ap359974, 22.0 ap361054, 22.0 ap361153, 22.0 ap360904, 22.0 ap359644, 22.0 ap360265, 22.0 ap359765, 22.0 ap363145, 22.0 ap360816, 22.0 ap361116, 22.0 ap360600, 22.0 ap360362, 22.0 ap362247, 22.0 ap360912, 22.0 ap360960, 22.0 ap360184, 22.0 ap360740, 22.0 ap361696, 22.0 ap361076, 22.0 ap362532, 22.0 ap361520, 22.0 ap361974, 22.0 ap362771, 22.0 ap361598, 22.0 ap361445, 22.0 ap361833, 22.0 ap361560, 22.0 ap362143, 22.0 ap362848, 22.0 ap362610, 22.0 ap361559, 22.0 ap361820, 22.0 ap360325, 22.0 ap361835, 22.0 ap361533, 22.0 ap361883, 22.0 ap362150, 22.0 ap362163, 22.0 ap361854, 22.0 ap362548, 22.0 ap362001, 22.0 ap362276, 22.0 ap362825, 22.0 ap362298, 22.0 ap362637, 22.0 ap362619, 22.0 ap362490, 22.0 ap362373, 22.0 ap362553, 22.0 ap362710, 22.0 ap362799, 22.0 ap362088, 22.0 ap364194, 22.0 ap361834, 22.0 ap361666, 22.0 ap363430, 22.0 ap362713, 22.0 ap362182, 22.0 ap362644, 22.0 ap363584, 22.0 ap363815, 22.0 ap362328, 22.0 ap364223, 22.0 ap363332, 22.0 ap363867, 22.0 ap362831, 22.0 ap363361, 22.0 ap368026, 22.0 ap363521, 22.0 ap364048, 22.0 ap367675, 22.0 ap364199, 22.0 ap363233, 22.0 ap363666, 22.0 ap364256, 22.0 ap363831, 22.0 ap364278, 22.0 ap367969, 22.0 ap363372, 22.0 ap363759, 22.0 ap363218, 22.0 ap363596, 22.0 ap368015, 22.0 ap366118, 22.0 ap364291, 22.0 ap363213, 22.0 ap366397, 22.0 ap363582, 22.0 ap364125, 22.0 ap363234, 22.0 ap366701, 22.0 ap366221, 22.0 ap366301, 22.0 ap366174, 22.0 ap363846, 22.0 ap364258, 22.0 ap365970, 22.0 ap363729, 22.0 ap363265, 22.0 ap363770, 22.0 ap366784, 22.0 ap366348, 22.0 ap366803, 22.0 ap366358, 22.0 ap366744, 22.0 ap366180, 22.0 ap366649, 22.0 ap364500, 22.0 ap365172, 22.0 ap365995, 22.0 ap366486, 22.0 ap366261, 22.0 ap366490, 22.0 ap366375, 22.0 ap366211, 22.0 ap365115, 22.0 ap366295, 22.0 ap366656, 22.0 ap364670, 22.0 ap366117, 22.0 ap364905, 22.0 ap364471, 22.0 ap364699, 22.0 ap364922, 22.0 ap364745, 22.0 ap364781, 22.0 ap365146, 22.0 ap366747, 22.0 ap364898, 22.0 ap364797, 22.0 ap364651, 22.0 ap364932, 22.0 ap364860, 22.0 ap366677, 22.0 ap365545, 22.0 ap367513, 22.0 ap365390, 22.0 ap364805, 22.0 ap365800, 22.0 ap365173, 22.0 ap364761, 22.0 ap364924, 22.0 ap365167, 22.0 ap364473, 22.0 ap365584, 22.0 ap365400, 22.0 ap367396, 22.0 ap365632, 22.0 ap365905, 22.0 ap367109, 22.0 ap365449, 22.0 ap367338, 22.0 ap367001, 22.0 ap365685, 22.0 ap367207, 22.0 ap367434, 22.0 ap365597, 22.0 ap365801, 22.0 ap365815, 22.0 ap365759, 22.0 ap365730, 22.0 ap365662, 22.0 ap365920, 22.0 ap365556, 22.0 ap367290, 22.0 ap367517, 22.0 ap367183, 22.0 ap370911, 22.0 ap367340, 22.0 ap371050, 22.0 ap371313, 22.0 ap371436, 22.0 ap367291, 22.0 ap365727, 22.0 ap371470, 22.0 ap365511, 22.0 ap367524, 22.0 ap370802, 22.0 ap365379, 22.0 ap365944, 22.0 ap371587, 22.0 ap366959, 22.0 ap365372, 22.0 ap367453, 22.0 ap365601, 22.0 ap371836, 22.0 ap365779, 22.0 ap365858, 22.0 ap366972, 22.0 ap372163, 22.0 ap371871, 22.0 ap367461, 22.0 ap370948, 22.0 ap371437, 22.0 ap372043, 22.0 ap372016, 22.0 ap371999, 22.0 ap370817, 22.0 ap367367, 22.0 ap372072, 22.0 ap372338, 22.0 ap372177, 22.0 ap370952, 22.0 ap371455, 22.0 ap371926, 22.0 ap372351, 22.0 ap370884, 22.0 ap371361, 22.0 ap372354, 22.0 ap372100, 22.0 ap371262, 22.0 ap371775, 22.0 ap371613, 22.0 ap371656, 22.0 ap371895, 22.0 ap371155, 22.0 ap371516, 22.0 ap371281, 22.0 ap371770, 22.0 ap371033, 22.0 ap371583, 22.0 ap368461, 22.0 ap371195, 22.0 ap371366, 22.0 ap371911, 22.0 ap371467, 22.0 ap372371, 22.0 ap368695, 22.0 ap368140, 22.0 ap368603, 22.0 ap371805, 22.0 ap368913, 22.0 ap368987, 22.0 ap372024, 22.0 ap372152, 22.0 ap371627, 22.0 ap371961, 22.0 ap371295, 22.0 ap369674, 22.0 ap369607, 22.0 ap369173, 22.0 ap369863, 22.0 ap369433, 22.0 ap368604, 22.0 ap368087, 22.0 ap368706, 22.0 ap370103, 22.0 ap368216, 22.0 ap369934, 22.0 ap368326, 22.0 ap369855, 22.0 ap368510, 22.0 ap369501, 22.0 ap369693, 22.0 ap368327, 22.0 ap369219, 22.0 ap368568, 22.0 ap369227, 22.0 ap368422, 22.0 ap369454, 22.0 ap368217, 22.0 ap369529, 22.0 ap368887, 22.0 ap368096, 22.0 ap368754, 22.0 ap369106, 22.0 ap369748, 22.0 ap368978, 22.0 ap370113, 22.0 ap369478, 22.0 ap369132, 22.0 ap368660, 22.0 ap369667, 22.0 ap369295, 22.0 ap369065, 22.0 ap369668, 22.0 ap369571, 22.0 ap370645, 22.0 ap370696, 22.0 ap370654, 22.0 ap370138, 22.0 ap370615, 22.0 ap369929, 22.0 ap372643, 22.0 ap372708, 22.0 ap370590, 22.0 ap372390, 22.0 ap372690, 22.0 ap372757, 22.0 ap372560, 22.0 ap370636, 22.0 ap370579, 22.0 ap372674, 22.0 ap372750, 22.0 ap372706, 22.0 ap370269, 22.0 ap370160, 22.0 ap370180, 22.0 ap370667, 22.0 ap370186, 22.0 ap370563, 22.0 ap370627, 22.0 ap370258, 22.0 ap370675, 22.0 ap370217, 22.0 ap370349, 22.0 ap370737, 22.0 ap372488, 22.0 ap370193, 22.0 ap370544, 22.0 ap374714, 22.0 ap370465, 22.0 ap374838, 22.0 ap374169, 22.0 ap374822, 22.0 ap374339, 22.0 ap374092, 22.0 ap370459, 22.0 ap370545, 22.0 ap370389, 22.0 ap374799, 22.0 ap374265, 22.0 ap374803, 22.0 ap370275, 22.0 ap374430, 22.0 ap370177, 22.0 ap370358, 22.0 ap373918, 22.0 ap370179, 22.0 ap370196, 22.0 ap372854, 22.0 ap373539, 22.0 ap372968, 22.0 ap373813, 22.0 ap373118, 22.0 ap373820, 22.0 ap373647, 22.0 ap373102, 22.0 ap373303, 22.0 ap373302, 22.0 ap373562, 22.0 ap373564, 22.0 ap373018, 22.0 ap373954, 22.0 ap374230, 22.0 ap373950, 22.0 ap373664, 22.0 ap374330, 22.0 ap374460, 22.0 ap374312, 22.0 ap374113, 22.0 ap373034, 22.0 ap372956, 22.0 ap373111, 22.0 ap373189, 22.0 ap372974, 22.0 ap374114, 22.0 ap373122, 22.0 ap373257, 22.0 ap372994, 22.0 ap374356, 22.0 ap372932, 22.0 ap375069, 22.0 ap373899, 22.0 ap374971, 22.0 ap373777, 22.0 ap373644, 22.0 ap375734, 22.0 ap375354, 22.0 ap375655, 22.0 ap375688, 22.0 ap373318, 22.0 ap375291, 22.0 ap373046, 22.0 ap374031, 22.0 ap375200, 22.0 ap373452, 22.0 ap374334, 22.0 ap374428, 22.0 ap374254, 22.0 ap375936, 22.0 ap374596, 22.0 ap372963, 22.0 ap373117, 22.0 ap376041, 22.0 ap376410, 22.0 ap376179, 22.0 ap376298, 22.0 ap376523, 22.0 ap376485, 22.0 ap376181, 22.0 ap375090, 22.0 ap376416, 22.0 ap373098, 22.0 ap374977, 22.0 ap376602, 22.0 ap376531, 22.0 ap375465, 22.0 ap375254, 22.0 ap375865, 22.0 ap375672, 22.0 ap375321, 22.0 ap375634, 22.0 ap375382, 22.0 ap375091, 22.0 ap375018, 22.0 ap375743, 22.0 ap375383, 22.0 ap376508, 22.0 ap375646, 22.0 ap375709, 22.0 ap376426, 22.0 ap375719, 22.0 ap375908, 22.0 ap375266, 22.0 ap376614, 22.0 ap375038, 22.0 ap376541, 22.0 ap376513, 22.0 ap375509, 22.0 ap375343, 22.0 ap379772, 22.0 ap375685, 22.0 ap376356, 22.0 ap376218, 22.0 ap374895, 22.0 ap376429, 22.0 ap376402, 22.0 ap379838, 22.0 ap379874, 22.0 ap380187, 22.0 ap380143, 22.0 ap379972, 22.0 ap380535, 22.0 ap379847, 22.0 ap380117, 22.0 ap380512, 22.0 ap380396, 22.0 ap380167, 22.0 ap376010, 22.0 ap380473, 22.0 ap380371, 22.0 ap376147, 22.0 ap375924, 22.0 ap375720, 22.0 ap379833, 22.0 ap376661, 22.0 ap380161, 22.0 ap380180, 22.0 ap380401, 22.0 ap379853, 22.0 ap380041, 22.0 ap380391, 22.0 ap379795, 22.0 ap380128, 22.0 ap380239, 22.0 ap379848, 22.0 ap380532, 22.0 ap379934, 22.0 ap380099, 22.0 ap376860, 22.0 ap377107, 22.0 ap376701, 22.0 ap376668, 22.0 ap377384, 22.0 ap376670, 22.0 ap377480, 22.0 ap377581, 22.0 ap377727, 22.0 ap377802, 22.0 ap376652, 22.0 ap376656, 22.0 ap376685, 22.0 ap376984, 22.0 ap378140, 22.0 ap376620, 22.0 ap377982, 22.0 ap378405, 22.0 ap377494, 22.0 ap377625, 22.0 ap377147, 22.0 ap377755, 22.0 ap378440, 22.0 ap377523, 22.0 ap378218, 22.0 ap378581, 22.0 ap377307, 22.0 ap377389, 22.0 ap377566, 22.0 ap378585, 22.0 ap378153, 22.0 ap377149, 22.0 ap378471, 22.0 ap377900, 22.0 ap377412, 22.0 ap378425, 22.0 ap378391, 22.0 ap377496, 22.0 ap377908, 22.0 ap377068, 22.0 ap378259, 22.0 ap377757, 22.0 ap377680, 22.0 ap377329, 22.0 ap378332, 22.0 ap379016, 22.0 ap378866, 22.0 ap377963, 22.0 ap378436, 22.0 ap378164, 22.0 ap378966, 22.0 ap378509, 22.0 ap378953, 22.0 ap377779, 22.0 ap378823, 22.0 ap378400, 22.0 ap379008, 22.0 ap377578, 22.0 ap379098, 22.0 ap379524, 22.0 ap379694, 22.0 ap379597, 22.0 ap378880, 22.0 ap379531, 22.0 ap378863, 22.0 ap378882, 22.0 ap379427, 22.0 ap379389, 22.0 ap379556, 22.0 ap379487, 22.0 ap378970, 22.0 ap379374, 22.0 ap379465, 22.0 ap379165, 22.0 ap378599, 22.0 ap378862, 22.0 ap379080, 22.0 ap379085, 22.0 ap378924, 22.0 ap381029, 22.0 ap381125, 22.0 ap378603, 22.0 ap381410, 22.0 ap380771, 22.0 ap381518, 22.0 ap380537, 22.0 ap381594, 22.0 ap381243, 22.0 ap378865, 22.0 ap380697, 22.0 ap380629, 22.0 ap380751, 22.0 ap382300, 22.0 ap382158, 22.0 ap381072, 22.0 ap378999, 22.0 ap380914, 22.0 ap380936, 22.0 ap381136, 22.0 ap380737, 22.0 ap381781, 22.0 ap380817, 22.0 ap382240, 22.0 ap381270, 22.0 ap382032, 22.0 ap382362, 22.0 ap381523, 22.0 ap381609, 22.0 ap381569, 22.0 ap381498, 22.0 ap382192, 22.0 ap381418, 22.0 ap381091, 22.0 ap381810, 22.0 ap381732, 22.0 ap382053, 22.0 ap382198, 22.0 ap382195, 22.0 ap380626, 22.0 ap381584, 22.0 ap380818, 22.0 ap381118, 22.0 ap380739, 22.0 ap382252, 22.0 ap381367, 22.0 ap382993, 22.0 ap382717, 22.0 ap383372, 22.0 ap382945, 22.0 ap383569, 22.0 ap382951, 22.0 ap382487, 22.0 ap383002, 22.0 ap383168, 22.0 ap382434, 22.0 ap383170, 22.0 ap382615, 22.0 ap382524, 22.0 ap383309, 22.0 ap383514, 22.0 ap382824, 22.0 ap382903, 22.0 ap383710, 22.0 ap383519, 22.0 ap383367, 22.0 ap382838, 22.0 ap383562, 22.0 ap382977, 22.0 ap382488, 22.0 ap383134, 22.0 ap383706, 22.0 ap383150, 22.0 ap382954, 22.0 ap382432, 22.0 ap382386, 22.0 ap347536, 22.0 ap348474, 22.0 ap349235, 22.0 ap349664, 22.0 ap350564, 22.0 ap350969, 22.0 ap351223, 22.0 ap351345, 22.0 ap351727, 22.0 ap351942, 22.0 ap352184, 22.0 ap352264, 22.0 ap352323, 22.0 ap352369, 22.0 ap352423, 22.0 ap352511, 22.0 ap352804, 22.0 ap352954, 22.0 ap353122, 22.0 ap353167, 22.0 ap353658, 22.0 ap353856, 22.0 ap354077, 22.0 ap354180, 22.0 ap354195, 22.0 ap354200, 22.0 ap354316, 22.0 ap354365, 22.0 ap354438, 22.0 ap354439, 22.0 ap354681, 22.0 ap355002, 22.0 ap355124, 22.0 ap355197, 22.0 ap355599, 22.0 ap355664, 22.0 ap355670, 22.0 ap355838, 22.0 ap356141, 22.0 ap356231, 22.0 ap356301, 22.0 ap356527, 22.0 ap356707, 22.0 ap356752, 22.0 ap357019, 22.0 ap357081, 22.0 ap357105, 22.0 ap357162, 22.0 ap357181, 22.0 ap357387, 22.0 ap357417, 22.0 ap357610, 22.0 ap357653, 22.0 ap358012, 22.0 ap358046, 22.0 ap358082, 22.0 ap358241, 22.0 ap358271, 22.0 ap358330, 22.0 ap358365, 22.0 ap358440, 22.0 ap358441, 22.0 ap358604, 22.0 ap358643, 22.0 ap358732, 22.0 ap358907, 22.0 ap358942, 22.0 ap359130, 22.0 ap359164, 22.0 ap359186, 22.0 ap359225, 22.0 ap359259, 22.0 ap359292, 22.0 ap359298, 22.0 ap359429, 22.0 ap359562, 22.0 ap359570, 22.0 ap359612, 22.0 ap359710, 22.0 ap360167, 22.0 ap360245, 22.0 ap360563, 22.0 ap360603, 22.0 ap360874, 22.0 ap361459, 22.0 ap361549, 22.0 ap361581, 22.0 ap361631, 22.0 ap361643, 22.0 ap361823, 22.0 ap361831, 22.0 ap361930, 22.0 ap361936, 22.0 ap362015, 22.0 ap362041, 22.0 ap362080, 22.0 ap362365, 22.0 ap362368, 22.0 ap362389, 22.0 ap362677, 22.0 ap362691, 22.0 ap362712, 22.0 ap362741, 22.0 ap362769, 22.0 ap362868, 22.0 ap363136, 22.0 ap363221, 22.0 ap363240, 22.0 ap363247, 22.0 ap363431, 22.0 ap363530, 22.0 ap363556, 22.0 ap363672, 22.0 ap363693, 22.0 ap363694, 22.0 ap363727, 22.0 ap363811, 22.0 ap363845, 22.0 ap364100, 22.0 ap364107, 22.0 ap364113, 22.0 ap364146, 22.0 ap364157, 22.0 ap364248, 22.0 ap364252, 22.0 ap364260, 22.0 ap364483, 22.0 ap364532, 22.0 ap364582, 22.0 ap364617, 22.0 ap364621, 22.0 ap364636, 22.0 ap365044, 22.0 ap365357, 22.0 ap365646, 22.0 ap365661, 22.0 ap365701, 22.0 ap365770, 22.0 ap365832, 22.0 ap365984, 22.0 ap366013, 22.0 ap366321, 22.0 ap366346, 22.0 ap366390, 22.0 ap366661, 22.0 ap366834, 22.0 ap366835, 22.0 ap366836, 22.0 ap366905, 22.0 ap366917, 22.0 ap366940, 22.0 ap367324, 22.0 ap367451, 22.0 ap367501, 22.0 ap367781, 22.0 ap367857, 22.0 ap367991, 22.0 ap367992, 22.0 ap368057, 22.0 ap368163, 22.0 ap368196, 22.0 ap368350, 22.0 ap368485, 22.0 ap368605, 22.0 ap368933, 22.0 ap369052, 22.0 ap369127, 22.0 ap369256, 22.0 ap369300, 22.0 ap369469, 22.0 ap369470, 22.0 ap369535, 22.0 ap369595, 22.0 ap369608, 22.0 ap369619, 22.0 ap369680, 22.0 ap369716, 22.0 ap369878, 22.0 ap369885, 22.0 ap369902, 22.0 ap369903, 22.0 ap370088, 22.0 ap370093, 22.0 ap370199, 22.0 ap370246, 22.0 ap370300, 22.0 ap370326, 22.0 ap370426, 22.0 ap370539, 22.0 ap370578, 22.0 ap370662, 22.0 ap370707, 22.0 ap370720, 22.0 ap370735, 22.0 ap370739, 22.0 ap370786, 22.0 ap370907, 22.0 ap370918, 22.0 ap371056, 22.0 ap371151, 22.0 ap371254, 22.0 ap371261, 22.0 ap371301, 22.0 ap371423, 22.0 ap371459, 22.0 ap371490, 22.0 ap371500, 22.0 ap371529, 22.0 ap371539, 22.0 ap371557, 22.0 ap371604, 22.0 ap371605, 22.0 ap371669, 22.0 ap371733, 22.0 ap371768, 22.0 ap371772, 22.0 ap371779, 22.0 ap371793, 22.0 ap371835, 22.0 ap371886, 22.0 ap371917, 22.0 ap371922, 22.0 ap371935, 22.0 ap371998, 22.0 ap372011, 22.0 ap372085, 22.0 ap372115, 22.0 ap372211, 22.0 ap372286, 22.0 ap372397, 22.0 ap372432, 22.0 ap372464, 22.0 ap372475, 22.0 ap372502, 22.0 ap372505, 22.0 ap372574, 22.0 ap372617, 22.0 ap372655, 22.0 ap372696, 22.0 ap372821, 22.0 ap372890, 22.0 ap372943, 22.0 ap372989, 22.0 ap373009, 22.0 ap373146, 22.0 ap373173, 22.0 ap373174, 22.0 ap373197, 22.0 ap373256, 22.0 ap373340, 22.0 ap373358, 22.0 ap373392, 22.0 ap373412, 22.0 ap373521, 22.0 ap373649, 22.0 ap373711, 22.0 ap373872, 22.0 ap373958, 22.0 ap374135, 22.0 ap374211, 22.0 ap375260, 22.0 ap375804, 22.0 ap378234, 22.0 ap378415, 22.0 ap379091, 22.0 ap379168, 22.0 ap380375, 22.0 ap381358, 22.0 ap381734, 22.0 ap381809, 22.0 ap382994, 22.0 ap365659, 22.0 ap343282, 22.0 ap345686, 22.0 ap345827, 22.0 ap350300, 22.0 ap351606, 22.0 ap352244, 22.0 ap352410, 22.0 ap352832, 22.0 ap353796, 22.0 ap353945, 22.0 ap354068, 22.0 ap354387, 22.0 ap355603, 22.0 ap355772, 22.0 ap356159, 22.0 ap356392, 22.0 ap356435, 22.0 ap356515, 22.0 ap357186, 22.0 ap357188, 22.0 ap357509, 22.0 ap357679, 22.0 ap357698, 22.0 ap357730, 22.0 ap358341, 22.0 ap359104, 22.0 ap359625, 22.0 ap359703, 22.0 ap359753, 22.0 ap359961, 22.0 ap360225, 22.0 ap360277, 22.0 ap360367, 22.0 ap360491, 22.0 ap360544, 22.0 ap361046, 22.0 ap361124, 22.0 ap361411, 22.0 ap361508, 22.0 ap361725, 22.0 ap361830, 22.0 ap362144, 22.0 ap362232, 22.0 ap362608, 22.0 ap362639, 22.0 ap362828, 22.0 ap363064, 22.0 ap363176, 22.0 ap363300, 22.0 ap363333, 22.0 ap363576, 22.0 ap363578, 22.0 ap363639, 22.0 ap363777, 22.0 ap363813, 22.0 ap363814, 22.0 ap364118, 22.0 ap364904, 22.0 ap365127, 22.0 ap365240, 22.0 ap365419, 22.0 ap365574, 22.0 ap365863, 22.0 ap365914, 22.0 ap365960, 22.0 ap366462, 22.0 ap367887, 22.0 ap368002, 22.0 ap368154, 22.0 ap368387, 22.0 ap368919, 22.0 ap369098, 22.0 ap369144, 22.0 ap369581, 22.0 ap369727, 22.0 ap369869, 22.0 ap369925, 22.0 ap369994, 22.0 ap370158, 22.0 ap370251, 22.0 ap370255, 22.0 ap370476, 22.0 ap370810, 22.0 ap370922, 22.0 ap371132, 22.0 ap371140, 22.0 ap371165, 22.0 ap371272, 22.0 ap371558, 22.0 ap371885, 22.0 ap372295, 22.0 ap372296, 22.0 ap372439, 22.0 ap372523, 22.0 ap372581, 22.0 ap373113, 22.0 ap373781, 22.0 ap374199, 22.0 ap374309, 22.0 ap374340, 22.0 ap374346, 22.0 ap374353, 22.0 ap374510, 22.0 ap374669, 22.0 ap374712, 22.0 ap374732, 22.0 ap375219, 22.0 ap375328, 22.0 ap375418, 22.0 ap375686, 22.0 ap376358, 22.0 ap376653, 22.0 ap376849, 22.0 ap376854, 22.0 ap376875, 22.0 ap377110, 22.0 ap377206, 22.0 ap377270, 22.0 ap378077, 22.0 ap378212, 22.0 ap378864, 22.0 ap379201, 22.0 ap379412, 22.0 ap379575, 22.0 ap380061, 22.0 ap380254, 22.0 ap380408, 22.0 ap380793, 22.0 ap382699, 22.0 ap382854, 22.0 ap382920, 22.0 ap382941, 22.0 ap383113, 22.0 ap383300, 22.0 ap383549, 22.0 ap353444, 22.0 ap353632, 22.0 ap350187, 22.0 ap353539, 22.0 ap352800, 22.0 ap356703, 22.0 ap358658, 22.0 ap358739, 22.0 ap356536, 22.0 ap356545, 22.0 ap358408, 22.0 ap354381, 22.0 ap358405, 22.0 ap355105, 22.0 ap354430, 22.0 ap354212, 22.0 ap360594, 22.0 ap359426, 22.0 ap359294, 22.0 ap355360, 22.0 ap357667, 22.0 ap361976, 22.0 ap361489, 22.0 ap362018, 22.0 ap364067, 22.0 ap361663, 22.0 ap366466, 22.0 ap364587, 22.0 ap366628, 22.0 ap364700, 22.0 ap367017, 22.0 ap360864, 22.0 ap365131, 22.0 ap360834, 22.0 ap370195, 22.0 ap368900, 22.0 ap367639, 22.0 ap370076, 22.0 ap373248, 22.0 ap378912, 22.0 ap383380, 22.0 ap380990, 22.0 ap380155, 22.0 ap381882, 21.sp1, 21.sp1 ap369107, 21.sp1 ap377180, 21.sp1 ap379554, 21.sp1 ap379844, 21.sp1 ap359433, 21.sp1 ap350491, 21.sp1 ap351294, 21.sp1 ap351704, 21.sp1 ap352726, 21.sp1 ap349996, 21.sp1 ap350763, 21.sp1 ap356747, 21.sp1 ap349210, 21.sp1 ap346622, 21.sp1 ap350110, 21.sp1 ap350420, 21.sp1 ap351795, 21.sp1 ap359119, 21.sp1 ap348753, 21.sp1 ap350338, 21.sp1 ap350204, 21.sp1 ap346386, 21.sp1 ap351961, 21.sp1 ap357571, 21.sp1 ap376314, 21.sp1 ap352109, 21.sp1 ap350308, 21.sp1 ap351160, 21.sp1 ap371921, 21.sp1 ap363301, 21.sp1 ap348143, 21.sp1 ap351216, 21.sp1 ap361590, 21.sp1 ap361308, 21.sp1 ap370196, 21.sp1 ap366880, 21.sp1 ap369219, 21.sp1 ap353354, 21.sp1 ap350379, 21.sp1 ap339376, 21.sp1 ap345633, 21.sp1 ap372454, 21.sp1 ap343495, 21.sp1 ap344020, 21.sp1 ap370636, 21.sp1 ap358132, 21.sp1 ap343579, 21.sp1 ap343675, 21.sp1 ap355717, 21.sp1 ap355107, 21.sp1 ap344422, 21.sp1 ap355581, 21.sp1 ap354785, 21.sp1 ap349872, 21.sp1 ap375465, 21.sp1 ap353842, 21.sp1 ap347603, 21.sp1 ap345013, 21.sp1 ap367109, 21.sp1 ap344752, 21.sp1 ap346074, 21.sp1 ap346379, 21.sp1 ap366486, 21.sp1 ap345261, 21.sp1 ap339781, 21.sp1 ap366298, 21.sp1 ap373102, 21.sp1 ap371926, 21.sp1 ap367732, 21.sp1 ap366370, 21.sp1 ap215990, 21.sp1 ap233247, 21.sp1 ap233913, 21.sp1 ap235252, 21.sp1 ap235960, 21.sp1 ap242300, 21.sp1 ap244020, 21.sp1 ap244265, 21.sp1 ap244609, 21.sp1 ap245148, 21.sp1 ap245441, 21.sp1 ap245468, 21.sp1 ap246072, 21.sp1 ap246656, 21.sp1 ap247533, 21.sp1 ap338833, 21.sp1 ap338964, 21.sp1 ap338965, 21.sp1 ap338972, 21.sp1 ap338988, 21.sp1 ap339196, 21.sp1 ap339200, 21.sp1 ap339206, 21.sp1 ap339209, 21.sp1 ap339236, 21.sp1 ap339342, 21.sp1 ap339346, 21.sp1 ap339351, 21.sp1 ap339395, 21.sp1 ap339477, 21.sp1 ap339538, 21.sp1 ap339552, 21.sp1 ap339568, 21.sp1 ap339658, 21.sp1 ap339897, 21.sp1 ap340054, 21.sp1 ap340168, 21.sp1 ap341350, 21.sp1 ap341471, 21.sp1 ap341498, 21.sp1 ap341577, 21.sp1 ap341645, 21.sp1 ap341663, 21.sp1 ap341897, 21.sp1 ap341939, 21.sp1 ap342028, 21.sp1 ap342127, 21.sp1 ap342138, 21.sp1 ap342145, 21.sp1 ap342175, 21.sp1 ap342217, 21.sp1 ap342284, 21.sp1 ap342324, 21.sp1 ap342461, 21.sp1 ap342474, 21.sp1 ap342483, 21.sp1 ap342543, 21.sp1 ap342548, 21.sp1 ap342588, 21.sp1 ap342625, 21.sp1 ap342669, 21.sp1 ap342696, 21.sp1 ap342719, 21.sp1 ap342755, 21.sp1 ap342771, 21.sp1 ap342782, 21.sp1 ap342792, 21.sp1 ap342836, 21.sp1 ap342853, 21.sp1 ap342946, 21.sp1 ap342975, 21.sp1 ap343017, 21.sp1 ap343229, 21.sp1 ap343351, 21.sp1 ap343352, 21.sp1 ap343410, 21.sp1 ap343616, 21.sp1 ap343877, 21.sp1 ap343883, 21.sp1 ap343999, 21.sp1 ap344043, 21.sp1 ap344052, 21.sp1 ap344083, 21.sp1 ap344094, 21.sp1 ap344100, 21.sp1 ap344238, 21.sp1 ap344253, 21.sp1 ap344270, 21.sp1 ap344290, 21.sp1 ap344479, 21.sp1 ap344485, 21.sp1 ap344600, 21.sp1 ap344681, 21.sp1 ap344945, 21.sp1 ap344952, 21.sp1 ap344954, 21.sp1 ap344964, 21.sp1 ap345054, 21.sp1 ap345059, 21.sp1 ap345069, 21.sp1 ap345293, 21.sp1 ap345452, 21.sp1 ap345456, 21.sp1 ap345490, 21.sp1 ap345627, 21.sp1 ap345628, 21.sp1 ap345729, 21.sp1 ap345732, 21.sp1 ap345738, 21.sp1 ap345755, 21.sp1 ap345850, 21.sp1 ap345873, 21.sp1 ap346064, 21.sp1 ap346076, 21.sp1 ap346128, 21.sp1 ap346129, 21.sp1 ap346183, 21.sp1 ap346233, 21.sp1 ap346253, 21.sp1 ap346261, 21.sp1 ap346307, 21.sp1 ap346337, 21.sp1 ap346347, 21.sp1 ap346376, 21.sp1 ap346554, 21.sp1 ap346559, 21.sp1 ap346562, 21.sp1 ap346577, 21.sp1 ap346607, 21.sp1 ap346632, 21.sp1 ap346639, 21.sp1 ap346724, 21.sp1 ap346764, 21.sp1 ap346900, 21.sp1 ap346902, 21.sp1 ap347016, 21.sp1 ap347158, 21.sp1 ap347172, 21.sp1 ap347246, 21.sp1 ap347302, 21.sp1 ap347506, 21.sp1 ap347507, 21.sp1 ap347534, 21.sp1 ap347640, 21.sp1 ap347676, 21.sp1 ap347741, 21.sp1 ap347896, 21.sp1 ap347905, 21.sp1 ap347930, 21.sp1 ap347959, 21.sp1 ap348037, 21.sp1 ap348078, 21.sp1 ap348089, 21.sp1 ap348093, 21.sp1 ap348100, 21.sp1 ap348104, 21.sp1 ap348107, 21.sp1 ap348156, 21.sp1 ap348160, 21.sp1 ap348431, 21.sp1 ap348462, 21.sp1 ap348472, 21.sp1 ap348527, 21.sp1 ap348531, 21.sp1 ap348564, 21.sp1 ap348660, 21.sp1 ap348740, 21.sp1 ap348878, 21.sp1 ap348891, 21.sp1 ap348945, 21.sp1 ap348952, 21.sp1 ap349011, 21.sp1 ap349023, 21.sp1 ap349056, 21.sp1 ap349066, 21.sp1 ap349206, 21.sp1 ap349222, 21.sp1 ap349390, 21.sp1 ap349443, 21.sp1 ap349486, 21.sp1 ap349589, 21.sp1 ap349617, 21.sp1 ap349621, 21.sp1 ap349631, 21.sp1 ap349642, 21.sp1 ap349699, 21.sp1 ap349703, 21.sp1 ap349724, 21.sp1 ap349850, 21.sp1 ap349863, 21.sp1 ap349864, 21.sp1 ap349867, 21.sp1 ap350050, 21.sp1 ap350111, 21.sp1 ap350141, 21.sp1 ap350143, 21.sp1 ap350179, 21.sp1 ap350189, 21.sp1 ap350303, 21.sp1 ap350456, 21.sp1 ap350465, 21.sp1 ap350474, 21.sp1 ap350497, 21.sp1 ap350573, 21.sp1 ap350591, 21.sp1 ap350832, 21.sp1 ap350838, 21.sp1 ap350859, 21.sp1 ap351014, 21.sp1 ap351248, 21.sp1 ap351263, 21.sp1 ap351295, 21.sp1 ap351487, 21.sp1 ap351495, 21.sp1 ap351530, 21.sp1 ap351644, 21.sp1 ap351700, 21.sp1 ap351721, 21.sp1 ap351754, 21.sp1 ap351835, 21.sp1 ap351894, 21.sp1 ap351898, 21.sp1 ap351951, 21.sp1 ap351988, 21.sp1 ap352082, 21.sp1 ap352087, 21.sp1 ap352205, 21.sp1 ap352246, 21.sp1 ap352340, 21.sp1 ap352372, 21.sp1 ap352402, 21.sp1 ap352421, 21.sp1 ap352515, 21.sp1 ap352766, 21.sp1 ap352795, 21.sp1 ap352896, 21.sp1 ap352969, 21.sp1 ap352972, 21.sp1 ap353403, 21.sp1 ap353406, 21.sp1 ap353418, 21.sp1 ap353464, 21.sp1 ap353520, 21.sp1 ap353549, 21.sp1 ap353582, 21.sp1 ap353689, 21.sp1 ap353701, 21.sp1 ap353841, 21.sp1 ap353843, 21.sp1 ap354050, 21.sp1 ap354069, 21.sp1 ap354090, 21.sp1 ap354098, 21.sp1 ap354180, 21.sp1 ap354331, 21.sp1 ap354355, 21.sp1 ap354413, 21.sp1 ap354454, 21.sp1 ap354469, 21.sp1 ap354474, 21.sp1 ap354494, 21.sp1 ap354531, 21.sp1 ap354559, 21.sp1 ap354646, 21.sp1 ap354688, 21.sp1 ap354707, 21.sp1 ap354789, 21.sp1 ap354793, 21.sp1 ap354918, 21.sp1 ap354927, 21.sp1 ap354936, 21.sp1 ap354964, 21.sp1 ap355000, 21.sp1 ap355027, 21.sp1 ap355091, 21.sp1 ap355095, 21.sp1 ap355385, 21.sp1 ap355616, 21.sp1 ap355663, 21.sp1 ap355774, 21.sp1 ap355855, 21.sp1 ap355875, 21.sp1 ap355883, 21.sp1 ap355894, 21.sp1 ap355904, 21.sp1 ap355912, 21.sp1 ap355914, 21.sp1 ap356145, 21.sp1 ap356164, 21.sp1 ap356231, 21.sp1 ap356271, 21.sp1 ap356317, 21.sp1 ap356328, 21.sp1 ap356375, 21.sp1 ap356458, 21.sp1 ap356474, 21.sp1 ap356589, 21.sp1 ap356704, 21.sp1 ap356787, 21.sp1 ap356817, 21.sp1 ap356847, 21.sp1 ap356978, 21.sp1 ap357047, 21.sp1 ap357049, 21.sp1 ap357083, 21.sp1 ap357395, 21.sp1 ap357499, 21.sp1 ap357574, 21.sp1 ap357607, 21.sp1 ap357653, 21.sp1 ap357718, 21.sp1 ap357768, 21.sp1 ap357769, 21.sp1 ap357775, 21.sp1 ap358034, 21.sp1 ap358131, 21.sp1 ap358234, 21.sp1 ap358345, 21.sp1 ap358364, 21.sp1 ap358399, 21.sp1 ap358411, 21.sp1 ap358469, 21.sp1 ap358508, 21.sp1 ap358563, 21.sp1 ap358578, 21.sp1 ap358582, 21.sp1 ap358726, 21.sp1 ap358730, 21.sp1 ap358731, 21.sp1 ap358887, 21.sp1 ap358889, 21.sp1 ap358893, 21.sp1 ap358942, 21.sp1 ap358971, 21.sp1 ap359023, 21.sp1 ap359030, 21.sp1 ap359076, 21.sp1 ap359085, 21.sp1 ap359112, 21.sp1 ap359145, 21.sp1 ap359172, 21.sp1 ap359227, 21.sp1 ap359423, 21.sp1 ap359465, 21.sp1 ap359470, 21.sp1 ap359536, 21.sp1 ap359589, 21.sp1 ap359644, 21.sp1 ap359685, 21.sp1 ap359729, 21.sp1 ap359752, 21.sp1 ap359753, 21.sp1 ap359764, 21.sp1 ap359808, 21.sp1 ap359829, 21.sp1 ap359911, 21.sp1 ap359956, 21.sp1 ap359974, 21.sp1 ap360209, 21.sp1 ap360211, 21.sp1 ap360259, 21.sp1 ap360265, 21.sp1 ap360295, 21.sp1 ap360306, 21.sp1 ap360325, 21.sp1 ap360373, 21.sp1 ap360459, 21.sp1 ap360586, 21.sp1 ap360600, 21.sp1 ap360771, 21.sp1 ap360893, 21.sp1 ap360907, 21.sp1 ap360912, 21.sp1 ap360931, 21.sp1 ap360966, 21.sp1 ap360993, 21.sp1 ap361055, 21.sp1 ap361122, 21.sp1 ap361153, 21.sp1 ap361338, 21.sp1 ap361412, 21.sp1 ap361420, 21.sp1 ap361520, 21.sp1 ap361533, 21.sp1 ap361559, 21.sp1 ap361560, 21.sp1 ap361641, 21.sp1 ap361820, 21.sp1 ap361821, 21.sp1 ap361854, 21.sp1 ap361883, 21.sp1 ap361945, 21.sp1 ap362163, 21.sp1 ap362298, 21.sp1 ap362317, 21.sp1 ap362379, 21.sp1 ap362532, 21.sp1 ap362553, 21.sp1 ap362593, 21.sp1 ap362637, 21.sp1 ap362825, 21.sp1 ap362827, 21.sp1 ap362848, 21.sp1 ap362961, 21.sp1 ap363001, 21.sp1 ap363128, 21.sp1 ap363146, 21.sp1 ap363218, 21.sp1 ap363228, 21.sp1 ap363265, 21.sp1 ap363363, 21.sp1 ap363560, 21.sp1 ap363584, 21.sp1 ap363639, 21.sp1 ap363695, 21.sp1 ap363705, 21.sp1 ap363729, 21.sp1 ap363846, 21.sp1 ap364004, 21.sp1 ap364062, 21.sp1 ap364118, 21.sp1 ap364239, 21.sp1 ap364243, 21.sp1 ap364256, 21.sp1 ap364358, 21.sp1 ap364369, 21.sp1 ap364384, 21.sp1 ap364471, 21.sp1 ap364473, 21.sp1 ap364559, 21.sp1 ap364568, 21.sp1 ap364670, 21.sp1 ap364772, 21.sp1 ap364879, 21.sp1 ap364898, 21.sp1 ap365167, 21.sp1 ap365170, 21.sp1 ap365379, 21.sp1 ap365390, 21.sp1 ap365449, 21.sp1 ap365556, 21.sp1 ap365572, 21.sp1 ap365584, 21.sp1 ap365597, 21.sp1 ap365632, 21.sp1 ap365662, 21.sp1 ap365730, 21.sp1 ap365889, 21.sp1 ap365970, 21.sp1 ap366118, 21.sp1 ap366211, 21.sp1 ap366268, 21.sp1 ap366290, 21.sp1 ap366295, 21.sp1 ap366348, 21.sp1 ap366373, 21.sp1 ap366744, 21.sp1 ap366747, 21.sp1 ap366803, 21.sp1 ap366960, 21.sp1 ap367322, 21.sp1 ap367340, 21.sp1 ap367461, 21.sp1 ap367524, 21.sp1 ap367782, 21.sp1 ap367794, 21.sp1 ap367998, 21.sp1 ap368399, 21.sp1 ap368497, 21.sp1 ap368604, 21.sp1 ap369132, 21.sp1 ap369173, 21.sp1 ap369206, 21.sp1 ap369261, 21.sp1 ap369434, 21.sp1 ap370388, 21.sp1 ap370654, 21.sp1 ap370888, 21.sp1 ap372043, 21.sp1 ap372106, 21.sp1 ap372229, 21.sp1 ap372337, 21.sp1 ap372351, 21.sp1 ap372582, 21.sp1 ap372842, 21.sp1 ap373015, 21.sp1 ap373276, 21.sp1 ap373349, 21.sp1 ap373777, 21.sp1 ap373813, 21.sp1 ap373814, 21.sp1 ap373899, 21.sp1 ap373950, 21.sp1 ap374144, 21.sp1 ap374145, 21.sp1 ap374265, 21.sp1 ap374353, 21.sp1 ap374366, 21.sp1 ap374557, 21.sp1 ap374822, 21.sp1 ap375026, 21.sp1 ap375053, 21.sp1 ap375061, 21.sp1 ap375517, 21.sp1 ap375674, 21.sp1 ap375931, 21.sp1 ap378258, 21.sp1 ap378970, 21.sp1 ap379387, 21.sp1 ap379440, 21.sp1 ap379473, 21.sp1 ap379847, 21.sp1 ap380248, 21.sp1 ap380473, 21.0 ap354707, 21.0 ap346307, 21.0 ap345633, 21.0 ap354474, 21.0 ap349066, 21.0 ap349056, 21.0 ap355774, 21.0 ap345732, 21.0 ap342324, 21.0 ap355385, 21.0 ap347741, 21.0 ap341471, 21.0 ap343410, 21.0 ap348431, 21.0 ap354793, 21.0 ap339342, 21.0 ap351160, 21.0 ap352972, 21.0 ap359145, 21.0 ap339376, 21.0 ap364358, 21.0 ap356787, 21.0 ap351898, 21.0 ap362637, 21.0 ap350338, 21.0 ap342625, 21.0 ap235252, 21.0 ap354494, 21.0 ap345261, 21.0 ap359536, 21.0 ap346261, 21.0 ap355027, 21.0 ap359465, 21.0 ap363560, 21.0 ap345738, 21.0 ap356458, 21.0 ap364670, 21.0 ap342145, 21.0 ap339200, 21.0 ap357571, 21.0 ap365889, 21.0 ap215990, 21.0 ap339346, 21.0 ap244265, 21.0 ap339781, 21.0 ap364879, 21.0 ap355091, 21.0 ap245148, 21.0 ap339658, 21.0 ap358563, 21.0 ap340054, 21.0 ap341645, 21.0 ap362825, 21.0 ap355894, 21.0 ap352372, 21.0 ap361559, 21.0 ap360306, 21.0 ap362532, 21.0 ap339206, 21.0 ap356164, 21.0 ap366118, 21.0 ap348527, 21.0 ap359470, 21.0 ap352421, 21.0 ap354469, 21.0 ap349206, 21.0 ap344100, 21.0 ap351961, 21.0 ap342461, 21.0 ap346376, 21.0 ap358411, 21.0 ap346577, 21.0 ap346147, 21.0 ap349867, 21.0 ap365170, 21.0 ap345059, 21.0 ap354964, 21.0 ap356271, 21.0 ap363146, 21.0 ap346554, 21.0 ap347246, 21.0 ap342853, 21.0 ap354180, 21.0 ap351988, 21.0 ap356474, 21.0 ap354785, 21.0 ap346253, 21.0 ap354413, 21.0 ap342719, 21.0 ap350465, 21.0 ap343675, 21.0 ap361533, 21.0 ap346900, 21.0 ap339897, 21.0 ap358726, 21.0 ap359433, 21.0 ap351835, 21.0 ap344952, 21.0 ap353843, 21.0 ap356817, 21.0 ap343017, 21.0 ap360586, 21.0 ap346074, 21.0 ap338988, 21.0 ap345069, 21.0 ap355904, 21.0 ap351263, 21.0 ap361590, 21.0 ap346622, 21.0 ap341350, 21.0 ap342975, 21.0 ap344052, 21.0 ap359119, 21.0 ap343351, 21.0 ap350497, 21.0 ap342284, 21.0 ap347603, 21.0 ap340168, 21.0 ap354098, 21.0 ap339395, 21.0 ap349390, 21.0 ap358234, 21.0 ap360912, 21.0 ap345013, 21.0 ap361854, 21.0 ap342669, 21.0 ap343579, 21.0 ap355000, 21.0 ap349210, 21.0 ap361412, 21.0 ap342588, 21.0 ap355107, 21.0 ap348945, 21.0 ap345452, 21.0 ap244609, 21.0 ap346902, 21.0 ap359829, 21.0 ap358469, 21.0 ap357083, 21.0 ap347506, 21.0 ap342696, 21.0 ap345293, 21.0 ap349996, 21.0 ap244020, 21.0 ap348156, 21.0 ap350189, 21.0 ap343495, 21.0 ap367732, 21.0 ap339552, 21.0 ap342175, 21.0 ap359227, 21.0 ap338972, 21.0 ap343352, 21.0 ap352766, 21.0 ap346724, 21.0 ap363228, 21.0 ap344094, 21.0 ap345755, 21.0 ap342483, 21.0 ap346386, 21.0 ap343616, 21.0 ap351478, 21.0 ap343999, 21.0 ap344270, 21.0 ap348472, 21.0 ap358582, 21.0 ap245441, 21.0 ap358893, 21.0 ap354646, 21.0 ap341939, 21.0 ap350308, 21.0 ap357607, 21.0 ap364384, 21.0 ap242300, 21.0 ap349699, 21.0 ap338833, 21.0 ap360600, 21.0 ap342946, 21.0 ap363301, 21.0 ap339477, 21.0 ap235960, 21.0 ap247533, 21.0 ap348473, 21.0 ap339538, 21.0 ap343877, 21.0 ap366373, 21.0 ap364369, 21.0 ap366295, 21.0 ap349617, 21.0 ap339351, 21.0 ap356317, 21.0 ap349850, 21.0 ap347905, 21.0 ap344752, 21.0 ap348143, 21.0 ap365730, 21.0 ap350303, 21.0 ap347158, 21.0 ap351294, 21.0 ap344681, 21.0 ap354069, 21.0 ap347640, 21.0 ap349864, 21.0 ap360459, 21.0 ap361520, 21.0 ap346639, 21.0 ap350110, 21.0 ap350111, 21.0 ap349724, 21.0 ap245468, 21.0 ap344043, 21.0 ap355095, 21.0 ap347016, 21.0 ap350143, 21.0 ap347172, 21.0 ap342836, 21.0 ap352969, 21.0 ap365167, 21.0 ap346379, 21.0 ap364473, 21.0 ap347302, 21.0 ap339209, 21.0 ap350141, 21.0 ap355616, 21.0 ap365632, 21.0 ap357653, 21.0 ap346347, 21.0 ap349872, 21.0 ap354936, 21.0 ap353701, 21.0 ap345627, 21.0 ap345054, 21.0 ap360966, 21.0 ap359752, 21.0 ap346183, 21.0 ap352109, 21.0 ap345490, 21.0 ap348753, 21.0 ap353841, 21.0 ap346128, 21.0 ap350204, 21.0 ap356145, 21.0 ap358889, 21.0 ap359030, 21.0 ap347930, 21.0 ap361883, 21.0 ap352515, 21.0 ap356231, 21.0 ap363584, 21.0 ap351216, 21.0 ap356328, 21.0 ap348093, 21.0 ap351721, 21.0 ap344253, 21.0 ap345850, 21.0 ap246656, 21.0 ap341897, 21.0 ap350491, 21.0 ap359589, 21.0 ap352795, 21.0 ap350591, 21.0 ap366290, 21.0 ap346076, 21.0 ap339196, 21.0 ap358345, 21.0 ap364471, 21.0 ap348078, 21.0 ap346562, 21.0 ap354331, 21.0 ap350474, 21.0 ap349642, 21.0 ap348100, 21.0 ap346559, 21.0 ap352896, 21.0 ap344020, 21.0 ap342217, 21.0 ap353418, 21.0 ap359729, 21.0 ap351644, 21.0 ap359076, 21.0 ap339568, 21.0, 21.0 ap347896, 21.0 ap344945, 21.0 ap351700, 21.0 ap353842, 21.0 ap229862, 21.0 ap237570, 21.0 ap231084, 21.0 ap238089, 21.0 ap241711, 21.0 ap240661, 21.0 ap248165, 21.0 ap338965, 21.0 ap338876, 21.0 ap338964, 21.0 ap339041, 21.0 ap339169, 21.0 ap339179, 21.0 ap339387, 21.0 ap339530, 21.0 ap339645, 21.0 ap339464, 21.0 ap245755, 21.0 ap341846, 21.0 ap341484, 21.0 ap341434, 21.0 ap244183, 21.0 ap244254, 21.0 ap343439, 21.0 ap343457, 21.0 ap343542, 21.0 ap342868, 21.0 ap343861, 21.0 ap343772, 21.0 ap342657, 21.0 ap344700, 21.0 ap344403, 21.0 ap344464, 21.0 ap344430, 21.0 ap344659, 21.0 ap344431, 21.0 ap342227, 21.0 ap344083, 21.0 ap343904, 21.0 ap344068, 21.0 ap343959, 21.0 ap343907, 21.0 ap344095, 21.0 ap345071, 21.0 ap345686, 21.0 ap346135, 21.0 ap345816, 21.0 ap346171, 21.0 ap346380, 21.0 ap347131, 21.0 ap346739, 21.0 ap348880, 21.0 ap348990, 21.0 ap348725, 21.0 ap349228, 21.0 ap348697, 21.0 ap348734, 21.0 ap349510, 21.0 ap348728, 21.0 ap348942, 21.0 ap348761, 21.0 ap349043, 21.0 ap349900, 21.0 ap349907, 21.0 ap350187, 21.0 ap350122, 21.0 ap349393, 21.0 ap348514, 21.0 ap347974, 21.0 ap347733, 21.0 ap347898, 21.0 ap351925, 21.0 ap351834, 21.0 ap351960, 21.0 ap353179, 21.0 ap351059, 21.0 ap353191, 21.0 ap350573, 21.0 ap350740, 21.0 ap350748, 21.0 ap351803, 21.0 ap352340, 21.0 ap351733, 21.0 ap352390, 21.0 ap352801, 21.0 ap353549, 21.0 ap353649, 21.0 ap350436, 21.0 ap352646, 21.0 ap353856, 21.0 ap353844, 21.0 ap353594, 21.0 ap355647, 21.0 ap357560, 21.0 ap355105, 21.0 ap356392, 21.0 ap354564, 21.0 ap357690, 21.0 ap354784, 21.0 ap354447, 21.0 ap355353, 21.0 ap356254, 21.0 ap355360, 21.0 ap359927, 21.0 ap359926, 21.0 ap363189, 21.0 ap362289, 21.0 ap358658, 21.0 ap359085, 21.0 ap360594, 21.0 ap360737, 21.sp1 ap237570, 21.sp1 ap240661, 21.sp1 ap241711, 21.sp1 ap238089, 21.0 ap364067, 21.0 ap363884, 21.sp1 ap229862, 21.sp1 ap231084, 21.sp1 ap245197, 21.sp1 ap245755, 21.0 ap365131, 21.sp1 ap244183, 21.0 ap364904, 21.sp1 ap244254, 21.sp1 ap338876, 21.sp1 ap341484, 21.sp1 ap341452, 21.sp1 ap339041, 21.sp1 ap339169, 21.sp1 ap249331, 21.sp1 ap341434, 21.sp1 ap339179, 21.sp1 ap339464, 21.sp1 ap339530, 21.sp1 ap339387, 21.sp1 ap248165, 21.sp1 ap341846, 21.sp1 ap339645, 21.sp1 ap342868, 21.sp1 ap343542, 21.sp1 ap343145, 21.sp1 ap343604, 21.sp1 ap343772, 21.sp1 ap342199, 21.sp1 ap342079, 21.sp1 ap342178, 21.sp1 ap342234, 21.sp1 ap342227, 21.sp1 ap342657, 21.sp1 ap343439, 21.sp1 ap343457, 21.sp1 ap345071, 21.sp1 ap344464, 21.sp1 ap345240, 21.sp1 ap345231, 21.sp1 ap345106, 21.sp1 ap344458, 21.sp1 ap345394, 21.sp1 ap343861, 21.sp1 ap344603, 21.sp1 ap344042, 21.sp1 ap344068, 21.sp1 ap344659, 21.sp1 ap343904, 21.sp1 ap344862, 21.sp1 ap344113, 21.sp1 ap343907, 21.sp1 ap344095, 21.sp1 ap344700, 21.sp1 ap343959, 21.sp1 ap344430, 21.sp1 ap344403, 21.sp1 ap344431, 21.sp1 ap346135, 21.sp1 ap345686, 21.sp1 ap345525, 21.sp1 ap346617, 21.sp1 ap346380, 21.sp1 ap346171, 21.sp1 ap346046, 21.sp1 ap346230, 21.sp1 ap345816, 21.sp1 ap347974, 21.sp1 ap346715, 21.sp1 ap347131, 21.sp1 ap347898, 21.sp1 ap347250, 21.sp1 ap348514, 21.sp1 ap348433, 21.sp1 ap346739, 21.sp1 ap348161, 21.sp1 ap347733, 21.sp1 ap349228, 21.sp1 ap349907, 21.sp1 ap348880, 21.sp1 ap348741, 21.sp1 ap349900, 21.sp1 ap349393, 21.sp1 ap349043, 21.sp1 ap348697, 21.sp1 ap348942, 21.sp1 ap349510, 21.sp1 ap348990, 21.sp1 ap349744, 21.sp1 ap348728, 21.sp1 ap348734, 21.sp1 ap348725, 21.sp1 ap349836, 21.sp1 ap350399, 21.sp1 ap350431, 21.sp1 ap350370, 21.sp1 ap350187, 21.sp1 ap350122, 21.sp1 ap350748, 21.sp1 ap350705, 21.sp1 ap350740, 21.sp1 ap351367, 21.sp1 ap350436, 21.sp1 ap350788, 21.sp1 ap351293, 21.sp1 ap350486, 21.sp1 ap350843, 21.sp1 ap351059, 21.sp1 ap352390, 21.sp1 ap352411, 21.sp1 ap351189, 21.sp1 ap353179, 21.sp1 ap353191, 21.sp1 ap352646, 21.sp1 ap352409, 21.sp1 ap352801, 21.sp1 ap351960, 21.sp1 ap351925, 21.sp1 ap353632, 21.sp1 ap353649, 21.sp1 ap353594, 21.sp1 ap351733, 21.sp1 ap353444, 21.sp1 ap353539, 21.sp1 ap351723, 21.sp1 ap351803, 21.sp1 ap351834, 21.sp1 ap355353, 21.sp1 ap354012, 21.sp1 ap354447, 21.sp1 ap353856, 21.sp1 ap354094, 21.sp1 ap354316, 21.sp1 ap354784, 21.sp1 ap354564, 21.sp1 ap353844, 21.sp1 ap355360, 21.sp1 ap355105, 21.sp1 ap355647, 21.sp1 ap357331, 21.sp1 ap357560, 21.sp1 ap355794, 21.sp1 ap356254, 21.sp1 ap356555, 21.sp1 ap356703, 21.sp1 ap357583, 21.sp1 ap356392, 21.sp1 ap356737, 21.sp1 ap358405, 21.sp1 ap357690, 21.sp1 ap358658, 21.sp1 ap359477, 21.sp1 ap359709, 21.sp1 ap360594, 21.sp1 ap360834, 21.sp1 ap360864, 21.sp1 ap360737, 21.sp1 ap361450, 21.sp1 ap359926, 21.sp1 ap359927, 21.sp1 ap359980, 21.sp1 ap361663, 21.sp1 ap363189, 21.sp1 ap361976, 21.sp1 ap362289, 21.sp1 ap362738, 21.sp1 ap364904, 21.sp1 ap363814, 21.sp1 ap363884, 21.sp1 ap364985, 21.sp1 ap365131, 21.sp1 ap365036, 21.sp1 ap364067, 21.sp1 ap364110, 21.sp1 ap364587, 21.sp1 ap364700, 21.sp1 ap366628, 21.sp1 ap366614, 21.sp1 ap366358, 21.sp1 ap367347, 21.sp1 ap367477, 21.sp1 ap369581, 21.sp1 ap367639, 21.sp1 ap367332, 21.sp1 ap374355, 21.sp1 ap371992, 21.sp1 ap370195, 21.sp1 ap373872, 21.sp1 ap371281, 21.sp1 ap370607, 21.sp1 ap371058, 21.sp1 ap376817, 21.sp1 ap380155, 21.sp1 ap383380, 21.sp1 ap379201, 21.sp1 ap377656, 21.sp1 ap348761, RI.2021.02, RI.2021.08, RI.2021.09, RI.2021.10, RI.2021.11, RI.2021.12, RI.2022.02, RI.2022.03, RI.2022.04, RI.2022.07, RI.2022.06, RI.2022.05, RI.2022.08, RI.2022.09, RI.2022.12, RI.2023.01, RI.2023.02, RI.2023.04'}
CVE-2023-20703
In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767853; Issue ID: ALPS07767853.
https://corp.mediatek.com/product-security-bulletin/May-2023
2022-10-28T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT8183, MT8195', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20979
In GetNextSourceDataPacket of bta_av_co.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-259939364
https://source.android.com/security/bulletin/pixel/2023-06-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20996
In multiple locations, there is a possible way to trigger a persistent reboot loop due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-246749764
https://source.android.com/security/bulletin/pixel/2023-03-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20095
A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of HTTPS requests. An attacker could exploit this vulnerability by sending crafted HTTPS requests to an affected system. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a DoS condition.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-dos-3GhZQBAS
2022-10-27T18:47:50.337Z
2023-11-01T17:14:29.319Z
2024-01-25T16:57:43.469Z
{'Vendor': 'Cisco', 'Product': 'Cisco Adaptive Security Appliance (ASA) Software', 'Versions': '9.8.1, 9.8.1.5, 9.8.1.7, 9.8.2, 9.8.2.8, 9.8.2.14, 9.8.2.15, 9.8.2.17, 9.8.2.20, 9.8.2.24, 9.8.2.26, 9.8.2.28, 9.8.2.33, 9.8.2.35, 9.8.2.38, 9.8.3.8, 9.8.3.11, 9.8.3.14, 9.8.3.16, 9.8.3.18, 9.8.3.21, 9.8.3, 9.8.3.26, 9.8.3.29, 9.8.4, 9.8.4.3, 9.8.4.7, 9.8.4.8, 9.8.4.10, 9.8.4.12, 9.8.4.15, 9.8.4.17, 9.8.4.25, 9.8.4.20, 9.8.4.22, 9.8.4.26, 9.8.4.29, 9.8.4.32, 9.8.4.33, 9.8.4.34, 9.8.4.35, 9.8.4.39, 9.8.4.40, 9.8.4.41, 9.8.4.43, 9.8.4.44, 9.8.4.45, 9.12.1, 9.12.1.2, 9.12.1.3, 9.12.2, 9.12.2.4, 9.12.2.5, 9.12.2.9, 9.12.3, 9.12.3.2, 9.12.3.7, 9.12.4, 9.12.3.12, 9.12.3.9, 9.12.2.1, 9.12.4.2, 9.12.4.4, 9.12.4.7, 9.12.4.10, 9.12.4.13, 9.12.4.8, 9.12.4.18, 9.12.4.24, 9.12.4.26, 9.12.4.29, 9.12.4.30, 9.12.4.35, 9.12.4.37, 9.12.4.38, 9.12.4.39, 9.12.4.40, 9.12.4.41, 9.14.1, 9.14.1.10, 9.14.1.6, 9.14.1.15, 9.14.1.19, 9.14.1.30, 9.14.2, 9.14.2.4, 9.14.2.8, 9.14.2.13, 9.14.2.15, 9.14.3, 9.14.3.1, 9.14.3.9, 9.14.3.11, 9.14.3.13, 9.14.3.18, 9.14.3.15, 9.14.4, 9.14.4.6, 9.14.4.7, 9.15.1, 9.15.1.7, 9.15.1.10, 9.15.1.15, 9.15.1.16, 9.15.1.17, 9.15.1.1, 9.15.1.21, 9.16.1, 9.16.1.28, 9.16.2, 9.16.2.3, 9.16.2.7, 9.16.2.11, 9.16.2.13, 9.16.2.14, 9.16.3, 9.16.3.3, 9.16.3.14, 9.17.1, 9.17.1.7, 9.17.1.9, 9.18.1'}
CVE-2023-20148
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Small Business RV Series Router Firmware ', 'Versions': 'n/a'}
CVE-2023-20774
In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292228; Issue ID: ALPS07292228.
https://corp.mediatek.com/product-security-bulletin/July-2023
2022-10-28T02:03:10.774Z
2023-07-04T01:44:41.321Z
2023-07-04T01:44:41.321Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6789, MT6835, MT6855, MT6886, MT6895, MT6983, MT6985, MT8195, MT8673, MT8781', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20261
A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system. This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and issuing crafted requests using the web UI. A successful exploit could allow the attacker to obtain arbitrary files from the underlying Linux file system of an affected system. To exploit this vulnerability, the attacker must be an authenticated user.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe
2022-10-27T18:47:50.373Z
2023-10-18T16:27:01.866Z
2024-01-25T16:58:34.365Z
{'Vendor': 'Cisco', 'Product': 'Cisco SD-WAN vManage', 'Versions': '17.2.6, 17.2.7, 17.2.8, 17.2.9, 17.2.10, 17.2.4, 17.2.5, 18.3.1.1, 18.3.3.1, 18.3.3, 18.3.4, 18.3.5, 18.3.7, 18.3.8, 18.3.6.1, 18.3.1, 18.3.0, 18.4.0.1, 18.4.3, 18.4.302, 18.4.303, 18.4.4, 18.4.5, 18.4.0, 18.4.1, 18.4.6, 19.2.0, 19.2.097, 19.2.099, 19.2.1, 19.2.2, 19.2.3, 19.2.31, 19.2.929, 19.2.4, 20.1.1.1, 20.1.12, 20.1.1, 20.1.2, 20.1.3, 19.3.0, 19.1.0, 18.2.0, 20.3.1, 20.3.2, 20.3.2.1, 20.3.3, 20.3.3.1, 20.3.4, 20.3.4.1, 20.3.4.2, 20.3.5, 20.3.6, 20.3.7, 20.3.7.1, 20.3.4.3, 20.3.5.1, 20.3.7.2, 20.3.8, 20.4.1, 20.4.1.1, 20.4.1.2, 20.4.2, 20.4.2.2, 20.4.2.1, 20.4.2.3, 20.5.1, 20.5.1.2, 20.5.1.1, 20.6.1, 20.6.1.1, 20.6.2.1, 20.6.2.2, 20.6.2, 20.6.3, 20.6.3.1, 20.6.4, 20.6.5, 20.6.5.1, 20.6.1.2, 20.6.3.2, 20.6.4.1, 20.6.5.2, 20.6.5.4, 20.6.3.3, 20.6.4.2, 20.6.3.0.45, 20.6.3.0.46, 20.6.3.0.47, 20.6.3.4, 20.6.4.0.21, 20.6.5.1.10, 20.6.5.1.11, 20.6.5.1.7, 20.6.5.1.9, 20.6.5.2.4, 20.6.5.5, 20.6.5.2.8, 20.6.5.1.13'}
CVE-2023-20959
In AddSupervisedUserActivity, guest users are not prevented from starting the activity due to missing permissions checks. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-249057848
https://source.android.com/security/bulletin/2023-03-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20723
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07843845; Issue ID: ALPS07843845.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.766Z
2023-06-06T12:12:01.120Z
2023-06-06T12:12:01.120Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT8167, MT8175, MT8183', 'Versions': 'Android 11.0, 12.0, 13.0'}
CVE-2023-20689
In wlan firmware, there is possible system crash due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07664741; Issue ID: ALPS07664741.
https://corp.mediatek.com/product-security-bulletin/July-2023
2022-10-28T02:03:10.754Z
2023-07-04T01:44:46.260Z
2023-07-04T01:44:46.260Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6739, MT8167, MT8321, MT8365, MT8385, MT8666, MT8765, MT8788', 'Versions': 'Android 11.0 / IOT-v23.0 (Yocto 4.0)'}
CVE-2023-20666
In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310651; Issue ID: ALPS07292173.
https://corp.mediatek.com/product-security-bulletin/April-2023
2022-10-28T00:00:00
2023-04-06T00:00:00
2023-04-06T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6789, MT6855, MT6895, MT6983, MT8188, MT8195, MT8365, MT8781, MT8795T, MT8798', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20236
A vulnerability in the iPXE boot function of Cisco IOS XR software could allow an authenticated, local attacker to install an unverified software image on an affected device. This vulnerability is due to insufficient image verification. An attacker could exploit this vulnerability by manipulating the boot parameters for image verification during the iPXE boot process on an affected device. A successful exploit could allow the attacker to boot an unverified software image on the affected device.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ipxe-sigbypass-pymfyqgB
2022-10-27T18:47:50.370Z
2023-09-13T16:39:19.418Z
2024-01-25T16:58:28.107Z
{'Vendor': 'Cisco', 'Product': 'Cisco IOS XR Software', 'Versions': '5.2.0, 5.2.1, 5.2.2, 5.2.4, 5.2.3, 5.2.5, 5.2.47, 5.3.0, 5.3.1, 5.3.2, 5.3.3, 5.3.4, 6.0.0, 6.0.1, 6.0.2, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.12, 6.1.22, 6.1.32, 6.1.36, 6.1.42, 6.2.1, 6.2.2, 6.2.3, 6.2.25, 6.2.11, 6.3.2, 6.3.3, 6.3.15, 6.4.1, 6.4.2, 6.4.3, 6.5.1, 6.5.2, 6.5.3, 6.5.25, 6.5.26, 6.5.28, 6.5.29, 6.5.32, 6.5.33, 6.6.2, 6.6.3, 6.6.25, 6.6.4, 7.0.1, 7.0.2, 7.0.12, 7.0.14, 7.1.1, 7.1.15, 7.1.2, 7.1.3, 6.7.1, 6.7.2, 6.7.3, 6.7.4, 7.2.0, 7.2.1, 7.2.2, 7.3.1, 7.3.15, 7.3.2, 7.3.3, 7.3.5, 7.4.1, 7.4.2, 6.8.1, 6.8.2, 7.5.1, 7.5.3, 7.5.2, 7.5.4, 7.6.1, 7.6.2, 7.7.1, 7.7.2, 7.7.21, 6.9.1, 6.9.2, 7.8.1, 7.8.2, 7.9.1, 7.9.2'}
CVE-2023-20559
Insufficient control flow management in AmdCpmGpioInitSmm may allow a privileged attacker to tamper with the SMM handler potentially leading to escalation of privileges.
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-1027.html
2022-10-27T18:53:39.746Z
2023-03-23T18:49:41.533Z
2023-04-02T18:49:20.069507Z
{'Vendor': ' AMD', 'Product': 'Ryzen™ 2000 Series ', 'Versions': 'various '}
CVE-2023-20109
A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash. This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-getvpn-rce-g8qR68sx
2022-10-27T18:47:50.343Z
2023-09-27T17:23:21.589Z
2024-01-25T16:57:45.130Z
{'Vendor': 'Cisco', 'Product': 'IOS', 'Versions': '12.4(24)T, 12.4(24)T3, 12.4(22)T1, 12.4(24)T5, 12.4(24)T4, 12.4(22)T, 12.4(24)T8, 12.4(24)T2, 12.4(22)T5, 12.4(22)T4, 12.4(24)T1, 12.4(24)T7, 12.4(22)T3, 12.4(24)T6, 12.4(22)T2, 12.4(24)T4a, 12.4(24)T4b, 12.4(24)T3e, 12.4(24)T4c, 12.4(24)T4d, 12.4(24)T4e, 12.4(24)T3f, 12.4(24)T4f, 12.4(24)T4l, 12.4(24)MD1, 12.4(24)MD, 12.4(24)MD3, 12.4(24)MD2, 12.4(22)MD1, 12.4(22)MD2, 12.4(24)MD5, 12.4(22)MD, 12.4(24)MD4, 12.4(24)MD6, 12.4(24)MD7, 12.4(22)XR5, 12.4(22)XR4, 12.4(22)XR7, 12.4(22)XR2, 12.4(22)XR6, 12.4(22)XR10, 12.4(22)XR1, 12.4(22)XR9, 12.4(22)XR3, 12.4(22)XR8, 12.4(22)XR11, 12.4(22)XR12, 12.4(22)MDA3, 12.4(24)MDA5, 12.4(22)MDA5, 12.4(24)MDA3, 12.4(22)MDA4, 12.4(24)MDA4, 12.4(24)MDA1, 12.4(22)MDA, 12.4(22)MDA2, 12.4(22)MDA1, 12.4(24)MDA2, 12.4(22)MDA6, 12.4(24)MDA6, 12.4(24)MDA7, 12.4(24)MDA8, 12.4(24)MDA10, 12.4(24)MDA9, 12.4(24)MDA11, 12.4(24)MDA12, 12.4(24)MDA13, 12.4(24)YG3, 12.4(24)YG4, 12.4(24)YG1, 12.4(24)YG2, 12.4(24)YG, 15.0(1)M1, 15.0(1)M5, 15.0(1)M4, 15.0(1)M3, 15.0(1)M2, 15.0(1)M6, 15.0(1)M, 15.0(1)M7, 15.0(1)M10, 15.0(1)M9, 15.0(1)M8, 15.0(1)XA2, 15.0(1)XA4, 15.0(1)XA1, 15.0(1)XA3, 15.0(1)XA, 15.0(1)XA5, 15.1(2)T, 15.1(1)T4, 15.1(3)T2, 15.1(1)T1, 15.1(2)T0a, 15.1(3)T3, 15.1(1)T3, 15.1(2)T3, 15.1(2)T4, 15.1(1)T2, 15.1(3)T, 15.1(2)T2a, 15.1(3)T1, 15.1(1)T, 15.1(2)T2, 15.1(2)T1, 15.1(2)T5, 15.1(3)T4, 15.1(1)T5, 15.1(1)XB, 15.0(1)S2, 15.0(1)S1, 15.0(1)S, 15.0(1)S3a, 15.0(1)S4, 15.0(1)S5, 15.0(1)S4a, 15.0(1)S6, 15.2(1)S, 15.2(2)S, 15.2(1)S1, 15.2(4)S, 15.2(1)S2, 15.2(2)S1, 15.2(2)S2, 15.2(2)S0a, 15.2(2)S0c, 15.2(4)S1, 15.2(4)S4, 15.2(4)S6, 15.2(4)S2, 15.2(4)S5, 15.2(4)S3, 15.2(4)S3a, 15.2(4)S4a, 15.2(4)S7, 15.3(1)T, 15.3(2)T, 15.3(1)T1, 15.3(1)T2, 15.3(1)T3, 15.3(1)T4, 15.3(2)T1, 15.3(2)T2, 15.3(2)T3, 15.3(2)T4, 15.0(2)EY, 15.0(2)EY1, 15.0(2)EY2, 15.0(2)EY3, 15.1(2)S, 15.1(1)S, 15.1(1)S1, 15.1(3)S, 15.1(1)S2, 15.1(2)S1, 15.1(2)S2, 15.1(3)S1, 15.1(3)S0a, 15.1(3)S2, 15.1(3)S4, 15.1(3)S3, 15.1(3)S5, 15.1(3)S6, 15.1(3)S5a, 15.1(4)M3, 15.1(4)M, 15.1(4)M1, 15.1(4)M2, 15.1(4)M6, 15.1(4)M5, 15.1(4)M4, 15.1(4)M7, 15.1(4)M3a, 15.1(4)M10, 15.1(4)M8, 15.1(4)M9, 15.0(2)SE, 15.0(2)SE1, 15.0(2)SE2, 15.0(2)SE3, 15.0(2)SE4, 15.0(2)SE5, 15.0(2)SE6, 15.0(2)SE7, 15.0(2)SE8, 15.0(2)SE9, 15.0(2)SE10, 15.0(2)SE11, 15.0(2)SE10a, 15.0(2)SE12, 15.0(2)SE13, 15.1(2)GC, 15.1(2)GC1, 15.1(2)GC2, 15.1(4)GC, 15.1(4)GC1, 15.1(4)GC2, 15.1(1)SG, 15.1(2)SG, 15.1(1)SG1, 15.1(1)SG2, 15.1(2)SG1, 15.1(2)SG2, 15.1(2)SG3, 15.1(2)SG4, 15.1(2)SG5, 15.1(2)SG6, 15.1(2)SG7, 15.1(2)SG8, 15.0(1)MR, 15.0(2)MR, 15.2(4)M, 15.2(4)M1, 15.2(4)M2, 15.2(4)M4, 15.2(4)M3, 15.2(4)M5, 15.2(4)M8, 15.2(4)M10, 15.2(4)M7, 15.2(4)M6, 15.2(4)M9, 15.2(4)M6a, 15.2(4)M11, 12.4(24)MDB, 12.4(24)MDB1, 12.4(24)MDB3, 12.4(24)MDB4, 12.4(24)MDB5, 12.4(24)MDB6, 12.4(24)MDB7, 12.4(24)MDB5a, 12.4(24)MDB8, 12.4(24)MDB9, 12.4(24)MDB10, 12.4(24)MDB11, 12.4(24)MDB12, 12.4(24)MDB13, 12.4(24)MDB14, 12.4(24)MDB15, 12.4(24)MDB16, 12.4(24)MDB17, 12.4(24)MDB18, 12.4(24)MDB19, 15.0(2)EX, 15.0(2)EX1, 15.0(2)EX2, 15.0(2)EX3, 15.0(2)EX4, 15.0(2)EX5, 15.0(2)EX8, 15.0(2a)EX5, 15.0(2)EX10, 15.0(2)EX11, 15.0(2)EX13, 15.0(2)EX12, 15.2(1)GC, 15.2(1)GC1, 15.2(1)GC2, 15.2(2)GC, 15.2(3)GC, 15.2(3)GC1, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)GC3, 15.1(1)SY, 15.1(1)SY1, 15.1(2)SY, 15.1(2)SY1, 15.1(2)SY2, 15.1(1)SY2, 15.1(1)SY3, 15.1(2)SY3, 15.1(1)SY4, 15.1(2)SY4, 15.1(1)SY5, 15.1(2)SY5, 15.1(2)SY4a, 15.1(1)SY6, 15.1(2)SY6, 15.1(2)SY7, 15.1(2)SY8, 15.1(2)SY9, 15.1(2)SY10, 15.1(2)SY11, 15.1(2)SY12, 15.1(2)SY13, 15.1(2)SY14, 15.1(2)SY15, 15.1(2)SY16, 15.3(1)S, 15.3(2)S, 15.3(3)S, 15.3(1)S2, 15.3(1)S1, 15.3(2)S2, 15.3(2)S1, 15.3(3)S1, 15.3(3)S2, 15.3(3)S3, 15.3(3)S6, 15.3(3)S4, 15.3(3)S1a, 15.3(3)S5, 15.3(3)S7, 15.3(3)S8, 15.3(3)S9, 15.3(3)S10, 15.3(3)S8a, 15.4(1)T, 15.4(2)T, 15.4(1)T2, 15.4(1)T1, 15.4(1)T3, 15.4(2)T1, 15.4(2)T3, 15.4(2)T2, 15.4(1)T4, 15.4(2)T4, 15.0(2)EA, 15.0(2)EA1, 15.2(1)E, 15.2(2)E, 15.2(1)E1, 15.2(3)E, 15.2(1)E2, 15.2(1)E3, 15.2(2)E1, 15.2(4)E, 15.2(3)E1, 15.2(2)E2, 15.2(2a)E1, 15.2(2)E3, 15.2(2a)E2, 15.2(3)E2, 15.2(3a)E, 15.2(3)E3, 15.2(4)E1, 15.2(2)E4, 15.2(2)E5, 15.2(4)E2, 15.2(3)E4, 15.2(5)E, 15.2(4)E3, 15.2(2)E6, 15.2(5a)E, 15.2(5)E1, 15.2(5b)E, 15.2(2)E5a, 15.2(5c)E, 15.2(3)E5, 15.2(2)E5b, 15.2(5a)E1, 15.2(4)E4, 15.2(2)E7, 15.2(5)E2, 15.2(6)E, 15.2(5)E2b, 15.2(4)E5, 15.2(5)E2c, 15.2(2)E8, 15.2(6)E0a, 15.2(6)E1, 15.2(2)E7b, 15.2(4)E5a, 15.2(6)E0c, 15.2(4)E6, 15.2(6)E2, 15.2(2)E9, 15.2(4)E7, 15.2(7)E, 15.2(2)E10, 15.2(4)E8, 15.2(6)E2a, 15.2(6)E2b, 15.2(7)E1, 15.2(7)E0a, 15.2(7)E0b, 15.2(7)E0s, 15.2(6)E3, 15.2(4)E9, 15.2(7)E2, 15.2(7a)E0b, 15.2(4)E10, 15.2(7)E3, 15.2(7)E1a, 15.2(7b)E0b, 15.2(7)E2a, 15.2(4)E10a, 15.2(7)E4, 15.2(7)E3k, 15.2(8)E, 15.2(8)E1, 15.2(7)E5, 15.2(7)E6, 15.2(8)E2, 15.2(4)E10d, 15.2(7)E7, 15.2(8)E3, 15.2(7)E8, 15.2(8)E4, 15.1(3)MRA, 15.1(3)MRA1, 15.1(3)MRA2, 15.1(3)MRA3, 15.1(3)MRA4, 15.1(3)SVB1, 15.1(3)SVB2, 15.4(1)S, 15.4(2)S, 15.4(3)S, 15.4(1)S1, 15.4(1)S2, 15.4(2)S1, 15.4(1)S3, 15.4(3)S1, 15.4(2)S2, 15.4(3)S2, 15.4(3)S3, 15.4(1)S4, 15.4(2)S3, 15.4(2)S4, 15.4(3)S4, 15.4(3)S5, 15.4(3)S6, 15.4(3)S7, 15.4(3)S6a, 15.4(3)S8, 15.4(3)S9, 15.4(3)S10, 15.3(3)M, 15.3(3)M1, 15.3(3)M2, 15.3(3)M3, 15.3(3)M5, 15.3(3)M4, 15.3(3)M6, 15.3(3)M7, 15.3(3)M8, 15.3(3)M9, 15.3(3)M10, 15.3(3)M8a, 15.0(2)EZ, 15.1(3)SVD, 15.1(3)SVD1, 15.1(3)SVD2, 15.2(1)EY, 15.0(2)EJ, 15.0(2)EJ1, 15.2(1)SY, 15.2(1)SY1, 15.2(1)SY0a, 15.2(1)SY2, 15.2(2)SY, 15.2(1)SY1a, 15.2(2)SY1, 15.2(2)SY2, 15.2(1)SY3, 15.2(1)SY4, 15.2(2)SY3, 15.2(1)SY5, 15.2(1)SY6, 15.2(1)SY7, 15.2(1)SY8, 15.2(5)EX, 15.1(3)SVF, 15.1(3)SVF1, 15.1(3)SVE, 15.4(3)M, 15.4(3)M1, 15.4(3)M2, 15.4(3)M3, 15.4(3)M4, 15.4(3)M5, 15.4(3)M6, 15.4(3)M7, 15.4(3)M6a, 15.4(3)M8, 15.4(3)M9, 15.4(3)M10, 15.0(2)EK, 15.0(2)EK1, 15.4(1)CG, 15.4(1)CG1, 15.4(2)CG, 15.5(1)S, 15.5(2)S, 15.5(1)S1, 15.5(3)S, 15.5(1)S2, 15.5(1)S3, 15.5(2)S1, 15.5(2)S2, 15.5(3)S1, 15.5(3)S1a, 15.5(2)S3, 15.5(3)S2, 15.5(3)S0a, 15.5(3)S3, 15.5(1)S4, 15.5(2)S4, 15.5(3)S4, 15.5(3)S5, 15.5(3)S6, 15.5(3)S6a, 15.5(3)S7, 15.5(3)S6b, 15.5(3)S8, 15.5(3)S9, 15.5(3)S10, 15.5(3)S9a, 15.1(3)SVG, 15.2(2)EB, 15.2(2)EB1, 15.2(2)EB2, 15.2(6)EB, 15.5(1)T, 15.5(1)T1, 15.5(2)T, 15.5(1)T2, 15.5(1)T3, 15.5(2)T1, 15.5(2)T2, 15.5(2)T3, 15.5(2)T4, 15.5(1)T4, 15.2(2)EA, 15.2(2)EA1, 15.2(2)EA2, 15.2(3)EA, 15.2(4)EA, 15.2(4)EA1, 15.2(2)EA3, 15.2(4)EA3, 15.2(5)EA, 15.2(4)EA4, 15.2(4)EA5, 15.2(4)EA6, 15.2(4)EA7, 15.2(4)EA8, 15.2(4)EA9, 15.2(4)EA9a, 15.5(3)M, 15.5(3)M1, 15.5(3)M0a, 15.5(3)M2, 15.5(3)M3, 15.5(3)M4, 15.5(3)M4a, 15.5(3)M5, 15.5(3)M6, 15.5(3)M7, 15.5(3)M6a, 15.5(3)M8, 15.5(3)M9, 15.5(3)M10, 15.5(3)SN, 15.6(1)S, 15.6(2)S, 15.6(2)S1, 15.6(1)S1, 15.6(1)S2, 15.6(2)S2, 15.6(1)S3, 15.6(2)S3, 15.6(1)S4, 15.6(2)S4, 15.6(1)T, 15.6(2)T, 15.6(1)T0a, 15.6(1)T1, 15.6(2)T1, 15.6(1)T2, 15.6(2)T2, 15.6(1)T3, 15.6(2)T3, 15.3(1)SY, 15.3(1)SY1, 15.3(1)SY2, 15.6(2)SP, 15.6(2)SP1, 15.6(2)SP2, 15.6(2)SP3, 15.6(2)SP4, 15.6(2)SP5, 15.6(2)SP6, 15.6(2)SP7, 15.6(2)SP8, 15.6(2)SP9, 15.6(2)SP10, 15.6(2)SN, 15.6(3)M, 15.6(3)M1, 15.6(3)M0a, 15.6(3)M1b, 15.6(3)M2, 15.6(3)M2a, 15.6(3)M3, 15.6(3)M3a, 15.6(3)M4, 15.6(3)M5, 15.6(3)M6, 15.6(3)M7, 15.6(3)M6a, 15.6(3)M6b, 15.6(3)M8, 15.6(3)M9, 15.1(3)SVJ2, 15.2(4)EC1, 15.2(4)EC2, 15.4(1)SY, 15.4(1)SY1, 15.4(1)SY2, 15.4(1)SY3, 15.4(1)SY4, 15.5(1)SY, 15.5(1)SY1, 15.5(1)SY2, 15.5(1)SY3, 15.5(1)SY4, 15.5(1)SY5, 15.5(1)SY6, 15.5(1)SY7, 15.5(1)SY8, 15.5(1)SY9, 15.5(1)SY10, 15.5(1)SY11, 15.7(3)M, 15.7(3)M1, 15.7(3)M0a, 15.7(3)M3, 15.7(3)M2, 15.7(3)M4, 15.7(3)M5, 15.7(3)M4a, 15.7(3)M4b, 15.7(3)M6, 15.7(3)M7, 15.7(3)M8, 15.7(3)M9, 15.8(3)M, 15.8(3)M1, 15.8(3)M0a, 15.8(3)M0b, 15.8(3)M2, 15.8(3)M1a, 15.8(3)M3, 15.8(3)M2a, 15.8(3)M4, 15.8(3)M3a, 15.8(3)M3b, 15.8(3)M5, 15.8(3)M6, 15.8(3)M7, 15.8(3)M8, 15.8(3)M9, 15.8(3)M10, 15.9(3)M, 15.9(3)M1, 15.9(3)M0a, 15.9(3)M2, 15.9(3)M3, 15.9(3)M2a, 15.9(3)M3a, 15.9(3)M4, 15.9(3)M3b, 15.9(3)M5, 15.9(3)M4a, 15.9(3)M6, 15.9(3)M7, 15.9(3)M6a, 15.9(3)M6b, 15.9(3)M7a'}
CVE-2023-20735
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645178.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.767Z
2023-06-06T12:11:21.208Z
2023-06-06T12:11:21.208Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT5696, MT5836, MT5838, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8168, MT8175, MT8195, MT8365, MT8395, MT8673, MT8781, MT8786, MT8789, MT8791T, MT8797, MT9000, MT9015, MT9023, MT9025, MT9618, MT9649, MT9653, MT9679, MT9687, MT9689, MT9902, MT9932, MT9952, MT9972, MT9982', 'Versions': 'Android 12.0, 13.0 / Yocto 4.0 / Iot-Yocto 22.2'}
CVE-2023-20220
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. To exploit these vulnerabilities, the attacker must have valid device credentials, but does not need Administrator privileges. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device, including on the underlying operating system, which could also affect the availability of the device.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmdinj-bTEgufOX
2022-10-27T18:47:50.368Z
2023-11-01T17:09:42.596Z
2024-01-25T16:58:23.366Z
{'Vendor': 'Cisco', 'Product': 'Cisco Firepower Management Center', 'Versions': '6.2.3, 6.2.3.1, 6.2.3.2, 6.2.3.3, 6.2.3.4, 6.2.3.5, 6.2.3.6, 6.2.3.7, 6.2.3.9, 6.2.3.10, 6.2.3.11, 6.2.3.12, 6.2.3.13, 6.2.3.14, 6.2.3.15, 6.2.3.8, 6.2.3.16, 6.2.3.17, 6.2.3.18, 6.4.0, 6.4.0.1, 6.4.0.3, 6.4.0.2, 6.4.0.4, 6.4.0.5, 6.4.0.6, 6.4.0.7, 6.4.0.8, 6.4.0.9, 6.4.0.10, 6.4.0.11, 6.4.0.12, 6.4.0.13, 6.4.0.14, 6.4.0.15, 6.4.0.16, 6.6.0, 6.6.0.1, 6.6.1, 6.6.3, 6.6.4, 6.6.5, 6.6.5.1, 6.6.5.2, 6.6.7, 6.6.7.1, 6.7.0, 6.7.0.1, 6.7.0.2, 6.7.0.3, 7.0.0, 7.0.0.1, 7.0.1, 7.0.1.1, 7.0.2, 7.0.2.1, 7.0.3, 7.0.4, 7.0.5, 7.1.0, 7.1.0.1, 7.1.0.2, 7.1.0.3, 7.2.0, 7.2.1, 7.2.2, 7.2.0.1, 7.2.3, 7.2.3.1, 7.2.4, 7.3.0, 7.3.1, 7.3.1.1'}
CVE-2023-20670
In audio, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07648710; Issue ID: ALPS07648710.
https://corp.mediatek.com/product-security-bulletin/April-2023
2022-10-28T00:00:00
2023-04-06T00:00:00
2023-04-06T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT2715, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8167, MT8188, MT8195, MT8321, MT8365, MT8385, MT8675, MT8696, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8795T, MT8797, MT8798, MT8871, MT8891', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20918
In getPendingIntentLaunchFlags of ActivityOptions.java, there is a possible elevation of privilege due to a confused deputy with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/16c604aa7c253ce5cf075368a258c0b21386160d
2022-11-03T22:37:50.579Z
2023-07-12T23:18:00.205Z
2023-07-12T23:18:00.205Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-20627
In pqframework, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629585; Issue ID: ALPS07629585.
https://corp.mediatek.com/product-security-bulletin/March-2023
2022-10-28T00:00:00
2023-03-07T00:00:00
2023-05-09T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6879, MT6895, MT6983, MT8167, MT8168', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20963
In WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519
https://source.android.com/security/bulletin/2023-03-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-11 Android-12 Android-12L Android-13'}
CVE-2023-20826
In cta, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07978550; Issue ID: ALPS07978550.
https://corp.mediatek.com/product-security-bulletin/September-2023
2022-10-28T02:03:23.683Z
2023-09-04T02:27:25.656Z
2023-09-04T02:27:25.656Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6761, MT6765, MT6779, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6895, MT6983, MT6985, MT8168, MT8175, MT8188, MT8195, MT8365, MT8673', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20575
A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004
2022-10-27T18:53:39.756Z
2023-07-11T18:29:02.607Z
2023-07-11T18:29:02.607Z
{'Vendor': 'AMD', 'Product': '1st Gen AMD EPYC™ Processors', 'Versions': 'various '}
CVE-2023-20719
In pqframework, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629583; Issue ID: ALPS07629583.
https://corp.mediatek.com/product-security-bulletin/May-2023
2022-10-28T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6739, MT6761, MT6765, MT6768, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT6985, MT8167, MT8168, MT8195, MT8673', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20934
In resolveAttributionSource of ServiceUtilities.cpp, there is a possible way to disable the microphone privacy indicator due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-258672042
https://source.android.com/security/bulletin/2023-02-01
2022-11-03T00:00:00
2023-02-28T00:00:00
2023-02-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-12 Android-12L Android-13'}
CVE-2023-20037
A vulnerability in Cisco Industrial Network Director could allow an authenticated, remote attacker to conduct stored cross-site scripting (XSS) attacks. The vulnerability is due to improper validation of content submitted to the affected application. An attacker could exploit this vulnerability by sending requests containing malicious values to the affected system. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-fZyVjJtG
2022-10-27T18:47:50.316Z
2023-01-19T01:34:01.022Z
2024-01-25T16:57:35.483Z
{'Vendor': 'Cisco', 'Product': 'Cisco Industrial Network Director', 'Versions': '1.5.0, 1.5.1, 1.4.0, 1.0.0, 1.6.0, 1.6.1'}
CVE-2023-20522
Insufficient input validation in ASP may allow an attacker with a malicious BIOS to potentially cause a denial of service.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032
2022-10-27T18:53:39.737Z
2023-01-10T20:56:58.039Z
2023-01-11T07:01:59.843980Z
{'Vendor': ' AMD', 'Product': '2nd Gen EPYC', 'Versions': 'various '}
CVE-2023-20172
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to delete or read arbitrary files on the underlying operating system. To exploit these vulnerabilities, an attacker must have valid credentials on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-delete-read-PK5ghDDd
2022-10-27T00:00:00
2023-05-18T00:00:00
2023-05-18T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Identity Services Engine Software ', 'Versions': 'n/a'}
CVE-2023-20871
VMware Fusion contains a local privilege escalation vulnerability. A malicious actor with read/write access to the host operating system can elevate privileges to gain root access to the host operating system.
https://www.vmware.com/security/advisories/VMSA-2023-0008.html
2022-11-01T00:00:00
2023-04-25T00:00:00
2023-04-25T00:00:00
{'Vendor': 'n/a', 'Product': 'VMware Fusion', 'Versions': 'VMware Fusion (13.x)'}
CVE-2023-20021
Multiple vulnerabilities in specific Cisco Identity Services Engine (ISE) CLI commands could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit these vulnerabilities, an attacker must have valid Administrator privileges on the affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-os-injection-pxhKsDM
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Identity Services Engine Software ', 'Versions': 'n/a'}
CVE-2023-20922
In setMimeGroup of PackageManagerService.java, there is a possible crash loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-237291548
https://source.android.com/security/bulletin/2023-01-01
2022-11-03T00:00:00
2023-01-24T00:00:00
2023-01-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-11 Android-12 Android-12L Android-13'}
CVE-2023-20888
Aria Operations for Networks contains an authenticated deserialization vulnerability. A malicious actor with network access to VMware Aria Operations for Networks and valid 'member' role credentials may be able to perform a deserialization attack resulting in remote code execution.
https://www.vmware.com/security/advisories/VMSA-2023-0012.html
2022-11-01T15:41:50.394Z
2023-06-07T14:18:41.771Z
2023-06-07T14:18:41.771Z
{'Vendor': 'n/a', 'Product': 'Aria Operations for Networks (Formerly vRealize Network Insight)', 'Versions': 'Aria Operations for Networks (Formerly vRealize Network Insight) 6.x'}
CVE-2023-20867
A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.
https://www.vmware.com/security/advisories/VMSA-2023-0013.html
2022-11-01T15:41:50.390Z
2023-06-13T16:47:21.689Z
2023-06-13T16:47:30.401Z
{'Vendor': 'VMware', 'Product': 'VMware Tools', 'Versions': '12.2.5'}
CVE-2023-20164
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit these vulnerabilities, an attacker must have valid credentials on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-sRQnsEU9
2022-10-27T00:00:00
2023-05-18T00:00:00
2023-05-18T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Identity Services Engine Software ', 'Versions': 'n/a'}
CVE-2023-20758
In cmdq, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07636133; Issue ID: ALPS07636130.
https://corp.mediatek.com/product-security-bulletin/July-2023
2022-10-28T02:03:10.771Z
2023-07-04T01:44:15.831Z
2023-07-04T01:44:15.831Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6739, MT6768, MT6771, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8786, MT8789, MT8797', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20975
In getAvailabilityStatus of EnableContentCapturePreferenceController.java, there is a possible way to bypass DISALLOW_CONTENT_CAPTURE due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-250573776
https://source.android.com/security/bulletin/pixel/2023-06-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20076
A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system. This vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-8whGn5dL
2022-10-27T00:00:00
2023-02-12T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco IOS ', 'Versions': 'n/a'}
CVE-2023-20563
Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002
2022-10-27T18:53:39.747Z
2023-11-14T18:54:41.308Z
2023-11-14T18:54:41.308Z
{'Vendor': 'AMD', 'Product': 'Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”', 'Versions': 'various '}
CVE-2023-20133
A vulnerability in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because of insufficient validation of user-supplied input in Webex Events (classic) programs, email templates, and survey questions. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxsscsrf-2L24bBx6
2022-10-27T18:47:50.351Z
2023-07-07T19:47:01.683Z
2024-01-25T16:57:47.416Z
{'Vendor': 'Cisco', 'Product': 'Cisco Webex Meetings', 'Versions': '39.10, 39.11, 39.6, 39.7, 39.7.4, 39.7.7, 39.8, 39.8.2, 39.8.3, 39.8.4, 39.9, 39.9.1, 40.1, 40.2, 40.4, 40.4.10, 40.6, 40.6.2, 42.10, 42.11, 42.6, 42.9, 42.12, 42.8, 42.7, 43.2, 43.1, 43.3, 43.4, 43.4.2, 43.5.0, 43.4.1'}
CVE-2023-20830
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014156.
https://corp.mediatek.com/product-security-bulletin/September-2023
2022-10-28T02:03:23.685Z
2023-09-04T02:27:32.386Z
2023-09-04T02:27:32.386Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT2713, MT2735, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8168, MT8173, MT8195, MT8362A, MT8365, MT8781', 'Versions': 'Android 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3'}
CVE-2023-20974
In btm_ble_add_resolving_list_entry_complete of btm_ble_privacy.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260078907
https://source.android.com/security/bulletin/pixel/2023-06-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20077
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to download arbitrary files from the filesystem of an affected device. These vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to download arbitrary files from the underlying filesystem of the affected device.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-dwnld-Srcdnkd2
2022-10-27T00:00:00
2023-05-18T00:00:00
2023-05-18T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Identity Services Engine Software ', 'Versions': 'n/a'}
CVE-2023-20562
Insufficient validation in the IOCTL (Input Output Control) input buffer in AMD uProf may allow an authenticated user to load an unsigned driver potentially leading to arbitrary kernel execution.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7003
2022-10-27T18:53:39.747Z
2023-08-08T17:13:50.810Z
2023-08-08T17:13:50.810Z
{'Vendor': 'AMD', 'Product': 'μProf', 'Versions': 'various'}
CVE-2023-20098
A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files. This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative privileges could exploit this vulnerability by running a system command containing directory traversal character sequences to target an arbitrary file. A successful exploit could allow the attacker to delete arbitrary files from the system, including files owned by root.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-wfnqmYhN
2022-10-27T18:47:50.338Z
2023-05-09T13:12:22.765Z
2024-01-25T16:57:43.789Z
{'Vendor': 'Cisco', 'Product': 'Cisco SD-WAN vManage', 'Versions': '20.9.1, 20.9.2'}
CVE-2023-20132
Multiple vulnerabilities in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or upload arbitrary files as recordings. For more information about these vulnerabilities, see the Details section of this advisory.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wbx-sxss-fupl-64uHbcm5
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Webex Meetings ', 'Versions': 'n/a'}
CVE-2023-20831
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014162.
https://corp.mediatek.com/product-security-bulletin/September-2023
2022-10-28T02:03:23.685Z
2023-09-04T02:27:34.059Z
2023-09-04T02:27:34.059Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT2735, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8175, MT8195, MT8362A, MT8365', 'Versions': 'Android 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3'}
CVE-2023-20759
In cmdq, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07636133; Issue ID: ALPS07634601.
https://corp.mediatek.com/product-security-bulletin/July-2023
2022-10-28T02:03:10.771Z
2023-07-04T01:44:18.386Z
2023-07-04T01:44:18.386Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6739, MT6768, MT6771, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8786, MT8789, MT8797', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20020
A vulnerability in the Device Management Servlet application of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation when parsing HTTP requests. An attacker could exploit this vulnerability by sending a sustained stream of crafted requests to an affected device. A successful exploit could allow the attacker to cause all subsequent requests to be dropped, resulting in a DoS condition.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-dos-HpkeYzp
2022-10-27T18:47:50.308Z
2023-01-19T01:35:09.650Z
2024-01-25T16:57:33.176Z
{'Vendor': 'Cisco', 'Product': 'Cisco BroadWorks', 'Versions': '23.0, 23.0 ap380391, 23.0 ap380396, 23.0 ap379795, 23.0 ap373098, 23.0 ap382864, 23.0 ap382358, 23.0 ap382281, 23.0 ap367434, 23.0 ap376661, 23.0 ap380691, 23.0 ap383569, 23.0 ap375601, 23.0 ap372017, 23.0 ap383519, 23.0 ap375345, 23.0 ap371300, 23.0 ap383785, 23.0 ap380771, 23.0 ap351263, 23.0 ap376010, 23.0 ap382487, 23.0 ap383490, 23.0 ap383710, 23.0 ap375383, 23.0 ap375309, 23.0 ap375465, 23.0 ap380201, 23.0 ap380041, 23.0 ap380507, 23.0 ap379461, 23.0 ap377147, 23.0 ap376261, 23.0 ap381243, 23.0 ap381271, 23.0 ap382195, 23.0 ap380130, 23.0 ap380232, 23.0 ap377483, 23.0 ap383716, 23.0 ap383913, 23.0 ap383943, 23.0 ap383955, 23.0 ap383979, 23.0 ap383838, 23.0 ap384023, 23.0 ap381781, 23.0 ap383717, 23.0 ap383797, 23.0 ap383815, 23.0 ap383998, 23.0 ap384015, 23.0 ap384127, 23.0 ap384131, 23.0 ap384151, 23.0 ap384173, 23.0 ap384179, 23.0 ap384185, 23.0 ap384211, 23.0 ap384220, 23.0 ap384227, 23.0 ap384344, 23.0 ap363366, 23.0 ap364258, 23.0 ap364844, 23.0 ap365170, 23.0 ap365576, 23.0 ap365858, 23.0 ap366221, 23.0 ap366294, 23.0 ap365801, 23.0 ap366170, 23.0 ap364925, 23.0 ap366295, 23.0 ap366346, 23.0 ap366348, 23.0 ap365171, 23.0 ap364295, 23.0 ap364559, 23.0 ap366118, 23.0 ap366252, 23.0 ap363815, 23.0 ap363729, 23.0 ap365390, 23.0 ap364932, 23.0 ap365239, 23.0 ap365759, 23.0 ap366211, 23.0 ap366290, 23.0 ap365223, 23.0 ap366117, 23.0 ap365730, 23.0 ap366299, 23.0 ap366261, 23.0 ap365889, 23.0 ap366181, 23.0 ap365115, 23.0 ap364048, 23.0 ap366298, 23.0 ap364699, 23.0 ap345032, 23.0 ap362683, 23.0 ap363361, 23.0 ap352969, 23.0 ap359103, 23.0 ap366375, 23.0 ap366870, 23.0 ap366912, 23.0 ap366624, 23.0 ap367109, 23.0 ap366397, 23.0 ap354354, 23.0 ap349850, 23.0 ap366880, 23.0 ap360007, 23.0 ap366744, 23.0 ap366747, 23.0 ap366656, 23.0 ap367206, 23.0 ap362771, 23.0 ap367291, 23.0 ap366916, 23.0 ap367207, 23.0 ap363363, 23.0 ap366959, 23.0 ap351530, 23.0 ap361116, 23.0 ap366898, 23.0 ap357608, 23.0 ap361533, 23.0 ap366827, 23.0 ap352962, 23.0 ap366412, 23.0 ap369295, 23.0 ap366358, 23.0 ap366677, 23.0 ap366882, 23.0 ap366972, 23.0 ap366486, 23.0 ap366803, 23.0 ap358290, 23.0 ap363265, 23.0 ap363128, 23.0 ap366701, 23.0 ap366373, 23.0 ap369674, 23.0 ap369206, 23.0 ap369065, 23.0 ap368327, 23.0 ap368308, 23.0 ap368632, 23.0 ap367290, 23.0 ap369302, 23.0 ap368419, 23.0 ap369501, 23.0 ap369219, 23.0 ap368601, 23.0 ap368604, 23.0 ap368706, 23.0 ap368461, 23.0 ap368612, 23.0 ap368552, 23.0 ap369529, 23.0 ap369748, 23.0 ap368218, 23.0 ap368913, 23.0 ap369607, 23.0 ap369693, 23.0 ap368957, 23.0 ap368510, 23.0 ap368445, 23.0 ap369106, 23.0 ap369257, 23.0 ap368987, 23.0 ap369150, 23.0 ap368695, 23.0 ap368167, 23.0 ap370361, 23.0 ap367969, 23.0 ap367367, 23.0 ap369434, 23.0 ap369132, 23.0 ap367678, 23.0 ap367517, 23.0 ap369863, 23.0 ap369227, 23.0 ap368970, 23.0 ap369454, 23.0 ap367332, 23.0 ap368067, 23.0 ap369641, 23.0 ap367794, 23.0 ap369934, 23.0 ap370196, 23.0 ap367358, 23.0 ap367453, 23.0 ap369881, 23.0 ap367732, 23.0 ap367294, 23.0 ap367646, 23.0 ap367874, 23.0 ap370344, 23.0 ap367524, 23.0 ap368153, 23.0 ap368087, 23.0 ap367820, 23.0 ap368180, 23.0 ap367726, 23.0 ap370103, 23.0 ap367974, 23.0 ap367396, 23.0 ap367340, 23.0 ap367293, 23.0 ap369855, 23.0 ap368140, 23.0 ap367298, 23.0 ap367998, 23.0 ap372337, 23.0 ap372706, 23.0 ap368032, 23.0 ap367906, 23.0 ap370138, 23.0 ap372380, 23.0 ap372246, 23.0 ap370193, 23.0 ap372643, 23.0 ap372560, 23.0 ap367513, 23.0 ap369931, 23.0 ap368195, 23.0 ap372243, 23.0 ap368216, 23.0 ap369929, 23.0 ap367365, 23.0 ap367782, 23.0 ap367675, 23.0 ap372757, 23.0 ap372389, 23.0 ap372799, 23.0 ap372641, 23.0 ap371050, 23.0 ap372338, 23.0 ap372623, 23.0 ap372422, 23.0 ap372033, 23.0 ap372178, 23.0 ap371516, 23.0 ap372351, 23.0 ap372708, 23.0 ap372100, 23.0 ap372504, 23.0 ap371961, 23.0 ap370590, 23.0 ap370544, 23.0 ap372599, 23.0 ap371610, 23.0 ap371836, 23.0 ap371343, 23.0 ap372674, 23.0 ap371202, 23.0 ap370911, 23.0 ap370817, 23.0 ap372043, 23.0 ap370802, 23.0 ap371725, 23.0 ap370437, 23.0 ap370926, 23.0 ap370884, 23.0 ap371681, 23.0 ap371366, 23.0 ap370952, 23.0 ap371281, 23.0 ap371436, 23.0 ap371153, 23.0 ap371033, 23.0 ap371977, 23.0 ap371627, 23.0 ap371155, 23.0 ap371134, 23.0 ap371295, 23.0 ap372152, 23.0 ap371760, 23.0 ap370627, 23.0 ap371583, 23.0 ap371546, 23.0 ap371770, 23.0 ap371437, 23.0 ap372091, 23.0 ap372163, 23.0 ap370737, 23.0 ap370908, 23.0 ap370465, 23.0 ap371587, 23.0 ap375133, 23.0 ap371682, 23.0 ap375266, 23.0 ap372099, 23.0 ap375254, 23.0 ap372016, 23.0 ap372177, 23.0 ap375242, 23.0 ap375206, 23.0 ap375291, 23.0 ap371775, 23.0 ap375196, 23.0 ap375688, 23.0 ap375382, 23.0 ap375634, 23.0 ap375654, 23.0 ap375449, 23.0 ap375321, 23.0 ap375685, 23.0 ap375509, 23.0 ap375719, 23.0 ap375720, 23.0 ap375464, 23.0 ap375625, 23.0 ap375441, 23.0 ap375709, 23.0 ap375343, 23.0 ap375533, 23.0 ap375672, 23.0 ap375545, 23.0 ap375264, 23.0 ap375661, 23.0 ap375646, 23.0 ap375238, 23.0 ap375304, 23.0 ap375097, 23.0 ap373664, 23.0 ap373562, 23.0 ap372932, 23.0 ap374339, 23.0 ap374265, 23.0 ap374230, 23.0 ap374430, 23.0 ap373102, 23.0 ap375655, 23.0 ap373777, 23.0 ap374113, 23.0 ap373015, 23.0 ap374971, 23.0 ap374803, 23.0 ap374677, 23.0 ap372974, 23.0 ap373117, 23.0 ap374312, 23.0 ap374354, 23.0 ap375018, 23.0 ap373018, 23.0 ap374506, 23.0 ap374588, 23.0 ap373950, 23.0 ap375038, 23.0 ap373480, 23.0 ap374238, 23.0 ap372845, 23.0 ap373564, 23.0 ap373482, 23.0 ap372994, 23.0 ap373137, 23.0 ap373108, 23.0 ap374977, 23.0 ap373034, 23.0 ap374324, 23.0 ap374031, 23.0 ap374093, 23.0 ap373732, 23.0 ap374507, 23.0 ap373684, 23.0 ap374356, 23.0 ap373820, 23.0 ap373104, 23.0 ap373954, 23.0 ap373644, 23.0 ap373899, 23.0 ap374822, 23.0 ap374254, 23.0 ap375069, 23.0 ap373918, 23.0 ap374557, 23.0 ap372854, 23.0 ap373647, 23.0 ap374838, 23.0 ap374330, 23.0 ap374799, 23.0 ap374428, 23.0 ap373008, 23.0 ap375936, 23.0 ap375862, 23.0 ap374994, 23.0 ap376041, 23.0 ap374895, 23.0 ap375793, 23.0 ap376088, 23.0 ap373046, 23.0 ap375937, 23.0 ap374680, 23.0 ap376181, 23.0 ap375797, 23.0 ap375003, 23.0 ap373763, 23.0 ap373539, 23.0 ap373111, 23.0 ap375734, 23.0 ap376117, 23.0 ap375743, 23.0 ap376087, 23.0 ap376179, 23.0 ap376100, 23.0 ap373299, 23.0 ap373303, 23.0 ap375908, 23.0 ap376356, 23.0 ap375984, 23.0 ap373318, 23.0 ap375865, 23.0 ap373196, 23.0 ap376038, 23.0 ap373257, 23.0 ap373285, 23.0 ap376218, 23.0 ap373438, 23.0 ap373212, 23.0 ap373391, 23.0 ap373315, 23.0 ap373271, 23.0 ap376509, 23.0 ap376252, 23.0 ap376602, 23.0 ap376752, 23.0 ap373452, 23.0 ap376429, 23.0 ap376860, 23.0 ap376710, 23.0 ap376410, 23.0 ap376577, 23.0 ap376633, 23.0 ap376298, 23.0 ap373189, 23.0 ap376426, 23.0 ap376873, 23.0 ap376668, 23.0 ap376407, 23.0 ap376670, 23.0 ap376485, 23.0 ap376642, 23.0 ap376652, 23.0 ap376523, 23.0 ap376656, 23.0 ap376620, 23.0 ap376531, 23.0 ap378025, 23.0 ap377412, 23.0 ap376504, 23.0 ap376762, 23.0 ap376541, 23.0 ap376671, 23.0 ap376844, 23.0 ap376701, 23.0 ap376614, 23.0 ap377578, 23.0 ap377496, 23.0 ap377715, 23.0 ap377508, 23.0 ap376416, 23.0 ap377409, 23.0 ap377778, 23.0 ap376355, 23.0 ap377866, 23.0 ap377516, 23.0 ap377644, 23.0 ap377755, 23.0 ap377540, 23.0 ap377497, 23.0 ap377523, 23.0 ap377581, 23.0 ap377727, 23.0 ap378436, 23.0 ap377515, 23.0 ap377674, 23.0 ap378400, 23.0 ap377566, 23.0 ap377494, 23.0 ap377799, 23.0 ap377779, 23.0 ap378165, 23.0 ap378332, 23.0 ap377757, 23.0 ap377908, 23.0 ap377802, 23.0 ap377999, 23.0 ap377984, 23.0 ap378134, 23.0 ap378545, 23.0 ap378863, 23.0 ap378882, 23.0 ap379016, 23.0 ap378599, 23.0 ap378218, 23.0 ap378164, 23.0 ap379085, 23.0 ap378880, 23.0 ap378334, 23.0 ap378862, 23.0 ap378425, 23.0 ap378259, 23.0 ap378970, 23.0 ap378153, 23.0 ap378585, 23.0 ap378509, 23.0 ap378393, 23.0 ap378079, 23.0 ap378404, 23.0 ap378471, 23.0 ap378966, 23.0 ap379049, 23.0 ap379012, 23.0 ap379080, 23.0 ap378865, 23.0 ap378140, 23.0 ap378574, 23.0 ap378440, 23.0 ap378055, 23.0 ap378823, 23.0 ap378603, 23.0 ap379397, 23.0 ap379153, 23.0 ap378953, 23.0 ap378866, 23.0 ap379008, 23.0 ap378924, 23.0 ap378581, 23.0 ap378999, 23.0 ap378161, 23.0 ap378080, 23.0 ap379493, 23.0 ap380161, 23.0 ap379046, 23.0 ap379874, 23.0 ap378391, 23.0 ap380239, 23.0 ap379951, 23.0 ap379772, 23.0 ap378419, 23.0 ap378257, 23.0 ap379775, 23.0 ap379838, 23.0 ap379531, 23.0 ap379888, 23.0 ap379167, 23.0 ap378485, 23.0 ap380167, 23.0 ap380099, 23.0 ap379847, 23.0 ap379098, 23.0 ap379972, 23.0 ap379438, 23.0 ap380143, 23.0 ap380187, 23.0 ap379326, 23.0 ap379427, 23.0 ap380045, 23.0 ap379848, 23.0 ap377384, 23.0 ap376984, 23.0 ap377042, 23.0 ap379890, 23.0 ap380128, 23.0 ap377149, 23.0 ap380446, 23.0 ap379694, 23.0 ap376988, 23.0 ap380270, 23.0 ap379780, 23.0 ap380371, 23.0 ap377225, 23.0 ap379752, 23.0 ap380137, 23.0 ap377045, 23.0 ap376989, 23.0 ap380180, 23.0 ap380042, 23.0 ap376935, 23.0 ap379487, 23.0 ap379934, 23.0 ap377023, 23.0 ap377327, 23.0 ap379833, 23.0 ap376953, 23.0 ap380473, 23.0 ap380535, 23.0 ap377068, 23.0 ap379853, 23.0 ap379350, 23.0 ap380998, 23.0 ap380626, 23.0 ap377079, 23.0 ap379151, 23.0 ap377329, 23.0 ap381091, 23.0 ap380751, 23.0 ap380543, 23.0 ap381270, 23.0 ap380817, 23.0 ap381055, 23.0 ap380506, 23.0 ap381275, 23.0 ap380739, 23.0 ap380783, 23.0 ap380970, 23.0 ap380537, 23.0 ap381140, 23.0 ap380697, 23.0 ap380936, 23.0 ap380486, 23.0 ap380512, 23.0 ap380737, 23.0 ap381118, 23.0 ap380555, 23.0 ap381072, 23.0 ap381584, 23.0 ap381088, 23.0 ap381137, 23.0 ap382053, 23.0 ap381523, 23.0 ap381732, 23.0 ap382372, 23.0 ap382252, 23.0 ap383002, 23.0 ap382857, 23.0 ap383512, 23.0 ap382846, 23.0 ap382253, 23.0 ap381322, 23.0 ap382057, 23.0 ap382386, 23.0 ap382709, 23.0 ap382954, 23.0 ap382505, 23.0 ap382225, 23.0 ap382717, 23.0 ap381840, 23.0 ap381594, 23.0 ap381410, 23.0 ap382463, 23.0 ap382198, 23.0 ap381526, 23.0 ap381498, 23.0 ap381418, 23.0 ap383573, 23.0 ap382838, 23.0 ap381609, 23.0 ap381548, 23.0 ap382409, 23.0 ap383706, 23.0 ap382945, 23.0 ap382300, 23.0 ap382615, 23.0 ap382977, 23.0 ap384345, 23.0 ap383547, 23.0 ap382158, 23.0 ap382240, 23.0 ap383515, 23.0 ap383754, 23.0 ap381961, 23.0 ap382526, 23.0 ap382951, 23.0 ap382824, 23.0 ap382993, 23.0 ap383536, 23.0 ap383247, 23.0 ap381504, 23.0 ap383170, 23.0 ap382032, 23.0 ap382992, 23.0 ap383594, 23.0 ap383365, 23.0 ap383772, 23.0 ap381569, 23.0 ap381348, 23.0 ap382192, 23.0 ap381367, 23.0 ap383352, 23.0 ap383597, 23.0 ap381622, 23.0 ap383518, 23.0 ap383492, 23.0 ap383309, 23.0 ap383064, 23.0 ap383168, 23.0 ap382362, 23.0 ap382251, 23.0 ap383319, 23.0 ap382434, 23.0 ap384431, 23.0 ap383514, 23.0 ap384441, 22.0 ap383594, 22.0 ap371725, 22.0 ap383319, 22.0 ap367293, 22.0 ap383512, 22.0 ap376088, 22.0 ap361155, 22.0 ap382864, 22.0 ap383716, 22.0 ap383701, 22.0 ap342175, 22.0 ap339371, 22.0 ap353835, 22.0 ap351023, 22.0 ap354154, 22.0 ap353865, 22.0 ap350800, 22.0 ap350032, 22.0 ap349201, 22.0 ap353120, 22.0 ap351924, 22.0 ap351817, 22.0 ap353549, 22.0 ap353179, 22.0 ap351960, 22.0 ap352304, 22.0 ap353390, 22.0 ap352707, 22.0 ap355636, 22.0 ap352837, 22.0 ap353311, 22.0 ap352337, 22.0 ap355300, 22.0 ap356412, 22.0 ap355946, 22.0 ap355647, 22.0 ap356253, 22.0 ap354528, 22.0 ap355353, 22.0 ap356359, 22.0 ap355952, 22.0 ap354909, 22.0 ap356749, 22.0 ap357347, 22.0 ap354597, 22.0 ap356319, 22.0 ap356774, 22.0 ap356551, 22.0 ap351262, 22.0 ap357040, 22.0 ap357525, 22.0 ap357447, 22.0 ap357560, 22.0 ap357608, 22.0 ap357655, 22.0 ap357597, 22.0 ap358099, 22.0 ap357523, 22.0 ap357621, 22.0 ap357795, 22.0 ap358291, 22.0 ap359434, 22.0 ap358290, 22.0 ap358119, 22.0 ap359549, 22.0 ap358603, 22.0 ap359674, 22.0 ap359121, 22.0 ap360250, 22.0 ap360564, 22.0 ap359106, 22.0 ap359218, 22.0 ap359769, 22.0 ap360164, 22.0 ap359001, 22.0 ap360365, 22.0 ap360816, 22.0 ap361116, 22.0 ap361353, 22.0 ap361076, 22.0 ap360531, 22.0 ap362367, 22.0 ap362683, 22.0 ap362276, 22.0 ap362707, 22.0 ap361934, 22.0 ap363082, 22.0 ap361154, 22.0 ap362122, 22.0 ap364194, 22.0 ap361666, 22.0 ap362492, 22.0 ap363753, 22.0 ap362644, 22.0 ap367820, 22.0 ap362575, 22.0 ap363361, 22.0 ap363760, 22.0 ap364048, 22.0 ap363233, 22.0 ap363666, 22.0 ap363568, 22.0 ap367974, 22.0 ap364278, 22.0 ap363824, 22.0 ap368067, 22.0 ap363976, 22.0 ap364213, 22.0 ap364275, 22.0 ap366397, 22.0 ap366624, 22.0 ap363582, 22.0 ap364125, 22.0 ap366252, 22.0 ap363408, 22.0 ap366715, 22.0 ap364214, 22.0 ap364258, 22.0 ap366784, 22.0 ap366358, 22.0 ap366180, 22.0 ap365172, 22.0 ap366430, 22.0 ap364778, 22.0 ap364834, 22.0 ap364521, 22.0 ap364905, 22.0 ap364844, 22.0 ap364635, 22.0 ap367298, 22.0 ap365171, 22.0 ap364924, 22.0 ap365905, 22.0 ap365515, 22.0 ap367001, 22.0 ap365577, 22.0 ap365759, 22.0 ap365758, 22.0 ap367290, 22.0 ap367183, 22.0 ap371654, 22.0 ap371703, 22.0 ap365511, 22.0 ap365576, 22.0 ap370802, 22.0 ap365944, 22.0 ap366959, 22.0 ap371202, 22.0 ap365858, 22.0 ap371919, 22.0 ap367294, 22.0 ap371343, 22.0 ap367206, 22.0 ap371134, 22.0 ap372178, 22.0 ap371926, 22.0 ap372017, 22.0 ap371681, 22.0 ap372192, 22.0 ap371610, 22.0 ap371546, 22.0 ap371281, 22.0 ap371770, 22.0 ap370908, 22.0 ap368308, 22.0 ap371195, 22.0 ap371366, 22.0 ap368140, 22.0 ap371977, 22.0 ap371682, 22.0 ap371627, 22.0 ap369641, 22.0 ap369855, 22.0 ap368195, 22.0 ap368957, 22.0 ap368612, 22.0 ap368568, 22.0 ap368217, 22.0 ap369529, 22.0 ap368096, 22.0 ap368601, 22.0 ap368970, 22.0 ap369881, 22.0 ap369550, 22.0 ap369295, 22.0 ap369473, 22.0 ap369065, 22.0 ap372433, 22.0 ap372567, 22.0 ap372522, 22.0 ap369800, 22.0 ap372389, 22.0 ap372560, 22.0 ap370563, 22.0 ap370344, 22.0 ap372623, 22.0 ap370424, 22.0 ap370170, 22.0 ap374680, 22.0 ap374169, 22.0 ap374799, 22.0 ap370437, 22.0 ap374430, 22.0 ap374677, 22.0 ap372968, 22.0 ap373118, 22.0 ap373855, 22.0 ap373438, 22.0 ap374660, 22.0 ap373391, 22.0 ap373196, 22.0 ap373732, 22.0 ap374113, 22.0 ap373034, 22.0 ap373189, 22.0 ap374488, 22.0 ap374354, 22.0 ap373285, 22.0 ap373108, 22.0 ap374238, 22.0 ap373315, 22.0 ap373299, 22.0 ap373137, 22.0 ap373482, 22.0 ap375734, 22.0 ap375625, 22.0 ap375862, 22.0 ap373318, 22.0 ap375441, 22.0 ap375200, 22.0 ap374131, 22.0 ap373008, 22.0 ap376504, 22.0 ap376355, 22.0 ap372799, 22.0 ap376577, 22.0 ap374977, 22.0 ap375206, 22.0 ap375309, 22.0 ap375937, 22.0 ap375465, 22.0 ap375464, 22.0 ap375865, 22.0 ap375672, 22.0 ap375793, 22.0 ap374891, 22.0 ap376100, 22.0 ap375382, 22.0 ap375383, 22.0 ap375661, 22.0 ap375709, 22.0 ap375984, 22.0 ap375719, 22.0 ap376117, 22.0 ap376535, 22.0 ap375654, 22.0 ap375133, 22.0 ap375413, 22.0 ap379838, 22.0 ap375797, 22.0 ap379775, 22.0 ap380446, 22.0 ap379752, 22.0 ap376261, 22.0 ap380232, 22.0 ap375720, 22.0 ap380506, 22.0 ap380108, 22.0 ap376633, 22.0 ap379917, 22.0 ap380201, 22.0 ap379951, 22.0 ap380507, 22.0 ap380449, 22.0 ap380137, 22.0 ap376988, 22.0 ap376989, 22.0 ap376752, 22.0 ap376642, 22.0 ap377225, 22.0 ap376953, 22.0 ap376935, 22.0 ap377497, 22.0 ap376652, 22.0 ap380130, 22.0 ap376762, 22.0 ap377982, 22.0 ap376844, 22.0 ap377625, 22.0 ap377483, 22.0 ap377042, 22.0 ap378334, 22.0 ap377389, 22.0 ap378055, 22.0 ap378485, 22.0 ap378257, 22.0 ap377164, 22.0 ap378393, 22.0 ap378025, 22.0 ap377409, 22.0 ap378419, 22.0 ap377327, 22.0 ap378161, 22.0 ap377045, 22.0 ap378866, 22.0 ap379461, 22.0 ap379326, 22.0 ap378079, 22.0 ap377715, 22.0 ap379151, 22.0 ap379350, 22.0 ap379427, 22.0 ap379493, 22.0 ap379556, 22.0 ap379153, 22.0 ap382225, 22.0 ap380555, 22.0 ap381137, 22.0 ap382032, 22.0 ap382362, 22.0 ap381275, 22.0 ap381622, 22.0 ap380970, 22.0 ap382251, 22.0 ap382372, 22.0 ap381009, 22.0 ap381140, 22.0 ap381504, 22.0 ap382409, 22.0 ap382993, 22.0 ap382951, 22.0 ap383655, 22.0 ap382615, 22.0 ap382903, 22.0 ap382838, 22.0 ap382476, 22.0 ap354180, 22.0 ap359429, RI.2021.02, RI.2021.08, RI.2021.09, RI.2021.10, RI.2021.11, RI.2021.12, RI.2022.02, RI.2022.03, RI.2022.04, RI.2022.07, RI.2022.06, RI.2022.05, RI.2022.09, RI.2022.10'}
CVE-2023-20923
In exported content providers of ShannonRcs, there is a possible way to get access to protected content providers due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-246933910References: N/A
https://source.android.com/security/bulletin/pixel/2023-01-01
2022-11-03T00:00:00
2023-01-24T00:00:00
2023-01-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-20889
Aria Operations for Networks contains an information disclosure vulnerability. A malicious actor with network access to VMware Aria Operations for Networks may be able to perform a command injection attack resulting in information disclosure.
https://www.vmware.com/security/advisories/VMSA-2023-0012.html
2022-11-01T15:41:50.394Z
2023-06-07T14:20:14.452Z
2023-06-07T14:20:14.452Z
{'Vendor': 'n/a', 'Product': 'Aria Operations for Networks (Formerly vRealize Network Insight)', 'Versions': 'Aria Operations for Networks (Formerly vRealize Network Insight) 6.x'}
CVE-2023-20866
In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.
https://spring.io/security/cve-2023-20866
2022-11-01T00:00:00
2023-04-13T00:00:00
2023-04-13T00:00:00
{'Vendor': 'n/a', 'Product': 'Spring Session', 'Versions': 'Spring session versions 3.0.x prior to 3.0.1'}
CVE-2023-20935
In deserialize of multiple files, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-256589724
https://source.android.com/security/bulletin/2023-04-01
2022-11-03T00:00:00
2023-04-19T00:00:00
2023-04-19T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-11 Android-12 Android-12L Android-13'}
CVE-2023-20523
TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032
2022-10-27T18:53:39.737Z
2023-01-10T20:56:59.383Z
2023-01-11T07:01:59.843980Z
{'Vendor': ' AMD', 'Product': '2nd Gen EPYC', 'Versions': 'various '}
CVE-2023-20173
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to read arbitrary files or conduct a server-side request forgery (SSRF) attack through an affected device. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. For more information about these vulnerabilities, see the Details section of this advisory.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-696OZTCm
2022-10-27T00:00:00
2023-05-18T00:00:00
2023-05-18T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Identity Services Engine Software ', 'Versions': 'n/a'}
CVE-2023-20870
VMware Workstation and Fusion contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine.
https://www.vmware.com/security/advisories/VMSA-2023-0008.html
2022-11-01T00:00:00
2023-04-25T00:00:00
2023-04-25T00:00:00
{'Vendor': 'n/a', 'Product': 'VMware Workstation Pro / Player (Workstation) and VMware Fusion', 'Versions': 'VMware Workstation (17.x) and VMware Fusion (13.x)'}
CVE-2023-20718
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645181; Issue ID: ALPS07645181.
https://corp.mediatek.com/product-security-bulletin/May-2023
2022-10-28T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8168, MT8175, MT8195, MT8365, MT8395, MT8673, MT8781, MT8786, MT8789, MT8791T, MT8797', 'Versions': 'Android 11.0, 12.0, 13.0 / Iot-Yocto 22.2 (Yocto 4.0)'}
CVE-2023-20061
Multiple vulnerabilities in Cisco Unified Intelligence Center could allow an authenticated, remote attacker to collect sensitive information or perform a server-side request forgery (SSRF) attack on an affected system. Cisco plans to release software updates that address these vulnerabilities.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-infodisc-ssrf-84ZBmwVk
2022-10-27T00:00:00
2023-03-03T00:00:00
2023-03-03T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Unified Intelligence Center ', 'Versions': 'n/a'}
CVE-2023-20962
In getSliceEndItem of MediaVolumePreferenceController.java, there is a possible way to start foreground activity from the background due to an unsafe PendingIntent. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-256590210
https://source.android.com/security/bulletin/2023-03-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20827
In ims service, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937105; Issue ID: ALPS07937105.
https://corp.mediatek.com/product-security-bulletin/September-2023
2022-10-28T02:03:23.684Z
2023-09-04T02:27:27.371Z
2023-09-04T02:27:27.371Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6761, MT6762, MT6763, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8673, MT8791T, MT8797', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20124
A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device. Cisco has not released software updates that address this vulnerability.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv01x_rv32x_rce-nzAGWWDD
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Small Business RV Series Router Firmware ', 'Versions': 'n/a'}
CVE-2023-20626
In msdc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07405223; Issue ID: ALPS07405223.
https://corp.mediatek.com/product-security-bulletin/March-2023
2022-10-28T00:00:00
2023-03-07T00:00:00
2023-05-09T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8785, MT8789, MT8791, MT8797', 'Versions': 'Android 10.0, 11.0, 12.0'}
CVE-2023-20919
In getStringsForPrefix of Settings.java, there is a possible prevention of package uninstallation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-252663068
https://source.android.com/security/bulletin/2023-01-01
2022-11-03T00:00:00
2023-01-24T00:00:00
2023-01-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20734
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645184.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.767Z
2023-06-06T12:11:19.196Z
2023-06-06T12:11:19.196Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT5696, MT5836, MT5838, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8168, MT8365, MT8395, MT9000, MT9015, MT9023, MT9025, MT9618, MT9649, MT9653, MT9679, MT9687, MT9689, MT9902, MT9932, MT9952, MT9972, MT9982', 'Versions': 'Android 12.0, 13.0 / Yocto 4.0 / Iot-Yocto 22.2'}
CVE-2023-20221
A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based management interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform a factory reset of the affected device, resulting in a Denial of Service (DoS) condition.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-csrf-HOCmXW2c
2022-10-27T18:47:50.368Z
2023-08-16T21:01:05.872Z
2024-01-25T16:58:23.679Z
{'Vendor': 'Cisco', 'Product': 'Cisco IP Phones with Multiplatform Firmware', 'Versions': '11.3.1 MSR2-6, 11.3.1 MSR3-3, 11.3.2, 11.3.3, 11.3.4, 11.3.5, 11.3.3 MSR1, 11.3.6, 11-3-1MPPSR4UPG, 11.3.7, 11-3-1MSR2UPG, 11.3.6SR1, 11.3.7SR1, 11.3.7SR2, 11.0.0, 11.0.1, 11.0.1 MSR1-1, 11.0.2, 11.1.1, 11.1.1 MSR1-1, 11.1.1 MSR2-1, 11.1.2, 11.1.2 MSR1-1, 11.1.2 MSR3-1, 11.2.1, 11.2.2, 11.2.3, 11.2.3 MSR1-1, 11.2.4, 11.3.1, 11.3.1 MSR1-3'}
CVE-2023-20558
Insufficient control flow management in AmdCpmOemSmm may allow a privileged attacker to tamper with the SMM handler potentially leading to an escalation of privileges.
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-1027.html
2022-10-27T18:53:39.746Z
2023-03-23T18:50:11.488Z
2023-04-02T18:49:20.069507Z
{'Vendor': ' AMD', 'Product': 'Ryzen™ 2000 Series ', 'Versions': 'various '}
CVE-2023-20108
A vulnerability in the XCP Authentication Service of the Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an unauthenticated, remote attacker to cause a temporary service outage for all Cisco Unified CM IM&P users who are attempting to authenticate to the service, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted login message to the affected device. A successful exploit could allow the attacker to cause an unexpected restart of the authentication service, preventing new users from successfully authenticating. Exploitation of this vulnerability does not impact Cisco Unified CM IM&P users who were authenticated prior to an attack.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-dos-49GL7rzT
2022-10-27T00:00:00
2023-06-28T00:00:00
2024-01-25T16:57:44.711Z
{'Vendor': 'Cisco', 'Product': 'Cisco Unified Communications Manager IM and Presence Service', 'Versions': '10.5(1), 10.5(2), 10.5(2a), 10.5(2b), 10.5(2)SU3, 10.5(2)SU2a, 10.5(2)SU4a, 10.5(2)SU4, 10.5(1)SU3, 10.5(1)SU1, 10.5(2)SU1, 10.5(2)SU2, 10.5(1)SU2, 11.5(1), 11.5(1)SU1, 11.5(1)SU2, 11.5(1)SU3, 11.5(1)SU3a, 11.5(1)SU4, 11.5(1)SU5, 11.5(1)SU5a, 11.5(1)SU6, 11.5(1)SU7, 11.5(1)SU8, 11.5(1)SU9, 11.5(1)SU10, 11.5(1)SU11, 11.0(1), 11.0(1)SU1, 12.5(1), 12.5(1)SU1, 12.5(1)SU2, 12.5(1)SU3, 12.5(1)SU4, 12.5(1)SU5, 12.5(1)SU6, 14, 14SU1, 14SU2, 14SU2a, 10.0(1), 10.0(1)SU1, 10.0(1)SU2'}
CVE-2023-20722
In m4u, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07771518; Issue ID: ALPS07680084.
https://corp.mediatek.com/product-security-bulletin/May-2023
2022-10-28T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6765, MT6768, MT8768', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20688
In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441821; Issue ID: ALPS07441821.
https://corp.mediatek.com/product-security-bulletin/April-2023
2022-10-28T00:00:00
2023-04-06T00:00:00
2023-04-06T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT2715, MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8167, MT8168, MT8169, MT8173, MT8175, MT8183, MT8185, MT8188, MT8192, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8673, MT8675, MT8696, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8891', 'Versions': 'Android 11.0, 12.0, 13.0'}
CVE-2023-20237
A vulnerability in Cisco Intersight Virtual Appliance could allow an unauthenticated, adjacent attacker to access internal HTTP services that are otherwise inaccessible. This vulnerability is due to insufficient restrictions on internally accessible http proxies. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker access to internal subnets beyond the sphere of their intended access level.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-intersight-forward-C45ncgqb
2022-10-27T18:47:50.370Z
2023-08-16T21:00:25.948Z
2024-01-25T16:58:28.408Z
{'Vendor': 'Cisco', 'Product': 'Cisco Intersight Virtual Appliance', 'Versions': '1.0.9-503, 1.0.9-536, 1.0.9-538, 1.0.9-558, 1.0.9-561'}
CVE-2023-20958
In read_paint of ttcolr.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-254803162
https://source.android.com/security/bulletin/2023-03-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20775
In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07978760; Issue ID: ALPS07363410.
https://corp.mediatek.com/product-security-bulletin/July-2023
2022-10-28T02:03:10.775Z
2023-07-04T01:44:43.844Z
2023-07-04T01:44:43.844Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6739, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6983, MT6985, MT6990, MT8168, MT8183, MT8195, MT8673, MT8781', 'Versions': 'Android 12.0, 13.0 / OpenWrt 21.02 / RDKB 2022Q3'}
CVE-2023-20260
A vulnerability in the application CLI of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper processing of command line arguments to application scripts. An attacker could exploit this vulnerability by issuing a command on the CLI with malicious options. A successful exploit could allow the attacker to gain the escalated privileges of the root user on the underlying operating system.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq
2022-10-27T18:47:50.373Z
2024-01-17T16:57:33.285Z
2024-01-17T16:57:33.285Z
{'Vendor': 'Cisco', 'Product': 'Cisco Prime Infrastructure', 'Versions': '2.0.0, 2.0.10, 2.0.39, 2.1.0, 2.1.1, 2.1.2, 2.1.56, 2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.10, 2.2.8, 2.2.4, 2.2.7, 2.2.5, 2.2.9, 2.2.1 Update 01, 2.2.2 Update 03, 2.2.2 Update 04, 2.2.3 Update 02, 2.2.3 Update 03, 2.2.3 Update 04, 2.2.3 Update 05, 2.2.3 Update 06, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.6, 3.0.5, 3.0.7, 3.1.0, 3.1.1, 3.1.7, 3.1.5, 3.1.2, 3.1.3, 3.1.4, 3.1.6, 3.2.2, 3.2.0-FIPS, 3.2.1, 3.3.0, 3.3.1, 3.3.0 Update 01, 3.4.0, 3.4.1, 3.4.2, 3.4.1 Update 01, 3.4.1 Update 02, 3.4.2 Update 01, 3.5.0, 3.5.1, 3.5.0 Update 01, 3.5.0 Update 02, 3.5.0 Update 03, 3.5.1 Update 01, 3.5.1 Update 02, 3.5.1 Update 03, 3.6.0, 3.6.0 Update 01, 3.6.0 Update 02, 3.6.0 Update 03, 3.6.0 Update 04, 2.1, 2.2, 3.2, 3.4_DP1, 3.4_DP3, 3.4_DP2, 3.5_DP1, 3.4_DP7, 3.4_DP10, 3.4_DP5, 3.1_DP15, 3.4_DP11, 3.4_DP8, 3.7_DP1, 3.3_DP4, 3.10_DP1, 3.8_DP1, 3.7_DP2, 3.6_DP1, 3.1_DP16, 3.5_DP4, 3.3_DP3, 3.2_DP2, 3.4_DP4, 3.1_DP14, 3.1_DP6, 3.1_DP9, 3.4_DP6, 3.2_DP3, 3.4_DP9, 3.3_DP2, 3.2_DP1, 3.1_DP10, 3.9_DP1, 3.3_DP1, 3.1_DP13, 3.5_DP2, 3.1_DP12, 3.1_DP4, 3.5_DP3, 3.1_DP8, 3.1_DP7, 3.2_DP4, 3.1_DP11, 3.1_DP5, 3.7.0, 3.7.1, 3.7.1 Update 04, 3.7.1 Update 06, 3.7.1 Update 07, 3.7.1 Update 03, 3.7.0 Update 03, 3.7.1 Update 01, 3.7.1 Update 02, 3.7.1 Update 05, 3.8.0, 3.8.1, 3.8.1 Update 02, 3.8.1 Update 04, 3.8.1 Update 01, 3.8.1 Update 03, 3.8.0 Update 01, 3.8.0 Update 02, 3.9.0, 3.9.1, 3.9.1 Update 02, 3.9.1 Update 03, 3.9.1 Update 01, 3.9.1 Update 04, 3.9.0 Update 01, 3.10.0, 3.10.3, 3.10.1, 3.10.2, 3.10 Update 01, 3.10.4, 3.10.4 Update 01'}
CVE-2023-20630
In usb, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628505; Issue ID: ALPS07628505.
https://corp.mediatek.com/product-security-bulletin/March-2023
2022-10-28T00:00:00
2023-03-07T00:00:00
2023-05-09T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6735, MT6739, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6885, MT6893, MT6895, MT6983, MT8167, MT8168, MT8666, MT8675', 'Versions': 'Android 11.0, 12.0, 13.0'}
CVE-2023-20519
A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002
2022-10-27T18:53:39.736Z
2023-11-14T18:53:36.329Z
2023-11-14T18:53:36.329Z
{'Vendor': 'AMD', 'Product': '3rd Gen AMD EPYC™ Processors', 'Versions': 'various '}
CVE-2023-20149
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Small Business RV Series Router Firmware ', 'Versions': 'n/a'}
CVE-2023-20997
In multiple locations, there is a possible way to trigger a persistent reboot loop due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-246749702
https://source.android.com/security/bulletin/pixel/2023-03-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20647
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628547; Issue ID: ALPS07628547.
https://corp.mediatek.com/product-security-bulletin/March-2023
2022-10-28T00:00:00
2023-03-07T00:00:00
2023-05-09T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6739, MT6761, MT6762, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20217
A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing certain commands using sudo. A successful exploit could allow the attacker to view arbitrary files as root on the underlying operating system. The attacker must have valid credentials on the affected device.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-va-priv-esc-PUdgrx8E
2022-10-27T18:47:50.368Z
2023-08-16T21:39:41.364Z
2024-01-25T16:58:22.404Z
{'Vendor': 'Cisco', 'Product': 'Cisco ThousandEyes Recorder Application', 'Versions': 'N/A'}
CVE-2023-20702
In 5G NRLC, there is a possible invalid memory access due to lack of error handling. This could lead to remote denial of service, if UE received invalid 1-byte rlc sdu, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00921261; Issue ID: MOLY01128895.
https://corp.mediatek.com/product-security-bulletin/November-2023
2022-10-28T02:03:10.759Z
2023-11-06T03:50:51.533Z
2023-11-06T03:50:51.533Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6835, MT6873, MT6875, MT6879, MT6883, MT6885, MT6886, MT6889, MT6895, MT6980, MT6983, MT6985, MT6990, MT8673, MT8675, MT8791, MT8791T, MT8797, MT8798', 'Versions': 'Modem NR15, NR16, NR17'}
CVE-2023-20885
Vulnerability in Cloud Foundry Notifications, Cloud Foundry SMB-volume release, Cloud FOundry cf-nfs-volume release.This issue affects Notifications: All versions prior to 63; SMB-volume release: All versions prior to 3.1.19; cf-nfs-volume release: 5.0.X versions prior to 5.0.27, 7.1.X versions prior to 7.1.19.
https://www.cloudfoundry.org/blog/cve-2023-20885-cf-workflows-leak-credentials-in-system-audit-logs/
2022-11-01T15:41:50.393Z
2023-06-16T12:18:35.886Z
2023-06-16T12:19:17.758Z
{'Vendor': 'Cloud Foundry', 'Product': ' Notifications', 'Versions': 'All versions prior to 63'}
CVE-2023-20186
A vulnerability in the Authentication, Authorization, and Accounting (AAA) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to bypass command authorization and copy files to or from the file system of an affected device using the Secure Copy Protocol (SCP). This vulnerability is due to incorrect processing of SCP commands in AAA command authorization checks. An attacker with valid credentials and level 15 privileges could exploit this vulnerability by using SCP to connect to an affected device from an external machine. A successful exploit could allow the attacker to obtain or change the configuration of the affected device and put files on or retrieve files from the affected device.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaascp-Tyj4fEJm
2022-10-27T18:47:50.364Z
2023-09-27T17:22:02.802Z
2024-01-25T16:57:52.324Z
{'Vendor': 'Cisco', 'Product': 'IOS', 'Versions': '12.2(58)SE, 12.2(58)SE1, 12.2(58)SE2, 12.2(58)EX, 12.2(58)EY, 12.2(58)EY1, 12.2(58)EY2, 12.2(58)EZ, 12.2(60)EZ, 12.2(60)EZ1, 12.2(60)EZ2, 12.2(60)EZ3, 12.2(60)EZ4, 12.2(60)EZ5, 12.2(60)EZ6, 12.2(60)EZ7, 12.2(60)EZ8, 12.2(60)EZ9, 12.2(60)EZ10, 12.2(60)EZ11, 12.2(60)EZ12, 12.2(60)EZ13, 12.2(60)EZ14, 12.2(60)EZ15, 15.0(1)M1, 15.0(1)M5, 15.0(1)M4, 15.0(1)M3, 15.0(1)M2, 15.0(1)M6, 15.0(1)M, 15.0(1)M7, 15.0(1)M10, 15.0(1)M9, 15.0(1)M8, 15.0(1)XA2, 15.0(1)XA4, 15.0(1)XA1, 15.0(1)XA3, 15.0(1)XA, 15.0(1)XA5, 15.1(2)T, 15.1(1)T4, 15.1(3)T2, 15.1(1)T1, 15.1(2)T0a, 15.1(3)T3, 15.1(1)T3, 15.1(2)T3, 15.1(2)T4, 15.1(1)T2, 15.1(3)T, 15.1(2)T2a, 15.1(3)T1, 15.1(1)T, 15.1(2)T2, 15.1(2)T1, 15.1(2)T5, 15.1(3)T4, 15.1(1)T5, 15.1(1)XB, 15.0(1)S2, 15.0(1)S1, 15.0(1)S, 15.0(1)S3a, 15.0(1)S4, 15.0(1)S5, 15.0(1)S4a, 15.0(1)S6, 15.2(1)S, 15.2(2)S, 15.2(1)S1, 15.2(4)S, 15.2(1)S2, 15.2(2)S1, 15.2(2)S2, 15.2(2)S0a, 15.2(2)S0c, 15.2(4)S1, 15.2(4)S4, 15.2(4)S6, 15.2(4)S2, 15.2(4)S5, 15.2(4)S3, 15.2(4)S3a, 15.2(4)S4a, 15.2(4)S7, 15.3(1)T, 15.3(2)T, 15.3(1)T1, 15.3(1)T2, 15.3(1)T3, 15.3(1)T4, 15.3(2)T1, 15.3(2)T2, 15.3(2)T3, 15.3(2)T4, 15.0(1)EY, 15.0(1)EY1, 15.0(1)EY2, 15.0(2)EY, 15.0(2)EY1, 15.0(2)EY2, 15.0(2)EY3, 15.1(2)S, 15.1(1)S, 15.1(1)S1, 15.1(3)S, 15.1(1)S2, 15.1(2)S1, 15.1(2)S2, 15.1(3)S1, 15.1(3)S0a, 15.1(3)S2, 15.1(3)S4, 15.1(3)S3, 15.1(3)S5, 15.1(3)S6, 15.1(3)S5a, 15.1(4)M3, 15.1(4)M, 15.1(4)M1, 15.1(4)M2, 15.1(4)M6, 15.1(4)M5, 15.1(4)M4, 15.1(4)M7, 15.1(4)M3a, 15.1(4)M10, 15.1(4)M8, 15.1(4)M9, 15.0(1)SE, 15.0(2)SE, 15.0(1)SE1, 15.0(1)SE2, 15.0(1)SE3, 15.0(2)SE1, 15.0(2)SE2, 15.0(2)SE3, 15.0(2)SE4, 15.0(2)SE5, 15.0(2)SE6, 15.0(2)SE7, 15.0(2)SE8, 15.0(2)SE9, 15.0(2)SE10, 15.0(2)SE11, 15.0(2)SE10a, 15.0(2)SE12, 15.0(2)SE13, 15.1(2)GC, 15.1(2)GC1, 15.1(2)GC2, 15.1(4)GC, 15.1(4)GC1, 15.1(4)GC2, 15.1(1)SG, 15.1(2)SG, 15.1(1)SG1, 15.1(1)SG2, 15.1(2)SG1, 15.1(2)SG2, 15.1(2)SG3, 15.1(2)SG4, 15.1(2)SG5, 15.1(2)SG6, 15.1(2)SG7, 15.1(2)SG8, 15.0(1)MR, 15.0(2)MR, 15.2(4)M, 15.2(4)M1, 15.2(4)M2, 15.2(4)M4, 15.2(4)M3, 15.2(4)M5, 15.2(4)M8, 15.2(4)M10, 15.2(4)M7, 15.2(4)M6, 15.2(4)M9, 15.2(4)M6a, 15.2(4)M11, 15.0(1)EX, 15.0(2)EX, 15.0(2)EX1, 15.0(2)EX2, 15.0(2)EX3, 15.0(2)EX4, 15.0(2)EX5, 15.0(2)EX8, 15.0(2a)EX5, 15.0(2)EX10, 15.0(2)EX11, 15.0(2)EX13, 15.0(2)EX12, 15.2(1)GC, 15.2(1)GC1, 15.2(1)GC2, 15.2(2)GC, 15.2(3)GC, 15.2(3)GC1, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)GC3, 15.1(1)SY, 15.1(1)SY1, 15.1(2)SY, 15.1(2)SY1, 15.1(2)SY2, 15.1(1)SY2, 15.1(1)SY3, 15.1(2)SY3, 15.1(1)SY4, 15.1(2)SY4, 15.1(1)SY5, 15.1(2)SY5, 15.1(2)SY4a, 15.1(1)SY6, 15.1(2)SY6, 15.1(2)SY7, 15.1(2)SY8, 15.1(2)SY9, 15.1(2)SY10, 15.1(2)SY11, 15.1(2)SY12, 15.1(2)SY13, 15.1(2)SY14, 15.1(2)SY15, 15.1(2)SY16, 15.3(1)S, 15.3(2)S, 15.3(3)S, 15.3(1)S2, 15.3(1)S1, 15.3(2)S2, 15.3(2)S1, 15.3(3)S1, 15.3(3)S2, 15.3(3)S3, 15.3(3)S6, 15.3(3)S4, 15.3(3)S1a, 15.3(3)S5, 15.3(3)S7, 15.3(3)S8, 15.3(3)S9, 15.3(3)S10, 15.3(3)S8a, 15.4(1)T, 15.4(2)T, 15.4(1)T2, 15.4(1)T1, 15.4(1)T3, 15.4(2)T1, 15.4(2)T3, 15.4(2)T2, 15.4(1)T4, 15.4(2)T4, 15.0(2)EA, 15.0(2)EA1, 15.2(1)E, 15.2(2)E, 15.2(1)E1, 15.2(3)E, 15.2(1)E2, 15.2(1)E3, 15.2(2)E1, 15.2(4)E, 15.2(3)E1, 15.2(2)E2, 15.2(2a)E1, 15.2(2)E3, 15.2(2a)E2, 15.2(3)E2, 15.2(3a)E, 15.2(3)E3, 15.2(4)E1, 15.2(2)E4, 15.2(2)E5, 15.2(4)E2, 15.2(3)E4, 15.2(5)E, 15.2(4)E3, 15.2(2)E6, 15.2(5a)E, 15.2(5)E1, 15.2(5b)E, 15.2(2)E5a, 15.2(5c)E, 15.2(3)E5, 15.2(2)E5b, 15.2(5a)E1, 15.2(4)E4, 15.2(2)E7, 15.2(5)E2, 15.2(6)E, 15.2(5)E2b, 15.2(4)E5, 15.2(5)E2c, 15.2(2)E8, 15.2(6)E0a, 15.2(6)E1, 15.2(2)E7b, 15.2(4)E5a, 15.2(6)E0c, 15.2(4)E6, 15.2(6)E2, 15.2(2)E9, 15.2(4)E7, 15.2(7)E, 15.2(2)E10, 15.2(4)E8, 15.2(6)E2a, 15.2(6)E2b, 15.2(7)E1, 15.2(7)E0a, 15.2(7)E0b, 15.2(7)E0s, 15.2(6)E3, 15.2(4)E9, 15.2(7)E2, 15.2(7a)E0b, 15.2(4)E10, 15.2(7)E3, 15.2(7)E1a, 15.2(7b)E0b, 15.2(7)E2a, 15.2(4)E10a, 15.2(7)E4, 15.2(7)E3k, 15.2(8)E, 15.2(8)E1, 15.2(7)E5, 15.2(7)E6, 15.2(8)E2, 15.2(4)E10d, 15.2(7)E7, 15.2(8)E3, 15.2(7)E8, 15.1(3)MRA, 15.1(3)MRA1, 15.1(3)MRA2, 15.1(3)MRA3, 15.1(3)MRA4, 15.1(3)SVB1, 15.1(3)SVB2, 15.4(1)S, 15.4(2)S, 15.4(3)S, 15.4(1)S1, 15.4(1)S2, 15.4(2)S1, 15.4(1)S3, 15.4(3)S1, 15.4(2)S2, 15.4(3)S2, 15.4(3)S3, 15.4(1)S4, 15.4(2)S3, 15.4(2)S4, 15.4(3)S4, 15.4(3)S5, 15.4(3)S6, 15.4(3)S7, 15.4(3)S6a, 15.4(3)S8, 15.4(3)S9, 15.4(3)S10, 15.3(3)M, 15.3(3)M1, 15.3(3)M2, 15.3(3)M3, 15.3(3)M5, 15.3(3)M4, 15.3(3)M6, 15.3(3)M7, 15.3(3)M8, 15.3(3)M9, 15.3(3)M10, 15.3(3)M8a, 15.0(2)EZ, 15.1(3)SVD, 15.1(3)SVD1, 15.1(3)SVD2, 15.2(1)EY, 15.0(2)EJ, 15.0(2)EJ1, 15.2(1)SY, 15.2(1)SY1, 15.2(1)SY0a, 15.2(1)SY2, 15.2(2)SY, 15.2(1)SY1a, 15.2(2)SY1, 15.2(2)SY2, 15.2(1)SY3, 15.2(1)SY4, 15.2(2)SY3, 15.2(1)SY5, 15.2(1)SY6, 15.2(1)SY7, 15.2(1)SY8, 15.2(5)EX, 15.1(3)SVF, 15.1(3)SVF1, 15.1(3)SVE, 15.4(3)M, 15.4(3)M1, 15.4(3)M2, 15.4(3)M3, 15.4(3)M4, 15.4(3)M5, 15.4(3)M6, 15.4(3)M7, 15.4(3)M6a, 15.4(3)M8, 15.4(3)M9, 15.4(3)M10, 15.0(2)EK, 15.0(2)EK1, 15.4(1)CG, 15.4(1)CG1, 15.4(2)CG, 15.5(1)S, 15.5(2)S, 15.5(1)S1, 15.5(3)S, 15.5(1)S2, 15.5(1)S3, 15.5(2)S1, 15.5(2)S2, 15.5(3)S1, 15.5(3)S1a, 15.5(2)S3, 15.5(3)S2, 15.5(3)S0a, 15.5(3)S3, 15.5(1)S4, 15.5(2)S4, 15.5(3)S4, 15.5(3)S5, 15.5(3)S6, 15.5(3)S6a, 15.5(3)S7, 15.5(3)S6b, 15.5(3)S8, 15.5(3)S9, 15.5(3)S10, 15.5(3)S9a, 15.1(3)SVG, 15.2(2)EB, 15.2(2)EB1, 15.2(2)EB2, 15.2(6)EB, 15.5(1)T, 15.5(1)T1, 15.5(2)T, 15.5(1)T2, 15.5(1)T3, 15.5(2)T1, 15.5(2)T2, 15.5(2)T3, 15.5(2)T4, 15.5(1)T4, 15.2(2)EA, 15.2(2)EA1, 15.2(2)EA2, 15.2(3)EA, 15.2(4)EA, 15.2(4)EA1, 15.2(2)EA3, 15.2(4)EA3, 15.2(5)EA, 15.2(4)EA4, 15.2(4)EA5, 15.2(4)EA6, 15.2(4)EA7, 15.2(4)EA8, 15.2(4)EA9, 15.2(4)EA9a, 15.5(3)M, 15.5(3)M1, 15.5(3)M0a, 15.5(3)M2, 15.5(3)M3, 15.5(3)M4, 15.5(3)M4a, 15.5(3)M5, 15.5(3)M6, 15.5(3)M7, 15.5(3)M6a, 15.5(3)M8, 15.5(3)M9, 15.5(3)M10, 15.5(3)SN, 15.6(1)S, 15.6(2)S, 15.6(2)S1, 15.6(1)S1, 15.6(1)S2, 15.6(2)S2, 15.6(1)S3, 15.6(2)S3, 15.6(1)S4, 15.6(2)S4, 15.6(1)T, 15.6(2)T, 15.6(1)T0a, 15.6(1)T1, 15.6(2)T1, 15.6(1)T2, 15.6(2)T2, 15.6(1)T3, 15.6(2)T3, 15.3(1)SY, 15.3(1)SY1, 15.3(1)SY2, 15.6(2)SP, 15.6(2)SP1, 15.6(2)SP2, 15.6(2)SP3, 15.6(2)SP4, 15.6(2)SP5, 15.6(2)SP6, 15.6(2)SP7, 15.6(2)SP8, 15.6(2)SP9, 15.6(2)SP10, 15.6(2)SN, 15.6(3)M, 15.6(3)M1, 15.6(3)M0a, 15.6(3)M1b, 15.6(3)M2, 15.6(3)M2a, 15.6(3)M3, 15.6(3)M3a, 15.6(3)M4, 15.6(3)M5, 15.6(3)M6, 15.6(3)M7, 15.6(3)M6a, 15.6(3)M6b, 15.6(3)M8, 15.6(3)M9, 15.1(3)SVJ2, 15.2(4)EC1, 15.2(4)EC2, 15.4(1)SY, 15.4(1)SY1, 15.4(1)SY2, 15.4(1)SY3, 15.4(1)SY4, 15.5(1)SY, 15.5(1)SY1, 15.5(1)SY2, 15.5(1)SY3, 15.5(1)SY4, 15.5(1)SY5, 15.5(1)SY6, 15.5(1)SY7, 15.5(1)SY8, 15.5(1)SY9, 15.5(1)SY10, 15.5(1)SY11, 15.7(3)M, 15.7(3)M1, 15.7(3)M0a, 15.7(3)M3, 15.7(3)M2, 15.7(3)M4, 15.7(3)M5, 15.7(3)M4a, 15.7(3)M4b, 15.7(3)M6, 15.7(3)M7, 15.7(3)M8, 15.7(3)M9, 15.8(3)M, 15.8(3)M1, 15.8(3)M0a, 15.8(3)M0b, 15.8(3)M2, 15.8(3)M1a, 15.8(3)M3, 15.8(3)M2a, 15.8(3)M4, 15.8(3)M3a, 15.8(3)M3b, 15.8(3)M5, 15.8(3)M6, 15.8(3)M7, 15.8(3)M8, 15.8(3)M9, 15.8(3)M10, 15.9(3)M, 15.9(3)M1, 15.9(3)M0a, 15.9(3)M2, 15.9(3)M3, 15.9(3)M2a, 15.9(3)M3a, 15.9(3)M4, 15.9(3)M3b, 15.9(3)M5, 15.9(3)M4a, 15.9(3)M6, 15.9(3)M7, 15.9(3)M6a, 15.9(3)M6b, 15.9(3)M7a, 15.3(3)JPI11'}
CVE-2023-20169
A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco NX-OS Software for the Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, adjacent attacker to cause the IS-IS process to unexpectedly restart, which could cause an affected device to reload. This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the unexpected restart of the IS-IS process, which could cause the affected device to reload. Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2 adjacent to the affected device.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-n3_9k-isis-dos-FTCXB4Vb
2022-10-27T18:47:50.362Z
2023-08-23T18:19:45.317Z
2024-01-25T16:57:49.042Z
{'Vendor': 'Cisco', 'Product': 'Cisco NX-OS Software', 'Versions': '10.3(2)'}