Vulnerability Details : CVE-2017-16544
Potential exploit
In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.
Products affected by CVE-2017-16544
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201811401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201903001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201905001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201909001:*:*:*:*:*:*
- cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:redlion:n-tron_702-w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:redlion:n-tron_702m12-w_firmware:*:*:*:*:*:*:*:*
Threat overview for CVE-2017-16544
Top countries where our scanners detected CVE-2017-16544
Top open port discovered on systems with this issue
80
IPs affected by CVE-2017-16544 963,745
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-16544!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-16544
11.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-16544
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2017-16544
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-16544
-
http://www.vmware.com/security/advisories/VMSA-2019-0013.html
VMSA-2019-0013.1Third Party Advisory
-
http://seclists.org/fulldisclosure/2021/Jan/39
Full Disclosure: SEC Consult SA-20210113-0 :: Multiple vulnerabilities in Pepperl+Fuchs IO-Link Master SeriesExploit;Mailing List;Third Party Advisory
-
http://seclists.org/fulldisclosure/2019/Sep/7
Full Disclosure: SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16XExploit;Mailing List;Third Party Advisory
-
https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01
Red Lion N-Tron 702-W, 702M12-W | CISAThird Party Advisory;US Government Resource
-
https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/
Busybox Shell Vulnerability | CVE-2017-16544 | Twistlock AlertsThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html
[SECURITY] [DLA 2559-1] busybox security updateMailing List;Third Party Advisory
-
http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html
VMware Security Advisory 2019-0013 ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://usn.ubuntu.com/3935-1/
USN-3935-1: BusyBox vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://seclists.org/fulldisclosure/2021/Aug/21
Full Disclosure: SEC Consult SA-20210819-0 :: Multiple critical vulnerabilities in Altus Nexto and Hadron seriesExploit;Mailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
[SECURITY] [DLA 1445-1] busybox security updateMailing List;Third Party Advisory
-
http://seclists.org/fulldisclosure/2020/Mar/15
Full Disclosure: SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router & TC Cloud ClientExploit;Mailing List;Third Party Advisory
-
https://seclists.org/bugtraq/2019/Sep/7
Bugtraq: SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16XExploit;Mailing List;Third Party Advisory
-
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
Cisco Device Hardcoded Credentials / GNU glibc / BusyBox ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://seclists.org/fulldisclosure/2020/Aug/20
Full Disclosure: SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910SExploit;Mailing List;Third Party Advisory
-
https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8
busybox - BusyBox: The Swiss Army Knife of Embedded LinuxPatch;Vendor Advisory
-
http://seclists.org/fulldisclosure/2022/Jun/36
Full Disclosure: SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch seriesExploit;Mailing List;Third Party Advisory
-
https://seclists.org/bugtraq/2019/Jun/14
Bugtraq: SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch SeriesExploit;Mailing List;Third Party Advisory
-
http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html
Nexans FTTO GigaSwitch Outdated Components / Hardcoded Backdoor ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://seclists.org/fulldisclosure/2020/Sep/6
Full Disclosure: SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-WExploit;Mailing List;Third Party Advisory
-
http://seclists.org/fulldisclosure/2019/Jun/18
Full Disclosure: SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch SeriesExploit;Mailing List;Third Party Advisory
Jump to