Report Name: Linux Patch Wednesday December 2023Generated: 2024-01-30 02:51:11
Product Name | Prevalence | U | C | H | M | L | A | Comment |
---|---|---|---|---|---|---|---|---|
Kibana | 0.9 | 1 | 1 | Data visualization dashboard software | ||||
Linux Kernel | 0.9 | 4 | 12 | 16 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |||
Chromium | 0.8 | 1 | 2 | 15 | 18 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | ||
GNU C Library | 0.8 | 1 | 1 | The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library | ||||
Mozilla Firefox | 0.8 | 10 | 10 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | ||||
OpenSSH | 0.8 | 1 | 1 | OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture | ||||
OpenSSL | 0.8 | 1 | 1 | 2 | A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end | |||
Safari | 0.8 | 2 | 1 | 2 | 5 | Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML. | ||
Kubernetes | 0.7 | 1 | 1 | Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management | ||||
Eclipse Mosquitto | 0.6 | 1 | 1 | 2 | Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines | |||
Redis | 0.6 | 1 | 1 | Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability | ||||
Wireshark | 0.6 | 1 | 1 | 2 | Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education | |||
libxml2 | 0.6 | 1 | 1 | libxml2 is an XML toolkit implemented in C, originally developed for the GNOME Project | ||||
AFFLIB | 0.5 | 1 | 1 | Product detected by a:afflib_project:afflib (exists in CPE dict) | ||||
ActiveMQ | 0.5 | 1 | 1 | Product detected by a:apache:activemq (exists in CPE dict) | ||||
Amanda | 0.5 | 1 | 1 | Product detected by a:zmanda:amanda (exists in CPE dict) | ||||
Avro | 0.5 | 1 | 1 | Product detected by a:apache:avro (exists in CPE dict) | ||||
Crypto-js | 0.5 | 1 | 1 | Product detected by a:crypto-js_project:crypto-js (exists in CPE dict) | ||||
Curl | 0.5 | 1 | 1 | 2 | Product detected by a:haxx:curl (exists in CPE dict) | |||
FRRouting | 0.5 | 3 | 1 | 4 | Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD | |||
Fast DDS | 0.5 | 1 | 1 | Product detected by a:eprosima:fast_dds (exists in CPE dict) | ||||
Freeimage | 0.5 | 1 | 2 | 3 | Product detected by a:freeimage_project:freeimage (exists in CPE dict) | |||
Glusterfs | 0.5 | 1 | 1 | Product detected by a:gluster:glusterfs (exists in CPE dict) | ||||
GnuTLS | 0.5 | 1 | 1 | Product detected by a:gnu:gnutls (exists in CPE dict) | ||||
Guava | 0.5 | 1 | 1 | Product detected by a:google:guava (exists in CPE dict) | ||||
HID | 0.5 | 1 | 1 | HID | ||||
HTTP Server | 0.5 | 1 | 1 | Product detected by a:apache:http_server (exists in CPE dict) | ||||
Horizon | 0.5 | 1 | 1 | Product detected by a:openstack:horizon (exists in CPE dict) | ||||
InsydeH2O | 0.5 | 1 | 1 | Product detected by a:insyde:insydeh2o (exists in CPE dict) | ||||
OpenDKIM | 0.5 | 1 | 1 | Product detected by a:opendkim:opendkim (exists in CPE dict) | ||||
Opensc | 0.5 | 3 | 3 | Product detected by a:opensc_project:opensc (exists in CPE dict) | ||||
Pydantic | 0.5 | 1 | 1 | Product detected by a:pydantic_project:pydantic (exists in CPE dict) | ||||
RabbitMQ | 0.5 | 1 | 1 | Product detected by a:vmware:rabbitmq (exists in CPE dict) | ||||
SSHD | 0.5 | 1 | 1 | Product detected by a:apache:sshd (exists in CPE dict) | ||||
Squid | 0.5 | 2 | 2 | Product detected by a:squid-cache:squid (exists in CPE dict) | ||||
Symfony | 0.5 | 1 | 1 | Product detected by a:sensiolabs:symfony (exists in CPE dict) | ||||
Tracker Miners | 0.5 | 1 | 1 | Product detected by a:gnome:tracker_miners (exists in CPE dict) | ||||
X Server | 0.5 | 1 | 1 | 2 | Product detected by a:x.org:x_server (exists in CPE dict) | |||
ZBar | 0.5 | 2 | 2 | Product detected by a:zbar_project:zbar (exists in CPE dict) | ||||
avahi | 0.5 | 5 | 5 | Product detected by a:avahi:avahi (exists in CPE dict) | ||||
budgie_extras | 0.5 | 6 | 6 | Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict) | ||||
cryptography | 0.5 | 1 | 1 | Product detected by a:cryptography_project:cryptography (exists in CPE dict) | ||||
gevent | 0.5 | 1 | 1 | Product detected by a:gevent:gevent (does NOT exist in CPE dict) | ||||
grafana | 0.5 | 1 | 1 | 2 | Product detected by a:grafana:grafana (exists in CPE dict) | |||
haproxy | 0.5 | 1 | 1 | Product detected by a:haproxy:haproxy (exists in CPE dict) | ||||
iniparser | 0.5 | 1 | 1 | Product detected by a:iniparser_project:iniparser (does NOT exist in CPE dict) | ||||
keycloak | 0.5 | 1 | 1 | 2 | Product detected by a:redhat:keycloak (exists in CPE dict) | |||
libde265 | 0.5 | 2 | 1 | 3 | Product detected by a:struktur:libde265 (exists in CPE dict) | |||
libreoffice | 0.5 | 2 | 2 | Product detected by a:libreoffice:libreoffice (exists in CPE dict) | ||||
libtiff | 0.5 | 1 | 2 | 3 | Product detected by a:libtiff:libtiff (exists in CPE dict) | |||
linux_kernel | 0.5 | 2 | 2 | Product detected by o:linux:linux_kernel (exists in CPE dict) | ||||
lwIP | 0.5 | 1 | 1 | Product detected by a:lwip_project:lwip (exists in CPE dict) | ||||
openvswitch | 0.5 | 1 | 1 | Product detected by a:openvswitch:openvswitch (exists in CPE dict) | ||||
openzfs | 0.5 | 1 | 1 | Product detected by a:openzfs:openzfs (exists in CPE dict) | ||||
perl | 0.5 | 1 | 1 | 2 | Product detected by a:perl:perl (exists in CPE dict) | |||
single_sign-on | 0.5 | 1 | 1 | Product detected by a:redhat:single_sign-on (exists in CPE dict) | ||||
smarty | 0.5 | 1 | 1 | Product detected by a:smarty:smarty (exists in CPE dict) | ||||
strongswan | 0.5 | 1 | 1 | Product detected by a:strongswan:strongswan (exists in CPE dict) | ||||
vim | 0.5 | 2 | 7 | 9 | Product detected by a:vim:vim (exists in CPE dict) | |||
wordpress | 0.5 | 1 | 1 | 2 | Product detected by a:wordpress:wordpress (exists in CPE dict) | |||
GPAC | 0.4 | 1 | 1 | GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity) | ||||
Artifex Ghostscript | 0.3 | 1 | 1 | Artifex Ghostscript is an interpreter for the PostScript® language and PDF files | ||||
Visual Studio Code | 0.3 | 1 | 5 | 6 | Integrated development environment | |||
Unknown Product | 0 | 1 | 10 | 11 | Unknown Product |
Vulnerability Type | Criticality | U | C | H | M | L | A |
---|---|---|---|---|---|---|---|
Remote Code Execution | 1.0 | 4 | 8 | 4 | 16 | ||
Code Injection | 0.97 | 1 | 1 | ||||
Authentication Bypass | 0.95 | 1 | 2 | 3 | 6 | ||
Security Feature Bypass | 0.9 | 1 | 1 | 3 | 9 | 14 | |
Elevation of Privilege | 0.85 | 1 | 3 | 3 | 7 | ||
Arbitrary File Reading | 0.83 | 1 | 1 | ||||
Information Disclosure | 0.83 | 2 | 10 | 12 | |||
Cross Site Scripting | 0.8 | 2 | 2 | ||||
Open Redirect | 0.75 | 1 | 1 | ||||
Denial of Service | 0.7 | 11 | 24 | 35 | |||
Path Traversal | 0.7 | 2 | 2 | ||||
Incorrect Calculation | 0.5 | 1 | 1 | 10 | 12 | ||
Memory Corruption | 0.5 | 7 | 28 | 35 | |||
Spoofing | 0.4 | 3 | 3 | ||||
Unknown Vulnerability Type | 0 | 6 | 12 | 18 |
Source | U | C | H | M | L | A |
---|---|---|---|---|---|---|
debian | 1 | 9 | 30 | 90 | 11 | 141 |
ubuntu | 7 | 21 | 61 | 9 | 98 | |
oraclelinux | 2 | 6 | 29 | 3 | 40 | |
almalinux | 2 | 4 | 26 | 3 | 35 | |
redhat | 4 | 9 | 35 | 4 | 52 | |
redos | 2 | 9 | 11 |
1. Security Feature Bypass - ActiveMQ (CVE-2023-46604) - Urgent [898]
Description: The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
debian: CVE-2023-46604 was patched at 2023-11-21, unknown date
2. Information Disclosure - wordpress (CVE-2023-39999) - Critical [779]
Description: Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object), AttackerKB websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:patchstack.com website | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:wordpress:wordpress (exists in CPE dict) | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00322, EPSS Percentile is 0.67643 |
debian: CVE-2023-39999 was patched at 2023-11-21, unknown date
3. Remote Code Execution - Safari (CVE-2023-42917) - Critical [692]
Description: A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2,
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV websites | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.8 | 14 | Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML. | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00137, EPSS Percentile is 0.49051 |
debian: CVE-2023-42917 was patched at 2023-12-11, unknown date
ubuntu: CVE-2023-42917 was patched at 2023-12-11
oraclelinux: CVE-2023-42917 was patched at 2023-12-13
almalinux: CVE-2023-42917 was patched at 2023-12-11
redhat: CVE-2023-42917 was patched at 2023-12-11
4. Security Feature Bypass - OpenSSH (CVE-2023-48795) - Critical [686]
Description: The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:www.terrapin-attack.com website | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture | |
0.6 | 10 | CVSS Base Score is 5.9. According to NVD data source | |
1.0 | 10 | EPSS Probability is 0.69435, EPSS Percentile is 0.97721 |
debian: CVE-2023-48795 was patched at 2023-12-22, 2023-12-24, 2023-12-26, 2023-12-28, 2024-01-12, unknown date
ubuntu: CVE-2023-48795 was patched at 2023-12-19, 2024-01-11, 2024-01-15, 2024-01-18, 2024-01-25
redhat: CVE-2023-48795 was patched at 2024-01-25, 2024-01-29
5. Remote Code Execution - perl (CVE-2022-48522) - Critical [666]
Description: In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:perl:perl (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00285, EPSS Percentile is 0.65472 |
debian: CVE-2022-48522 was patched at unknown date
ubuntu: CVE-2022-48522 was patched at 2023-11-27
6. Incorrect Calculation - Chromium (CVE-2023-6345) - Critical [663]
Description: Integer overflow in Skia in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file. (
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), NVD:CISAKEV websites | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
1.0 | 10 | CVSS Base Score is 9.6. According to NVD data source | |
0.9 | 10 | EPSS Probability is 0.04266, EPSS Percentile is 0.91449 |
debian: CVE-2023-6345 was patched at 2023-11-30, unknown date
7. Remote Code Execution - Redis (CVE-2022-24834) - Critical [647]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Integer Overflow to Buffer Overflow in Redis) | |
1.0 | 15 | Remote Code Execution | |
0.6 | 14 | Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00329, EPSS Percentile is 0.68011 |
debian: CVE-2022-24834 was patched at unknown date
ubuntu: CVE-2022-24834 was patched at 2023-12-05
8. Remote Code Execution - Tracker Miners (CVE-2023-5557) - Critical [642]
Description: A flaw was found in the tracker-miners package. A weakness in the sandbox allows a maliciously-crafted file
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:bugzilla.redhat.com website | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:gnome:tracker_miners (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.0053, EPSS Percentile is 0.74627 |
debian: CVE-2023-5557 was patched at unknown date
ubuntu: CVE-2023-5557 was patched at 2023-11-22
oraclelinux: CVE-2023-5557 was patched at 2023-12-12, 2023-12-13
almalinux: CVE-2023-5557 was patched at 2023-12-11, 2023-12-12
redhat: CVE-2023-5557 was patched at 2023-12-11, 2023-12-12
9. Information Disclosure - Safari (CVE-2023-42916) - Critical [638]
Description: An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2,
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV websites | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.8 | 14 | Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML. | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.0013, EPSS Percentile is 0.47742 |
debian: CVE-2023-42916 was patched at 2023-12-11, unknown date
ubuntu: CVE-2023-42916 was patched at 2023-12-11
10. Elevation of Privilege - gevent (CVE-2023-41419) - Critical [627]
Description: An issue in Gevent before version 23.9.0 allows a remote attacker to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.85 | 15 | Elevation of Privilege | |
0.5 | 14 | Product detected by a:gevent:gevent (does NOT exist in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00178, EPSS Percentile is 0.55121 |
redhat: CVE-2023-41419 was patched at 2023-11-21
11. Authentication Bypass - openzfs (CVE-2013-20001) - Critical [622]
Description: An issue was discovered in OpenZFS through 2.0.3. When an NFS share is exported to IPv6 addresses via the sharenfs feature, there is a silent failure to parse the IPv6 address data, and
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | Product detected by a:openzfs:openzfs (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00195, EPSS Percentile is 0.57447 |
debian: CVE-2013-20001 was patched at unknown date
ubuntu: CVE-2013-20001 was patched at 2023-11-23
12. Elevation of Privilege - Linux Kernel (CVE-2023-46813) - High [599]
Description: An issue was discovered in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for CVE-2023-46813) | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-46813 was patched at 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-46813 was patched at 2023-12-05
oraclelinux: CVE-2023-46813 was patched at 2024-01-26
redhat: CVE-2023-46813 was patched at 2024-01-25
13. Authentication Bypass - HID (CVE-2023-45866) - High [574]
Description: Bluetooth
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Improper Authentication in Google Android, [githubexploit] Exploit for Improper Authentication in Google Android, [githubexploit] Exploit for Improper Authentication in Google Android) | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | HID | |
0.6 | 10 | CVSS Base Score is 6.3. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00085, EPSS Percentile is 0.35345 |
debian: CVE-2023-45866 was patched at 2023-12-15, 2023-12-21, unknown date
ubuntu: CVE-2023-45866 was patched at 2023-12-07
14. Remote Code Execution - smarty (CVE-2023-28447) - High [571]
Description: Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Cross-site Scripting in Smarty) | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:smarty:smarty (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.17651 |
debian: CVE-2023-28447 was patched at unknown date
ubuntu: CVE-2023-28447 was patched at 2023-12-12
15. Denial of Service - Eclipse Mosquitto (CVE-2021-41039) - High [558]
Description: In versions 1.6 to 2.0.11 of Eclipse
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:bugs.eclipse.org website | |
0.7 | 15 | Denial of Service | |
0.6 | 14 | Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00075, EPSS Percentile is 0.31025 |
debian: CVE-2021-41039 was patched at unknown date
ubuntu: CVE-2021-41039 was patched at 2023-11-21
16. Remote Code Execution - Linux Kernel (CVE-2023-5178) - High [554]
Description: A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.9 | 10 | EPSS Probability is 0.01495, EPSS Percentile is 0.85541 |
debian: CVE-2023-5178 was patched at 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-5178 was patched at 2023-11-21, 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
oraclelinux: CVE-2023-5178 was patched at 2023-12-01, 2023-12-13, 2023-12-14, 2024-01-26
almalinux: CVE-2023-5178 was patched at 2023-11-28, 2024-01-23
redhat: CVE-2023-5178 was patched at 2023-11-21, 2023-11-28, 2024-01-23, 2024-01-24, 2024-01-25
17. Denial of Service - keycloak (CVE-2023-6563) - High [553]
Description: An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:access.redhat.com website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:redhat:keycloak (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.7. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00092, EPSS Percentile is 0.38734 |
redhat: CVE-2023-6563 was patched at 2023-12-14
18. Denial of Service - HTTP Server (CVE-2023-45802) - High [541]
Description: When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http, [githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http, [githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http, [githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http, [githubexploit] Exploit for Uncontrolled Resource Consumption in Ietf Http) | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:apache:http_server (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.9. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00177, EPSS Percentile is 0.5494 |
debian: CVE-2023-45802 was patched at unknown date
ubuntu: CVE-2023-45802 was patched at 2023-11-22
19. Denial of Service - Wireshark (CVE-2023-2906) - High [534]
Description: Due to a failure in validating the length provided by an attacker-crafted CP2179 packet,
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:takeonme.org website | |
0.7 | 15 | Denial of Service | |
0.6 | 14 | Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.20421 |
debian: CVE-2023-2906 was patched at 2023-11-19, unknown date
20. Memory Corruption - libde265 (CVE-2023-27103) - High [529]
Description: Libde265 v1.0.11 was discovered to contain a heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:struktur:libde265 (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00087, EPSS Percentile is 0.36563 |
debian: CVE-2023-27103 was patched at 2023-11-30, unknown date
21. Security Feature Bypass - Curl (CVE-2023-46219) - High [529]
Description: When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:hackerone.com website | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:haxx:curl (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.17651 |
debian: CVE-2023-46219 was patched at unknown date
ubuntu: CVE-2023-46219 was patched at 2023-12-06
22. Authentication Bypass - grafana (CVE-2023-2183) - High [526]
Description: Grafana is an open-source platform for monitoring and observability. The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function. This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server. Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | Product detected by a:grafana:grafana (exists in CPE dict) | |
0.4 | 10 | CVSS Base Score is 4.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00051, EPSS Percentile is 0.17089 |
redhat: CVE-2023-2183 was patched at 2023-12-12
23. Denial of Service - libxml2 (CVE-2023-39615) - High [522]
Description: Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:gitlab.gnome.org website | |
0.7 | 15 | Denial of Service | |
0.6 | 14 | libxml2 is an XML toolkit implemented in C, originally developed for the GNOME Project | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.1372 |
debian: CVE-2023-39615 was patched at unknown date
oraclelinux: CVE-2023-39615 was patched at 2023-12-13, 2024-01-10
almalinux: CVE-2023-39615 was patched at 2023-12-12, 2024-01-10
redhat: CVE-2023-39615 was patched at 2023-11-28, 2023-12-12, 2024-01-10, 2024-01-25
24. Denial of Service - Freeimage (CVE-2020-22524) - High [517]
Description: Buffer Overflow vulnerability in FreeImage_Load function in FreeImage Library 3.19.0(r1828) allows attackers to cuase a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:sourceforge.net website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:freeimage_project:freeimage (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.20421 |
debian: CVE-2020-22524 was patched at 2023-11-26, 2023-12-17, unknown date
ubuntu: CVE-2020-22524 was patched at 2024-01-16
25. Denial of Service - cryptography (CVE-2023-49083) - High [505]
Description: cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:cryptography_project:cryptography (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.9. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.1868 |
debian: CVE-2023-49083 was patched at unknown date
ubuntu: CVE-2023-49083 was patched at 2023-12-06
oraclelinux: CVE-2023-49083 was patched at 2024-01-18
26. Denial of Service - libtiff (CVE-2022-40090) - High [505]
Description: An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:gitlab.com website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:libtiff:libtiff (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.1372 |
debian: CVE-2022-40090 was patched at unknown date
ubuntu: CVE-2022-40090 was patched at 2023-11-23
27. Memory Corruption - Fast DDS (CVE-2023-42459) - High [505]
Description: Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). In affected versions specific DATA submessages can be sent to a discovery locator which may trigger a free error. This can remotely crash any Fast-DDS process. The call to free() could potentially leave the pointer in the attackers control which could lead to a double free. This issue has been addressed in versions 2.12.0, 2.11.3, 2.10.3, and 2.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:eprosima:fast_dds (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.6. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00056, EPSS Percentile is 0.20812 |
debian: CVE-2023-42459 was patched at 2023-11-27, unknown date
28. Security Feature Bypass - OpenSSL (CVE-2023-46724) - High [496]
Description: Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end | |
0.9 | 10 | CVSS Base Score is 8.6. According to NVD data source | |
0.8 | 10 | EPSS Probability is 0.0061, EPSS Percentile is 0.76386 |
debian: CVE-2023-46724 was patched at unknown date
ubuntu: CVE-2023-46724 was patched at 2023-11-21
oraclelinux: CVE-2023-46724 was patched at 2024-01-04, 2024-01-10
almalinux: CVE-2023-46724 was patched at 2024-01-03, 2024-01-08
redhat: CVE-2023-46724 was patched at 2024-01-03, 2024-01-08, 2024-01-24
29. Memory Corruption - Glusterfs (CVE-2022-48340) - High [494]
Description: In Gluster GlusterFS 11.0, there is an xlators/cluster/dht/src/dht-common.c dht_setxattr_mds_cbk use-after-free.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:gluster:glusterfs (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.18538 |
debian: CVE-2022-48340 was patched at unknown date
ubuntu: CVE-2022-48340 was patched at 2023-11-22
30. Memory Corruption - libde265 (CVE-2023-43887) - High [494]
Description: Libde265 v1.0.12 was discovered to contain multiple buffer overflows via the num_tile_columns and num_tile_row parameters in the function pic_parameter_set::dump.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:struktur:libde265 (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00061, EPSS Percentile is 0.23847 |
debian: CVE-2023-43887 was patched at 2023-11-30, unknown date
31. Denial of Service - vim (CVE-2023-48706) - High [482]
Description: Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a `:s` command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes free-ing of memory which may later then be accessed by the initial `:s` command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
0.4 | 10 | CVSS Base Score is 3.6. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00049, EPSS Percentile is 0.1582 |
debian: CVE-2023-48706 was patched at unknown date
ubuntu: CVE-2023-48706 was patched at 2023-12-14
32. Remote Code Execution - Safari (CVE-2023-42852) - High [478]
Description: A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1,
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.8 | 14 | Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML. | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00147, EPSS Percentile is 0.50616 |
debian: CVE-2023-42852 was patched at 2023-11-17, unknown date
ubuntu: CVE-2023-42852 was patched at 2023-11-20
33. Denial of Service - GPAC (CVE-2023-46001) - High [477]
Description: Buffer Overflow vulnerability in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.7 | 15 | Denial of Service | |
0.4 | 14 | GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.08097 |
debian: CVE-2023-46001 was patched at unknown date
redos: CVE-2023-46001 was patched at 2023-11-20
34. Remote Code Execution - X Server (CVE-2023-6377) - High [476]
Description: A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:x.org:x_server (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
1.0 | 10 | EPSS Probability is 0.20996, EPSS Percentile is 0.95992 |
debian: CVE-2023-6377 was patched at 2023-12-13, 2023-12-17, unknown date
ubuntu: CVE-2023-6377 was patched at 2023-12-13
oraclelinux: CVE-2023-6377 was patched at 2024-01-02, 2024-01-03, 2024-01-04
almalinux: CVE-2023-6377 was patched at 2024-01-02
redhat: CVE-2023-6377 was patched at 2023-12-20, 2024-01-02
35. Memory Corruption - iniparser (CVE-2023-33461) - High [458]
Description: iniparser v4.1 is vulnerable to NULL Pointer Dereference in function iniparser_getlongint which misses check NULL for function iniparser_getstring's return.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:iniparser_project:iniparser (does NOT exist in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.08097 |
debian: CVE-2023-33461 was patched at unknown date
ubuntu: CVE-2023-33461 was patched at 2023-11-20
36. Remote Code Execution - strongswan (CVE-2023-41913) - High [452]
Description: strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:strongswan:strongswan (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00233, EPSS Percentile is 0.61415 |
debian: CVE-2023-41913 was patched at 2023-11-20, 2023-11-24, unknown date
ubuntu: CVE-2023-41913 was patched at 2023-11-20, 2023-12-14
37. Remote Code Execution - ZBar (CVE-2023-40889) - High [440]
Description: A heap-based buffer overflow exists in the qr_reader_match_centers function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:zbar_project:zbar (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00116, EPSS Percentile is 0.45288 |
debian: CVE-2023-40889 was patched at 2023-12-01, unknown date
38. Remote Code Execution - ZBar (CVE-2023-40890) - High [440]
Description: A stack-based buffer overflow vulnerability exists in the lookup_sequence function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:zbar_project:zbar (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00116, EPSS Percentile is 0.45288 |
debian: CVE-2023-40890 was patched at 2023-12-01, unknown date
39. Incorrect Calculation - vim (CVE-2023-46246) - High [434]
Description: Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
0.4 | 10 | CVSS Base Score is 4.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-46246 was patched at unknown date
ubuntu: CVE-2023-46246 was patched at 2023-12-14
40. Security Feature Bypass - Avro (CVE-2023-39410) - High [410]
Description: When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:apache:avro (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00254, EPSS Percentile is 0.63258 |
redhat: CVE-2023-39410 was patched at 2023-12-04
41. Elevation of Privilege - Linux Kernel (CVE-2023-39198) - High [408]
Description: A race condition was found in the QXL driver in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-39198 was patched at unknown date
ubuntu: CVE-2023-39198 was patched at 2023-12-05, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-10
42. Elevation of Privilege - Linux Kernel (CVE-2023-5717) - High [408]
Description: A heap out-of-bounds write vulnerability in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-5717 was patched at 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-5717 was patched at 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
redhat: CVE-2023-5717 was patched at 2024-01-25
43. Remote Code Execution - Visual Studio Code (CVE-2022-41034) - High [407]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.3 | 14 | Integrated development environment | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00434, EPSS Percentile is 0.71983 |
redos: CVE-2022-41034 was patched at 2023-11-21
44. Denial of Service - GNU C Library (CVE-2023-5156) - High [401]
Description: A flaw was found in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00093, EPSS Percentile is 0.39178 |
ubuntu: CVE-2023-5156 was patched at 2023-12-07
45. Memory Corruption - Chromium (CVE-2023-6346) - High [401]
Description: Use after free in WebAudio in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00208, EPSS Percentile is 0.58779 |
debian: CVE-2023-6346 was patched at 2023-11-30, unknown date
46. Memory Corruption - Chromium (CVE-2023-6348) - High [401]
Description: Type Confusion in Spellcheck in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially exploit
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00229, EPSS Percentile is 0.61106 |
debian: CVE-2023-6348 was patched at 2023-11-30, unknown date
47. Denial of Service - Squid (CVE-2023-5824) - Medium [398]
Description: Squid is vulnerable to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:squid-cache:squid (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.8 | 10 | EPSS Probability is 0.00991, EPSS Percentile is 0.81938 |
debian: CVE-2023-5824 was patched at unknown date
oraclelinux: CVE-2023-5824 was patched at 2023-11-28, 2023-12-11
almalinux: CVE-2023-5824 was patched at 2023-11-22, 2023-12-06
redhat: CVE-2023-5824 was patched at 2023-11-22, 2023-12-06, 2024-01-08, 2024-01-24
redos: CVE-2023-5824 was patched at 2023-11-21
48. Security Feature Bypass - Kubernetes (CVE-2023-5528) - Medium [396]
Description: A security issue was discovered in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.7 | 14 | Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management | |
0.7 | 10 | CVSS Base Score is 7.2. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00082, EPSS Percentile is 0.34096 |
redos: CVE-2023-5528 was patched at 2023-11-22
49. Information Disclosure - Linux Kernel (CVE-2023-39192) - Medium [393]
Description: A flaw was found in the Netfilter subsystem in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 6.7. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12483 |
debian: CVE-2023-39192 was patched at 2024-01-11, unknown date
ubuntu: CVE-2023-39192 was patched at 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
oraclelinux: CVE-2023-39192 was patched at 2023-12-06
50. Remote Code Execution - libreoffice (CVE-2023-6185) - Medium [392]
Description: Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:libreoffice:libreoffice (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.3. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00065, EPSS Percentile is 0.26878 |
debian: CVE-2023-6185 was patched at 2023-12-11, 2023-12-31, unknown date
ubuntu: CVE-2023-6185 was patched at 2023-12-11, 2023-12-14
51. Unknown Vulnerability Type - Amanda (CVE-2023-30577) - Medium [392]
Description: {'nvd_cve_data_all': 'AMANDA (Advanced Maryland Automatic Network Disk Archiver) before tag-community-3.5.4 mishandles argument checking for runtar.c, a different vulnerability than CVE-2022-37705.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'AMANDA (Advanced Maryland Automatic Network Disk Archiver) before tag-community-3.5.4 mishandles argument checking for runtar.c, a different vulnerability than CVE-2022-37705.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:zmanda:amanda (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-30577 was patched at 2023-12-03, unknown date
52. Unknown Vulnerability Type - Curl (CVE-2023-46218) - Medium [392]
Description: {'nvd_cve_data_all': 'This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain. ', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This flaw allows a malicious HTTP server to set "super cookies" in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl's function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\n', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:hackerone.com website | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:haxx:curl (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00057, EPSS Percentile is 0.21539 |
debian: CVE-2023-46218 was patched at 2023-12-22, 2023-12-23, unknown date
ubuntu: CVE-2023-46218 was patched at 2023-12-06
redhat: CVE-2023-46218 was patched at 2024-01-25
53. Unknown Vulnerability Type - wordpress (CVE-2023-5561) - Medium [392]
Description: {'nvd_cve_data_all': 'WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:wpscan.com website | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:wordpress:wordpress (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00089, EPSS Percentile is 0.37374 |
debian: CVE-2023-5561 was patched at 2023-11-21, unknown date
54. Code Injection - Chromium (CVE-2023-39956) - Medium [389]
Description: Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.97 | 15 | Code Injection | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
redos: CVE-2023-39956 was patched at 2023-11-21
55. Memory Corruption - Chromium (CVE-2023-6347) - Medium [389]
Description: Use after free in Mojo in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00175, EPSS Percentile is 0.54717 |
debian: CVE-2023-6347 was patched at 2023-11-30, unknown date
56. Memory Corruption - Chromium (CVE-2023-6350) - Medium [389]
Description: Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00175, EPSS Percentile is 0.54757 |
debian: CVE-2023-6350 was patched at 2023-11-30, unknown date
57. Memory Corruption - Chromium (CVE-2023-6351) - Medium [389]
Description: Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00175, EPSS Percentile is 0.54757 |
debian: CVE-2023-6351 was patched at 2023-11-30, unknown date
58. Memory Corruption - Chromium (CVE-2023-6508) - Medium [389]
Description: Use after free in Media Stream in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00127, EPSS Percentile is 0.4729 |
debian: CVE-2023-6508 was patched at 2023-12-09, unknown date
59. Memory Corruption - Chromium (CVE-2023-6509) - Medium [389]
Description: Use after free in Side Panel Search in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00127, EPSS Percentile is 0.4729 |
debian: CVE-2023-6509 was patched at 2023-12-09, unknown date
60. Memory Corruption - Chromium (CVE-2023-6510) - Medium [389]
Description: Use after free in Media Capture in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00127, EPSS Percentile is 0.4729 |
debian: CVE-2023-6510 was patched at 2023-12-09, unknown date
61. Memory Corruption - Chromium (CVE-2023-6705) - Medium [389]
Description: Use after free in WebRTC in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00123, EPSS Percentile is 0.46499 |
debian: CVE-2023-6705 was patched at 2023-12-13, unknown date
62. Security Feature Bypass - Chromium (CVE-2023-6511) - Medium [389]
Description: Inappropriate implementation in Autofill in Google Chrome prior to 120.0.6099.62
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00108, EPSS Percentile is 0.43446 |
debian: CVE-2023-6511 was patched at 2023-12-09, unknown date
63. Denial of Service - Squid (CVE-2023-46728) - Medium [386]
Description: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:squid-cache:squid (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00374, EPSS Percentile is 0.69924 |
debian: CVE-2023-46728 was patched at 2024-01-09, unknown date
ubuntu: CVE-2023-46728 was patched at 2023-11-21, 2023-12-11
oraclelinux: CVE-2023-46728 was patched at 2024-01-04, 2024-01-10
almalinux: CVE-2023-46728 was patched at 2024-01-03, 2024-01-08
redhat: CVE-2023-46728 was patched at 2024-01-03, 2024-01-08, 2024-01-24
64. Security Feature Bypass - AFFLIB (CVE-2018-8050) - Medium [386]
Description: The af_get_page() function in lib/afflib_pages.cpp in AFFLIB (aka AFFLIBv3) through 3.7.16 allows remote attackers to cause a denial of service (segmentation fault) via a corrupt AFF image that triggers an unexpected pagesize value.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:afflib_project:afflib (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00166, EPSS Percentile is 0.53248 |
debian: CVE-2018-8050 was patched at unknown date
ubuntu: CVE-2018-8050 was patched at 2023-11-28
65. Security Feature Bypass - Crypto-js (CVE-2023-46233) - Medium [386]
Description: crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 4.2.0 contains a patch for this issue. As a workaround, configure crypto-js to use SHA256 with at least 250,000 iterations.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:crypto-js_project:crypto-js (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00067, EPSS Percentile is 0.27741 |
debian: CVE-2023-46233 was patched at 2023-11-27, unknown date
66. Remote Code Execution - Visual Studio Code (CVE-2023-24893) - Medium [383]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.3 | 14 | Integrated development environment | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00125, EPSS Percentile is 0.46844 |
redos: CVE-2023-24893 was patched at 2023-11-21
67. Denial of Service - Linux Kernel (CVE-2023-1192) - Medium [382]
Description: A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16032 |
debian: CVE-2023-1192 was patched at unknown date
oraclelinux: CVE-2023-1192 was patched at 2023-12-01, 2023-12-14, 2023-12-22
almalinux: CVE-2023-1192 was patched at 2023-11-28
redhat: CVE-2023-1192 was patched at 2023-11-28, 2024-01-25
68. Security Feature Bypass - Kibana (CVE-2023-45807) - Medium [382]
Description: OpenSearch is a community-driven, open source fork of Elasticsearch and
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.9 | 14 | Data visualization dashboard software | |
0.5 | 10 | CVSS Base Score is 5.4. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
redos: CVE-2023-45807 was patched at 2023-11-21
69. Information Disclosure - Linux Kernel (CVE-2023-39193) - Medium [381]
Description: A flaw was found in the Netfilter subsystem in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12483 |
debian: CVE-2023-39193 was patched at 2024-01-11, unknown date
ubuntu: CVE-2023-39193 was patched at 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
oraclelinux: CVE-2023-39193 was patched at 2023-12-06
70. Denial of Service - Safari (CVE-2023-41983) - Medium [377]
Description: The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1,
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML. | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00063, EPSS Percentile is 0.25739 |
debian: CVE-2023-41983 was patched at 2023-11-17, unknown date
ubuntu: CVE-2023-41983 was patched at 2023-11-20
71. Memory Corruption - Mozilla Firefox (CVE-2023-6207) - Medium [377]
Description: Ownership mismanagement led to a use-after-free in ReadableByteStreams This vulnerability affects
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00089, EPSS Percentile is 0.37268 |
debian: CVE-2023-6207 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
ubuntu: CVE-2023-6207 was patched at 2023-11-23, 2023-11-27
oraclelinux: CVE-2023-6207 was patched at 2023-11-27, 2023-11-28
almalinux: CVE-2023-6207 was patched at 2023-11-27
redhat: CVE-2023-6207 was patched at 2023-11-27, 2023-11-28, 2023-11-29
72. Memory Corruption - Mozilla Firefox (CVE-2023-6212) - Medium [377]
Description: Memory safety bugs present in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00089, EPSS Percentile is 0.37268 |
debian: CVE-2023-6212 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
ubuntu: CVE-2023-6212 was patched at 2023-11-23, 2023-11-27
oraclelinux: CVE-2023-6212 was patched at 2023-11-27, 2023-11-28
almalinux: CVE-2023-6212 was patched at 2023-11-27
redhat: CVE-2023-6212 was patched at 2023-11-27, 2023-11-28, 2023-11-29
73. Path Traversal - Mozilla Firefox (CVE-2023-6209) - Medium [377]
Description: Relative URLs starting with three slashes were incorrectly parsed, and a path-traversal "/../" part in the path could be used to override the specified host. This could contribute to security problems in web sites. This vulnerability affects
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Path Traversal | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00079, EPSS Percentile is 0.32904 |
debian: CVE-2023-6209 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
ubuntu: CVE-2023-6209 was patched at 2023-11-23, 2023-11-27
oraclelinux: CVE-2023-6209 was patched at 2023-11-27, 2023-11-28
almalinux: CVE-2023-6209 was patched at 2023-11-27
redhat: CVE-2023-6209 was patched at 2023-11-27, 2023-11-28, 2023-11-29
74. Security Feature Bypass - libreoffice (CVE-2023-6186) - Medium [375]
Description: Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning. In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:libreoffice:libreoffice (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.3. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00065, EPSS Percentile is 0.26878 |
debian: CVE-2023-6186 was patched at 2023-12-11, 2023-12-31, unknown date
ubuntu: CVE-2023-6186 was patched at 2023-12-11, 2023-12-14
75. Information Disclosure - haproxy (CVE-2023-45539) - Medium [374]
Description: HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:haproxy:haproxy (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.2. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00112, EPSS Percentile is 0.44362 |
debian: CVE-2023-45539 was patched at 2023-12-14, 2023-12-28, unknown date
ubuntu: CVE-2023-45539 was patched at 2023-12-05
76. Authentication Bypass - keycloak (CVE-2023-0105) - Medium [372]
Description: A flaw was found in Keycloak. This flaw allows impersonation and lockout due to the email trust not being handled correctly in Keycloak. An attacker can shadow other users with the same email and lockout or impersonate them.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | Product detected by a:redhat:keycloak (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00069, EPSS Percentile is 0.28757 |
redhat: CVE-2023-0105 was patched at 2023-11-24
77. Remote Code Execution - Visual Studio Code (CVE-2023-21779) - Medium [371]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.3 | 14 | Integrated development environment | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00113, EPSS Percentile is 0.44739 |
redos: CVE-2023-21779 was patched at 2023-11-21
78. Remote Code Execution - Visual Studio Code (CVE-2023-36742) - Medium [371]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.3 | 14 | Integrated development environment | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00113, EPSS Percentile is 0.44739 |
redos: CVE-2023-36742 was patched at 2023-11-21
79. Denial of Service - Linux Kernel (CVE-2023-5158) - Medium [370]
Description: A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-5158 was patched at unknown date
ubuntu: CVE-2023-5158 was patched at 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
80. Denial of Service - Mozilla Firefox (CVE-2023-6206) - Medium [365]
Description: The black fade animation when exiting fullscreen is roughly the length of the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.5 | 10 | CVSS Base Score is 5.4. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00093, EPSS Percentile is 0.39078 |
debian: CVE-2023-6206 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
ubuntu: CVE-2023-6206 was patched at 2023-11-23, 2023-11-27
oraclelinux: CVE-2023-6206 was patched at 2023-11-27, 2023-11-28
almalinux: CVE-2023-6206 was patched at 2023-11-27
redhat: CVE-2023-6206 was patched at 2023-11-27, 2023-11-28, 2023-11-29
81. Denial of Service - Mozilla Firefox (CVE-2023-6211) - Medium [365]
Description: If an attacker needed a user to load an insecure http: page and knew that user had enabled HTTPS-only mode, the attacker could have tricked the user into clicking to grant an HTTPS-only exception if they could get the user to participate in a clicking game. This vulnerability affects
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.19514 |
ubuntu: CVE-2023-6211 was patched at 2023-11-23
82. Memory Corruption - Chromium (CVE-2023-6702) - Medium [365]
Description: Type confusion in V8 in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00076, EPSS Percentile is 0.31359 |
debian: CVE-2023-6702 was patched at 2023-12-13, unknown date
83. Memory Corruption - Chromium (CVE-2023-6703) - Medium [365]
Description: Use after free in Blink in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00083, EPSS Percentile is 0.34333 |
debian: CVE-2023-6703 was patched at 2023-12-13, unknown date
84. Memory Corruption - Chromium (CVE-2023-6704) - Medium [365]
Description: Use after free in libavif in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted image file. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00083, EPSS Percentile is 0.34333 |
debian: CVE-2023-6704 was patched at 2023-12-13, unknown date
85. Memory Corruption - Chromium (CVE-2023-6706) - Medium [365]
Description: Use after free in FedCM in Google Chrome prior to 120.0.6099.109 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00083, EPSS Percentile is 0.34333 |
debian: CVE-2023-6706 was patched at 2023-12-13, unknown date
86. Memory Corruption - Chromium (CVE-2023-6707) - Medium [365]
Description: Use after free in CSS in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00083, EPSS Percentile is 0.34333 |
debian: CVE-2023-6707 was patched at 2023-12-13, unknown date
87. Memory Corruption - Mozilla Firefox (CVE-2023-6213) - Medium [365]
Description: Memory safety bugs present in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00068, EPSS Percentile is 0.28196 |
ubuntu: CVE-2023-6213 was patched at 2023-11-23
88. Elevation of Privilege - Linux Kernel (CVE-2023-6176) - Medium [361]
Description: A null pointer dereference flaw was found in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.4 | 10 | CVSS Base Score is 4.4. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-6176 was patched at unknown date
ubuntu: CVE-2023-6176 was patched at 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-09, 2024-01-10
89. Authentication Bypass - Opensc (CVE-2023-40660) - Medium [360]
Description: A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | Product detected by a:opensc_project:opensc (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.6. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00057, EPSS Percentile is 0.2132 |
debian: CVE-2023-40660 was patched at 2023-11-27, unknown date
oraclelinux: CVE-2023-40660 was patched at 2023-12-18, 2023-12-19
almalinux: CVE-2023-40660 was patched at 2023-12-19
redhat: CVE-2023-40660 was patched at 2023-12-19
90. Denial of Service - Linux Kernel (CVE-2023-45862) - Medium [358]
Description: An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-45862 was patched at unknown date
ubuntu: CVE-2023-45862 was patched at 2023-11-21, 2023-11-30, 2023-12-05
oraclelinux: CVE-2023-45862 was patched at 2023-12-06
91. Incorrect Calculation - Linux Kernel (CVE-2023-45871) - Medium [358]
Description: An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16754 |
debian: CVE-2023-45871 was patched at 2024-01-11, unknown date
ubuntu: CVE-2023-45871 was patched at 2023-11-21, 2023-11-27, 2023-11-28, 2023-11-30, 2023-12-05
oraclelinux: CVE-2023-45871 was patched at 2023-12-13, 2023-12-14, 2023-12-22
almalinux: CVE-2023-45871 was patched at 2023-12-12
redhat: CVE-2023-45871 was patched at 2023-12-12, 2024-01-23, 2024-01-24, 2024-01-25
92. Denial of Service - OpenSSL (CVE-2023-5678) - Medium [353]
Description: Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00079, EPSS Percentile is 0.32937 |
debian: CVE-2023-5678 was patched at unknown date
oraclelinux: CVE-2023-5678 was patched at 2023-12-18, 2024-01-10
almalinux: CVE-2023-5678 was patched at 2023-12-19
redhat: CVE-2023-5678 was patched at 2023-12-19, 2024-01-10, 2024-01-11
93. Denial of Service - Safari (CVE-2023-42883) - Medium [353]
Description: The issue was addressed with improved memory handling. This issue is fixed in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML. | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.20424 |
debian: CVE-2023-42883 was patched at 2023-12-18, unknown date
ubuntu: CVE-2023-42883 was patched at 2024-01-15
94. Authentication Bypass - Opensc (CVE-2023-4535) - Medium [348]
Description: An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | Product detected by a:opensc_project:opensc (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00072, EPSS Percentile is 0.29849 |
debian: CVE-2023-4535 was patched at unknown date
oraclelinux: CVE-2023-4535 was patched at 2023-12-19
almalinux: CVE-2023-4535 was patched at 2023-12-19
redhat: CVE-2023-4535 was patched at 2023-12-19
95. Memory Corruption - Linux Kernel (CVE-2023-45898) - Medium [346]
Description: The
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
ubuntu: CVE-2023-45898 was patched at 2023-12-06, 2024-01-09
96. Information Disclosure - Linux Kernel (CVE-2023-39194) - Medium [345]
Description: A flaw was found in the XFRM subsystem in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.3 | 10 | CVSS Base Score is 3.2. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12483 |
debian: CVE-2023-39194 was patched at 2024-01-11, unknown date
ubuntu: CVE-2023-39194 was patched at 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
97. Denial of Service - Eclipse Mosquitto (CVE-2021-34431) - Medium [344]
Description: In Eclipse
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.6 | 14 | Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00063, EPSS Percentile is 0.25588 |
debian: CVE-2021-34431 was patched at unknown date
ubuntu: CVE-2021-34431 was patched at 2023-11-21
98. Elevation of Privilege - InsydeH2O (CVE-2023-39283) - Medium [342]
Description: An SMM memory corruption vulnerability in the SMM driver (SMRAM write) in CsmInt10HookSmm in Insyde InsydeH2O with kernel 5.0 through 5.5 allows attackers to send arbitrary data to SMM which could lead to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.5 | 14 | Product detected by a:insyde:insydeh2o (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-39283 was patched at 2023-11-17
99. Elevation of Privilege - linux_kernel (CVE-2023-5633) - Medium [342]
Description: The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.5 | 14 | Product detected by o:linux:linux_kernel (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-5633 was patched at unknown date
ubuntu: CVE-2023-5633 was patched at 2023-11-21, 2023-12-06, 2024-01-09
almalinux: CVE-2023-5633 was patched at 2024-01-10
redhat: CVE-2023-5633 was patched at 2024-01-10
100. Memory Corruption - Mozilla Firefox (CVE-2023-6204) - Medium [341]
Description: On some systems—depending on the graphics settings and drivers—it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. This vulnerability affects
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00075, EPSS Percentile is 0.3081 |
debian: CVE-2023-6204 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
ubuntu: CVE-2023-6204 was patched at 2023-11-23, 2023-11-27
oraclelinux: CVE-2023-6204 was patched at 2023-11-27, 2023-11-28
almalinux: CVE-2023-6204 was patched at 2023-11-27
redhat: CVE-2023-6204 was patched at 2023-11-27, 2023-11-28, 2023-11-29
101. Memory Corruption - Mozilla Firefox (CVE-2023-6205) - Medium [341]
Description: It was possible to cause the use of a MessagePort after it had already been freed, which could potentially have led to an exploitable crash. This vulnerability affects
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00066, EPSS Percentile is 0.27219 |
debian: CVE-2023-6205 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
ubuntu: CVE-2023-6205 was patched at 2023-11-23, 2023-11-27
oraclelinux: CVE-2023-6205 was patched at 2023-11-27, 2023-11-28
almalinux: CVE-2023-6205 was patched at 2023-11-27
redhat: CVE-2023-6205 was patched at 2023-11-27, 2023-11-28, 2023-11-29
102. Security Feature Bypass - openvswitch (CVE-2023-5366) - Medium [339]
Description: A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:openvswitch:openvswitch (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-5366 was patched at unknown date
ubuntu: CVE-2023-5366 was patched at 2023-11-26
103. Information Disclosure - GnuTLS (CVE-2023-5981) - Medium [338]
Description: A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:gnu:gnutls (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.9. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00071, EPSS Percentile is 0.29137 |
debian: CVE-2023-5981 was patched at 2023-11-22, unknown date
ubuntu: CVE-2023-5981 was patched at 2023-11-21, 2024-01-08
oraclelinux: CVE-2023-5981 was patched at 2024-01-11
almalinux: CVE-2023-5981 was patched at 2024-01-10
redhat: CVE-2023-5981 was patched at 2024-01-10, 2024-01-22, 2024-01-24, 2024-01-25, 2024-01-29
104. Spoofing - Chromium (CVE-2023-6512) - Medium [335]
Description: Inappropriate implementation in Web Browser UI in Google Chrome prior to 120.0.6099.62
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.4 | 15 | Spoofing | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00086, EPSS Percentile is 0.35825 |
debian: CVE-2023-6512 was patched at 2023-12-09, unknown date
105. Cross Site Scripting - single_sign-on (CVE-2023-6134) - Medium [333]
Description: A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.8 | 15 | Cross Site Scripting | |
0.5 | 14 | Product detected by a:redhat:single_sign-on (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.6. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.001, EPSS Percentile is 0.40852 |
redhat: CVE-2023-6134 was patched at 2023-12-14
106. Denial of Service - RabbitMQ (CVE-2023-46118) - Medium [327]
Description: RabbitMQ is a multi-protocol messaging and streaming broker. HTTP API did not enforce an HTTP request body limit, making it vulnerable for denial of service (DoS) attacks with very large messages. An authenticated user with sufficient credentials can publish a very large messages over the HTTP API and cause target node to be terminated by an "out-of-memory killer"-like mechanism. This vulnerability has been patched in versions 3.11.24 and 3.12.7.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:vmware:rabbitmq (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00138, EPSS Percentile is 0.49311 |
debian: CVE-2023-46118 was patched at 2023-12-01, 2023-12-14, unknown date
ubuntu: CVE-2023-46118 was patched at 2023-11-21
redhat: CVE-2023-46118 was patched at 2024-01-16
107. Denial of Service - libtiff (CVE-2023-40745) - Medium [327]
Description: LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:libtiff:libtiff (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00081, EPSS Percentile is 0.33733 |
debian: CVE-2023-40745 was patched at 2023-11-27, unknown date
108. Incorrect Calculation - FRRouting (CVE-2023-38406) - Medium [327]
Description: bgpd/bgp_flowspec.c in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00084, EPSS Percentile is 0.3463 |
debian: CVE-2023-38406 was patched at unknown date
ubuntu: CVE-2023-38406 was patched at 2023-11-21
oraclelinux: CVE-2023-38406 was patched at 2024-01-12, 2024-01-26
almalinux: CVE-2023-38406 was patched at 2024-01-10, 2024-01-25
redhat: CVE-2023-38406 was patched at 2024-01-10, 2024-01-25
109. Incorrect Calculation - X Server (CVE-2023-6478) - Medium [327]
Description: A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:x.org:x_server (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.6. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00176, EPSS Percentile is 0.54806 |
debian: CVE-2023-6478 was patched at 2023-12-13, unknown date
ubuntu: CVE-2023-6478 was patched at 2023-12-13
oraclelinux: CVE-2023-6478 was patched at 2024-01-02, 2024-01-03, 2024-01-04
almalinux: CVE-2023-6478 was patched at 2024-01-02
redhat: CVE-2023-6478 was patched at 2023-12-20, 2024-01-02
110. Memory Corruption - Freeimage (CVE-2020-21427) - Medium [327]
Description: Buffer Overflow vulnerability in function LoadPixelDataRLE8 in PluginBMP.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:freeimage_project:freeimage (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00115, EPSS Percentile is 0.45172 |
debian: CVE-2020-21427 was patched at 2023-11-26, 2023-12-17, unknown date
ubuntu: CVE-2020-21427 was patched at 2024-01-16
111. Memory Corruption - Freeimage (CVE-2020-21428) - Medium [327]
Description: Buffer Overflow vulnerability in function LoadRGB in PluginDDS.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:freeimage_project:freeimage (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00115, EPSS Percentile is 0.45172 |
debian: CVE-2020-21428 was patched at 2023-11-26, 2023-12-17, unknown date
ubuntu: CVE-2020-21428 was patched at 2024-01-16
112. Memory Corruption - lwIP (CVE-2020-22283) - Medium [327]
Description: A buffer overflow vulnerability in the icmp6_send_response_with_addrs_and_netif() function of Free Software Foundation lwIP version git head allows attackers to access sensitive information via a crafted ICMPv6 packet.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:lwip_project:lwip (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00158, EPSS Percentile is 0.52312 |
debian: CVE-2020-22283 was patched at 2023-11-19, unknown date
113. Security Feature Bypass - budgie_extras (CVE-2023-49343) - Medium [327]
Description: Temporary data passed between application components by Budgie Extras Dropby applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-49343 was patched at unknown date
ubuntu: CVE-2023-49343 was patched at 2023-12-14
114. Memory Corruption - Linux Kernel (CVE-2023-6039) - Medium [322]
Description: A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-6039 was patched at unknown date
ubuntu: CVE-2023-6039 was patched at 2023-12-05, 2023-12-12, 2023-12-13
115. Cross Site Scripting - Symfony (CVE-2023-46734) - Medium [321]
Description: Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 2.0.0, 5.0.0, and 6.0.0 and prior to versions 4.4.51, 5.4.31, and 6.3.8, some Twig filters in CodeExtension use `is_safe=html` but don't actually ensure their input is safe. As of versions 4.4.51, 5.4.31, and 6.3.8, Symfony now escapes the output of the affected filters.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.8 | 15 | Cross Site Scripting | |
0.5 | 14 | Product detected by a:sensiolabs:symfony (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.17651 |
debian: CVE-2023-46734 was patched at 2023-11-24, unknown date
116. Denial of Service - FRRouting (CVE-2023-47234) - Medium [315]
Description: An issue was discovered in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.1372 |
debian: CVE-2023-47234 was patched at unknown date
ubuntu: CVE-2023-47234 was patched at 2023-11-21
oraclelinux: CVE-2023-47234 was patched at 2024-01-12, 2024-01-26
almalinux: CVE-2023-47234 was patched at 2024-01-10, 2024-01-25
redhat: CVE-2023-47234 was patched at 2024-01-10, 2024-01-25
117. Denial of Service - FRRouting (CVE-2023-47235) - Medium [315]
Description: An issue was discovered in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.1372 |
debian: CVE-2023-47235 was patched at unknown date
ubuntu: CVE-2023-47235 was patched at 2023-11-21
oraclelinux: CVE-2023-47235 was patched at 2024-01-12, 2024-01-26
almalinux: CVE-2023-47235 was patched at 2024-01-10, 2024-01-25
redhat: CVE-2023-47235 was patched at 2024-01-10, 2024-01-25
118. Denial of Service - libde265 (CVE-2023-47471) - Medium [315]
Description: Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a local attacker to cause a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:struktur:libde265 (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.17553 |
debian: CVE-2023-47471 was patched at 2023-11-30, unknown date
119. Denial of Service - libtiff (CVE-2023-41175) - Medium [315]
Description: A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:libtiff:libtiff (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00058, EPSS Percentile is 0.21975 |
debian: CVE-2023-41175 was patched at 2023-11-27, unknown date
120. Arbitrary File Reading - Guava (CVE-2023-2976) - Medium [314]
Description: Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class. Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Arbitrary File Reading | |
0.5 | 14 | Product detected by a:google:guava (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-2976 was patched at unknown date
redhat: CVE-2023-2976 was patched at 2023-12-04
121. Information Disclosure - budgie_extras (CVE-2023-49342) - Medium [314]
Description: Temporary data passed between application components by Budgie Extras Clockworks applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-49342 was patched at unknown date
ubuntu: CVE-2023-49342 was patched at 2023-12-14
122. Information Disclosure - budgie_extras (CVE-2023-49344) - Medium [314]
Description: Temporary data passed between application components by Budgie Extras Window Shuffler applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-49344 was patched at unknown date
ubuntu: CVE-2023-49344 was patched at 2023-12-14
123. Information Disclosure - budgie_extras (CVE-2023-49345) - Medium [314]
Description: Temporary data passed between application components by Budgie Extras Takeabreak applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-49345 was patched at unknown date
ubuntu: CVE-2023-49345 was patched at 2023-12-14
124. Information Disclosure - budgie_extras (CVE-2023-49346) - Medium [314]
Description: Temporary data passed between application components by Budgie Extras WeatherShow applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-49346 was patched at unknown date
ubuntu: CVE-2023-49346 was patched at 2023-12-14
125. Information Disclosure - budgie_extras (CVE-2023-49347) - Medium [314]
Description: Temporary data passed between application components by Budgie Extras Windows Previews could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may read private information from windows, present false information to users, or deny access to the application.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:ubuntubudgie:budgie_extras (does NOT exist in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-49347 was patched at unknown date
ubuntu: CVE-2023-49347 was patched at 2023-12-14
126. Open Redirect - Horizon (CVE-2022-45582) - Medium [312]
Description: Open Redirect vulnerability in Horizon Web Dashboard 19.4.0 thru 20.1.4 via the success_url parameter.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.75 | 15 | Open Redirect | |
0.5 | 14 | Product detected by a:openstack:horizon (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.17651 |
debian: CVE-2022-45582 was patched at 2023-12-01, unknown date
127. Memory Corruption - Linux Kernel (CVE-2023-46862) - Medium [310]
Description: An issue was discovered in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.5 | 10 | CVSS Base Score is 4.7. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-46862 was patched at 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-46862 was patched at 2023-12-05
128. Denial of Service - Wireshark (CVE-2023-6174) - Medium [308]
Description: SSH dissector crash in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.6 | 14 | Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education | |
0.6 | 10 | CVSS Base Score is 6.3. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00047, EPSS Percentile is 0.14184 |
debian: CVE-2023-6174 was patched at 2023-11-19, unknown date
129. Denial of Service - Pydantic (CVE-2021-29510) - Medium [303]
Description: Pydantic is a data validation and settings management using Python type hinting. In affected versions passing either `'infinity'`, `'inf'` or `float('inf')` (or their negatives) to `datetime` or `date` fields causes validation to run forever with 100% CPU usage (on one CPU). Pydantic has been patched with fixes available in the following versions: v1.8.2, v1.7.4, v1.6.2. All these versions are available on pypi(https://pypi.org/project/pydantic/#history), and will be available on conda-forge(https://anaconda.org/conda-forge/pydantic) soon. See the changelog(https://pydantic-docs.helpmanual.io/) for details. If you absolutely can't upgrade, you can work around this risk using a validator(https://pydantic-docs.helpmanual.io/usage/validators/) to catch these values. This is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic. If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue at https://github.com/samuelcolvin/pydantic/issues requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:pydantic_project:pydantic (exists in CPE dict) | |
0.3 | 10 | CVSS Base Score is 3.3. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00176, EPSS Percentile is 0.54804 |
debian: CVE-2021-29510 was patched at unknown date
ubuntu: CVE-2021-29510 was patched at 2023-12-12
130. Denial of Service - avahi (CVE-2023-38469) - Medium [291]
Description: A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:avahi:avahi (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.2. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-38469 was patched at unknown date
ubuntu: CVE-2023-38469 was patched at 2023-11-20
oraclelinux: CVE-2023-38469 was patched at 2023-12-15
almalinux: CVE-2023-38469 was patched at 2023-12-14
redhat: CVE-2023-38469 was patched at 2023-12-14, 2024-01-25
131. Denial of Service - avahi (CVE-2023-38470) - Medium [291]
Description: A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:avahi:avahi (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.2. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-38470 was patched at unknown date
ubuntu: CVE-2023-38470 was patched at 2023-11-20
oraclelinux: CVE-2023-38470 was patched at 2023-12-15
almalinux: CVE-2023-38470 was patched at 2023-12-14
redhat: CVE-2023-38470 was patched at 2023-12-14, 2024-01-25
132. Denial of Service - avahi (CVE-2023-38471) - Medium [291]
Description: A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:avahi:avahi (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.2. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-38471 was patched at unknown date
ubuntu: CVE-2023-38471 was patched at 2023-11-20
oraclelinux: CVE-2023-38471 was patched at 2023-12-15
almalinux: CVE-2023-38471 was patched at 2023-12-14
redhat: CVE-2023-38471 was patched at 2023-12-14, 2024-01-25
133. Denial of Service - avahi (CVE-2023-38472) - Medium [291]
Description: A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:avahi:avahi (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.2. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-38472 was patched at unknown date
ubuntu: CVE-2023-38472 was patched at 2023-11-20
oraclelinux: CVE-2023-38472 was patched at 2023-12-15
almalinux: CVE-2023-38472 was patched at 2023-12-14
redhat: CVE-2023-38472 was patched at 2023-12-14, 2024-01-25
134. Denial of Service - avahi (CVE-2023-38473) - Medium [291]
Description: A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:avahi:avahi (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.2. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-38473 was patched at unknown date
ubuntu: CVE-2023-38473 was patched at 2023-11-20
oraclelinux: CVE-2023-38473 was patched at 2023-12-15
almalinux: CVE-2023-38473 was patched at 2023-12-14
redhat: CVE-2023-38473 was patched at 2023-12-14, 2024-01-25
135. Memory Corruption - vim (CVE-2023-48231) - Medium [289]
Description: Vim is an open source command line text editor. When closing a window,
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | Vim is a free and open-source, screen-based text editor program | |
0.4 | 10 | CVSS Base Score is 3.9. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00071, EPSS Percentile is 0.29407 |
debian: CVE-2023-48231 was patched at unknown date
ubuntu: CVE-2023-48231 was patched at 2023-12-14
136. Memory Corruption - Artifex Ghostscript (CVE-2023-46751) - Medium [282]
Description: An issue was discovered in the function gdev_prn_open_printer_seekable() in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.3 | 14 | Artifex Ghostscript is an interpreter for the PostScript® language and PDF files | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.0009, EPSS Percentile is 0.38048 |
debian: CVE-2023-46751 was patched at 2023-12-15, unknown date
ubuntu: CVE-2023-46751 was patched at 2023-12-12
137. Incorrect Calculation - grafana (CVE-2023-2801) - Medium [279]
Description: Grafana is an open-source platform for monitoring and observability. Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance. The only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly. This might enable malicious users to crash Grafana instances through that endpoint. Users may upgrade to version 9.4.12 and 9.5.3 to receive a fix.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:grafana:grafana (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
redhat: CVE-2023-2801 was patched at 2023-12-12
138. Path Traversal - SSHD (CVE-2023-35887) - Medium [279]
Description: Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA. In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths including parent navigation ("..") beyond the root, or involving symlinks. This issue affects Apache MINA: from 1.0 before 2.10. Users are recommended to upgrade to 2.10
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Path Traversal | |
0.5 | 14 | Product detected by a:apache:sshd (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10376 |
redhat: CVE-2023-35887 was patched at 2023-12-04
139. Unknown Vulnerability Type - Mozilla Firefox (CVE-2023-6208) - Medium [276]
Description: {'nvd_cve_data_all': 'When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard. *This bug only affects Firefox on X11. Other systems are unaffected.* This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard.\n*This bug only affects Firefox on X11. Other systems are unaffected.* This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.0008, EPSS Percentile is 0.33431 |
debian: CVE-2023-6208 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
ubuntu: CVE-2023-6208 was patched at 2023-11-23, 2023-11-27
oraclelinux: CVE-2023-6208 was patched at 2023-11-27, 2023-11-28
almalinux: CVE-2023-6208 was patched at 2023-11-27
redhat: CVE-2023-6208 was patched at 2023-11-27, 2023-11-28, 2023-11-29
140. Incorrect Calculation - vim (CVE-2023-48232) - Medium [267]
Description: Vim is an open source command line text editor. A floating point exception may occur when calculating the line offset for overlong lines and smooth scrolling is enabled and the cpo-settings include the 'n' flag. This may happen when a window border is present and when the wrapped line continues on the next physical line directly in the window border because the 'cpo' setting includes the 'n' flag. Only users with non-default settings are affected and the exception should only result in a crash. This issue has been addressed in commit `cb0b99f0` which has been included in release version 9.0.2107. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
0.4 | 10 | CVSS Base Score is 3.9. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00101, EPSS Percentile is 0.41171 |
debian: CVE-2023-48232 was patched at unknown date
ubuntu: CVE-2023-48232 was patched at 2023-12-14
141. Incorrect Calculation - vim (CVE-2023-48235) - Medium [267]
Description: Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
0.3 | 10 | CVSS Base Score is 2.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00164, EPSS Percentile is 0.53045 |
debian: CVE-2023-48235 was patched at unknown date
ubuntu: CVE-2023-48235 was patched at 2023-12-14
142. Memory Corruption - perl (CVE-2023-47038) - Medium [267]
Description: A vulnerability was found in perl. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:perl:perl (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-47038 was patched at unknown date
ubuntu: CVE-2023-47038 was patched at 2023-11-27
143. Incorrect Calculation - vim (CVE-2023-48233) - Medium [255]
Description: Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
0.3 | 10 | CVSS Base Score is 2.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00101, EPSS Percentile is 0.41171 |
debian: CVE-2023-48233 was patched at unknown date
ubuntu: CVE-2023-48233 was patched at 2023-12-14
144. Incorrect Calculation - vim (CVE-2023-48234) - Medium [255]
Description: Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
0.3 | 10 | CVSS Base Score is 2.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00101, EPSS Percentile is 0.41171 |
debian: CVE-2023-48234 was patched at unknown date
ubuntu: CVE-2023-48234 was patched at 2023-12-14
145. Incorrect Calculation - vim (CVE-2023-48236) - Medium [255]
Description: Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
0.3 | 10 | CVSS Base Score is 2.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00101, EPSS Percentile is 0.41171 |
debian: CVE-2023-48236 was patched at unknown date
ubuntu: CVE-2023-48236 was patched at 2023-12-14
146. Incorrect Calculation - vim (CVE-2023-48237) - Medium [255]
Description: Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `6bf131888` which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
0.3 | 10 | CVSS Base Score is 2.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00101, EPSS Percentile is 0.41171 |
debian: CVE-2023-48237 was patched at unknown date
ubuntu: CVE-2023-48237 was patched at 2023-12-14
147. Memory Corruption - linux_kernel (CVE-2023-3006) - Medium [255]
Description: A known
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by o:linux:linux_kernel (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-3006 was patched at unknown date
ubuntu: CVE-2023-3006 was patched at 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-09, 2024-01-10
148. Memory Corruption - Opensc (CVE-2023-40661) - Medium [244]
Description: Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:opensc_project:opensc (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.4. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-40661 was patched at 2023-11-27, unknown date
oraclelinux: CVE-2023-40661 was patched at 2023-12-18, 2023-12-19
almalinux: CVE-2023-40661 was patched at 2023-12-19
redhat: CVE-2023-40661 was patched at 2023-12-19
149. Security Feature Bypass - Unknown Product (CVE-2023-6291) - Medium [244]
Description: {'nvd_cve_data_all': 'A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0 | 14 | Unknown Product | |
0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
redhat: CVE-2023-6291 was patched at 2023-12-14
150. Spoofing - Visual Studio Code (CVE-2023-33144) - Medium [240]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.4 | 15 | Spoofing | |
0.3 | 14 | Integrated development environment | |
0.7 | 10 | CVSS Base Score is 6.6. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00066, EPSS Percentile is 0.27147 |
redos: CVE-2023-33144 was patched at 2023-11-21
151. Unknown Vulnerability Type - Mozilla Firefox (CVE-2023-6210) - Medium [240]
Description: {'nvd_cve_data_all': 'When an https: web page created a pop-up from a "javascript:" URL, that pop-up was incorrectly allowed to load blockable content such as iframes from insecure http: URLs This vulnerability affects Firefox < 120.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'When an https: web page created a pop-up from a "javascript:" URL, that pop-up was incorrectly allowed to load blockable content such as iframes from insecure http: URLs This vulnerability affects Firefox < 120.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.19514 |
ubuntu: CVE-2023-6210 was patched at 2023-11-23
152. Unknown Vulnerability Type - Linux Kernel (CVE-2023-38409) - Medium [233]
Description: {'nvd_cve_data_all': 'An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-38409 was patched at unknown date
oraclelinux: CVE-2023-38409 was patched at 2024-01-26
redhat: CVE-2023-38409 was patched at 2023-11-28, 2024-01-25
153. Spoofing - Visual Studio Code (CVE-2023-29338) - Medium [228]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.4 | 15 | Spoofing | |
0.3 | 14 | Integrated development environment | |
0.7 | 10 | CVSS Base Score is 6.6. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00062, EPSS Percentile is 0.24841 |
redos: CVE-2023-29338 was patched at 2023-11-21
154. Unknown Vulnerability Type - FRRouting (CVE-2023-38407) - Low [190]
Description: {'nvd_cve_data_all': 'bgpd/bgp_label.c in FRRouting (FRR) before 8.5 attempts to read beyond the end of the stream during labeled unicast parsing.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'bgpd/bgp_label.c in FRRouting (FRR) before 8.5 attempts to read beyond the end of the stream during labeled unicast parsing.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00047, EPSS Percentile is 0.14184 |
debian: CVE-2023-38407 was patched at unknown date
ubuntu: CVE-2023-38407 was patched at 2023-11-21
oraclelinux: CVE-2023-38407 was patched at 2024-01-12, 2024-01-26
almalinux: CVE-2023-38407 was patched at 2024-01-10, 2024-01-25
redhat: CVE-2023-38407 was patched at 2024-01-10, 2024-01-25
155. Unknown Vulnerability Type - OpenDKIM (CVE-2022-48521) - Low [178]
Description: {'nvd_cve_data_all': 'An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:opendkim:opendkim (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00073, EPSS Percentile is 0.29994 |
debian: CVE-2022-48521 was patched at 2023-12-03, unknown date
156. Unknown Vulnerability Type - Unknown Product (CVE-2023-39804) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-39804 was patched at unknown date
ubuntu: CVE-2023-39804 was patched at 2023-12-11
157. Unknown Vulnerability Type - Unknown Product (CVE-2023-44429) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-44429 was patched at 2023-11-25, unknown date
ubuntu: CVE-2023-44429 was patched at 2023-11-29
oraclelinux: CVE-2023-44429 was patched at 2023-12-15
almalinux: CVE-2023-44429 was patched at 2023-12-13
redhat: CVE-2023-44429 was patched at 2023-12-13, 2023-12-19
158. Unknown Vulnerability Type - Unknown Product (CVE-2023-44441) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-44441 was patched at 2023-11-24, 2023-11-30, unknown date
ubuntu: CVE-2023-44441 was patched at 2023-11-29
159. Unknown Vulnerability Type - Unknown Product (CVE-2023-44442) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-44442 was patched at 2023-11-21, 2023-11-24, unknown date
ubuntu: CVE-2023-44442 was patched at 2023-11-29
160. Unknown Vulnerability Type - Unknown Product (CVE-2023-44443) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-44443 was patched at 2023-11-24, unknown date
ubuntu: CVE-2023-44443 was patched at 2023-11-29
161. Unknown Vulnerability Type - Unknown Product (CVE-2023-44444) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-44444 was patched at 2023-11-21, 2023-11-24, unknown date
ubuntu: CVE-2023-44444 was patched at 2023-11-29
162. Unknown Vulnerability Type - Unknown Product (CVE-2023-44446) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-44446 was patched at 2023-11-25, 2023-11-29, unknown date
ubuntu: CVE-2023-44446 was patched at 2023-11-29
oraclelinux: CVE-2023-44446 was patched at 2023-12-15, 2023-12-19, 2024-01-02, 2024-01-18
almalinux: CVE-2023-44446 was patched at 2023-12-13, 2023-12-14
redhat: CVE-2023-44446 was patched at 2023-12-13, 2023-12-14, 2023-12-19, 2024-01-02, 2024-01-17
163. Unknown Vulnerability Type - Unknown Product (CVE-2023-4503) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
redhat: CVE-2023-4503 was patched at 2023-12-04
164. Unknown Vulnerability Type - Unknown Product (CVE-2023-5616) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-5616 was patched at unknown date
ubuntu: CVE-2023-5616 was patched at 2023-12-13
165. Unknown Vulnerability Type - Unknown Product (CVE-2023-6175) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-6175 was patched at 2023-11-19, unknown date
debian: CVE-2023-46604 was patched at 2023-11-21, unknown date
debian: CVE-2023-39999 was patched at 2023-11-21, unknown date
debian: CVE-2023-42916 was patched at 2023-12-11, unknown date
ubuntu: CVE-2023-42916 was patched at 2023-12-11
debian: CVE-2023-42917 was patched at 2023-12-11, unknown date
ubuntu: CVE-2023-42917 was patched at 2023-12-11
oraclelinux: CVE-2023-42917 was patched at 2023-12-13
almalinux: CVE-2023-42917 was patched at 2023-12-11
redhat: CVE-2023-42917 was patched at 2023-12-11
debian: CVE-2023-6345 was patched at 2023-11-30, unknown date
debian: CVE-2023-48795 was patched at 2023-12-22, 2023-12-24, 2023-12-26, 2023-12-28, 2024-01-12, unknown date
ubuntu: CVE-2023-48795 was patched at 2023-12-19, 2024-01-11, 2024-01-15, 2024-01-18, 2024-01-25
redhat: CVE-2023-48795 was patched at 2024-01-25, 2024-01-29
debian: CVE-2023-46219 was patched at unknown date
ubuntu: CVE-2023-46219 was patched at 2023-12-06
debian: CVE-2022-48522 was patched at unknown date
ubuntu: CVE-2022-48522 was patched at 2023-11-27
debian: CVE-2022-24834 was patched at unknown date
ubuntu: CVE-2022-24834 was patched at 2023-12-05
debian: CVE-2023-5557 was patched at unknown date
ubuntu: CVE-2023-5557 was patched at 2023-11-22
oraclelinux: CVE-2023-5557 was patched at 2023-12-12, 2023-12-13
almalinux: CVE-2023-5557 was patched at 2023-12-11, 2023-12-12
redhat: CVE-2023-5557 was patched at 2023-12-11, 2023-12-12
debian: CVE-2023-28447 was patched at unknown date
ubuntu: CVE-2023-28447 was patched at 2023-12-12
redhat: CVE-2023-41419 was patched at 2023-11-21
debian: CVE-2023-46813 was patched at 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-46813 was patched at 2023-12-05
oraclelinux: CVE-2023-46813 was patched at 2024-01-26
redhat: CVE-2023-46813 was patched at 2024-01-25
debian: CVE-2013-20001 was patched at unknown date
ubuntu: CVE-2013-20001 was patched at 2023-11-23
debian: CVE-2023-45866 was patched at 2023-12-15, 2023-12-21, unknown date
ubuntu: CVE-2023-45866 was patched at 2023-12-07
redhat: CVE-2023-2183 was patched at 2023-12-12
debian: CVE-2021-41039 was patched at unknown date
ubuntu: CVE-2021-41039 was patched at 2023-11-21
redhat: CVE-2023-6563 was patched at 2023-12-14
debian: CVE-2023-45802 was patched at unknown date
ubuntu: CVE-2023-45802 was patched at 2023-11-22
debian: CVE-2023-2906 was patched at 2023-11-19, unknown date
debian: CVE-2023-39615 was patched at unknown date
oraclelinux: CVE-2023-39615 was patched at 2023-12-13, 2024-01-10
almalinux: CVE-2023-39615 was patched at 2023-12-12, 2024-01-10
redhat: CVE-2023-39615 was patched at 2023-11-28, 2023-12-12, 2024-01-10, 2024-01-25
debian: CVE-2020-22524 was patched at 2023-11-26, 2023-12-17, unknown date
ubuntu: CVE-2020-22524 was patched at 2024-01-16
debian: CVE-2023-49083 was patched at unknown date
ubuntu: CVE-2023-49083 was patched at 2023-12-06
oraclelinux: CVE-2023-49083 was patched at 2024-01-18
debian: CVE-2022-40090 was patched at unknown date
ubuntu: CVE-2022-40090 was patched at 2023-11-23
debian: CVE-2023-48706 was patched at unknown date
ubuntu: CVE-2023-48706 was patched at 2023-12-14
debian: CVE-2023-46001 was patched at unknown date
redos: CVE-2023-46001 was patched at 2023-11-20
debian: CVE-2023-27103 was patched at 2023-11-30, unknown date
debian: CVE-2023-43887 was patched at 2023-11-30, unknown date
debian: CVE-2023-42459 was patched at 2023-11-27, unknown date
debian: CVE-2022-48340 was patched at unknown date
ubuntu: CVE-2022-48340 was patched at 2023-11-22
debian: CVE-2023-33461 was patched at unknown date
ubuntu: CVE-2023-33461 was patched at 2023-11-20
debian: CVE-2023-46246 was patched at unknown date
ubuntu: CVE-2023-46246 was patched at 2023-12-14
debian: CVE-2023-30577 was patched at 2023-12-03, unknown date
debian: CVE-2023-46218 was patched at 2023-12-22, 2023-12-23, unknown date
ubuntu: CVE-2023-46218 was patched at 2023-12-06
redhat: CVE-2023-46218 was patched at 2024-01-25
debian: CVE-2023-5561 was patched at 2023-11-21, unknown date
debian: CVE-2023-5178 was patched at 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-5178 was patched at 2023-11-21, 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
oraclelinux: CVE-2023-5178 was patched at 2023-12-01, 2023-12-13, 2023-12-14, 2024-01-26
almalinux: CVE-2023-5178 was patched at 2023-11-28, 2024-01-23
redhat: CVE-2023-5178 was patched at 2023-11-21, 2023-11-28, 2024-01-23, 2024-01-24, 2024-01-25
debian: CVE-2023-42852 was patched at 2023-11-17, unknown date
ubuntu: CVE-2023-42852 was patched at 2023-11-20
debian: CVE-2023-6377 was patched at 2023-12-13, 2023-12-17, unknown date
ubuntu: CVE-2023-6377 was patched at 2023-12-13
oraclelinux: CVE-2023-6377 was patched at 2024-01-02, 2024-01-03, 2024-01-04
almalinux: CVE-2023-6377 was patched at 2024-01-02
redhat: CVE-2023-6377 was patched at 2023-12-20, 2024-01-02
debian: CVE-2023-41913 was patched at 2023-11-20, 2023-11-24, unknown date
ubuntu: CVE-2023-41913 was patched at 2023-11-20, 2023-12-14
debian: CVE-2023-40889 was patched at 2023-12-01, unknown date
debian: CVE-2023-40890 was patched at 2023-12-01, unknown date
redos: CVE-2022-41034 was patched at 2023-11-21
redos: CVE-2023-21779 was patched at 2023-11-21
redos: CVE-2023-24893 was patched at 2023-11-21
redos: CVE-2023-36742 was patched at 2023-11-21
debian: CVE-2023-6185 was patched at 2023-12-11, 2023-12-31, unknown date
ubuntu: CVE-2023-6185 was patched at 2023-12-11, 2023-12-14
debian: CVE-2023-46724 was patched at unknown date
ubuntu: CVE-2023-46724 was patched at 2023-11-21
oraclelinux: CVE-2023-46724 was patched at 2024-01-04, 2024-01-10
almalinux: CVE-2023-46724 was patched at 2024-01-03, 2024-01-08
redhat: CVE-2023-46724 was patched at 2024-01-03, 2024-01-08, 2024-01-24
redhat: CVE-2023-39410 was patched at 2023-12-04
redos: CVE-2023-5528 was patched at 2023-11-22
debian: CVE-2023-6511 was patched at 2023-12-09, unknown date
debian: CVE-2018-8050 was patched at unknown date
ubuntu: CVE-2018-8050 was patched at 2023-11-28
debian: CVE-2023-46233 was patched at 2023-11-27, unknown date
redos: CVE-2023-45807 was patched at 2023-11-21
debian: CVE-2023-6186 was patched at 2023-12-11, 2023-12-31, unknown date
ubuntu: CVE-2023-6186 was patched at 2023-12-11, 2023-12-14
debian: CVE-2023-5366 was patched at unknown date
ubuntu: CVE-2023-5366 was patched at 2023-11-26
debian: CVE-2023-49343 was patched at unknown date
ubuntu: CVE-2023-49343 was patched at 2023-12-14
redhat: CVE-2023-6291 was patched at 2023-12-14
debian: CVE-2023-39198 was patched at unknown date
debian: CVE-2023-5717 was patched at 2024-01-02, 2024-01-11, unknown date
debian: CVE-2023-6176 was patched at unknown date
ubuntu: CVE-2023-39198 was patched at 2023-12-05, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-10
ubuntu: CVE-2023-5717 was patched at 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
ubuntu: CVE-2023-6176 was patched at 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-09, 2024-01-10
redhat: CVE-2023-5717 was patched at 2024-01-25
debian: CVE-2023-39283 was patched at 2023-11-17
debian: CVE-2023-5633 was patched at unknown date
ubuntu: CVE-2023-5633 was patched at 2023-11-21, 2023-12-06, 2024-01-09
almalinux: CVE-2023-5633 was patched at 2024-01-10
redhat: CVE-2023-5633 was patched at 2024-01-10
ubuntu: CVE-2023-5156 was patched at 2023-12-07
debian: CVE-2023-46728 was patched at 2024-01-09, unknown date
debian: CVE-2023-5824 was patched at unknown date
ubuntu: CVE-2023-46728 was patched at 2023-11-21, 2023-12-11
oraclelinux: CVE-2023-46728 was patched at 2024-01-04, 2024-01-10
oraclelinux: CVE-2023-5824 was patched at 2023-11-28, 2023-12-11
almalinux: CVE-2023-46728 was patched at 2024-01-03, 2024-01-08
almalinux: CVE-2023-5824 was patched at 2023-11-22, 2023-12-06
redhat: CVE-2023-46728 was patched at 2024-01-03, 2024-01-08, 2024-01-24
redhat: CVE-2023-5824 was patched at 2023-11-22, 2023-12-06, 2024-01-08, 2024-01-24
redos: CVE-2023-5824 was patched at 2023-11-21
debian: CVE-2023-1192 was patched at unknown date
debian: CVE-2023-45862 was patched at unknown date
debian: CVE-2023-5158 was patched at unknown date
ubuntu: CVE-2023-45862 was patched at 2023-11-21, 2023-11-30, 2023-12-05
ubuntu: CVE-2023-5158 was patched at 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
oraclelinux: CVE-2023-1192 was patched at 2023-12-01, 2023-12-14, 2023-12-22
oraclelinux: CVE-2023-45862 was patched at 2023-12-06
almalinux: CVE-2023-1192 was patched at 2023-11-28
redhat: CVE-2023-1192 was patched at 2023-11-28, 2024-01-25
debian: CVE-2023-41983 was patched at 2023-11-17, unknown date
debian: CVE-2023-42883 was patched at 2023-12-18, unknown date
ubuntu: CVE-2023-41983 was patched at 2023-11-20
ubuntu: CVE-2023-42883 was patched at 2024-01-15
debian: CVE-2023-6206 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
ubuntu: CVE-2023-6206 was patched at 2023-11-23, 2023-11-27
ubuntu: CVE-2023-6211 was patched at 2023-11-23
oraclelinux: CVE-2023-6206 was patched at 2023-11-27, 2023-11-28
almalinux: CVE-2023-6206 was patched at 2023-11-27
redhat: CVE-2023-6206 was patched at 2023-11-27, 2023-11-28, 2023-11-29
debian: CVE-2023-5678 was patched at unknown date
oraclelinux: CVE-2023-5678 was patched at 2023-12-18, 2024-01-10
almalinux: CVE-2023-5678 was patched at 2023-12-19
redhat: CVE-2023-5678 was patched at 2023-12-19, 2024-01-10, 2024-01-11
debian: CVE-2021-34431 was patched at unknown date
ubuntu: CVE-2021-34431 was patched at 2023-11-21
debian: CVE-2023-46118 was patched at 2023-12-01, 2023-12-14, unknown date
ubuntu: CVE-2023-46118 was patched at 2023-11-21
redhat: CVE-2023-46118 was patched at 2024-01-16
debian: CVE-2023-40745 was patched at 2023-11-27, unknown date
debian: CVE-2023-41175 was patched at 2023-11-27, unknown date
debian: CVE-2023-47234 was patched at unknown date
debian: CVE-2023-47235 was patched at unknown date
ubuntu: CVE-2023-47234 was patched at 2023-11-21
ubuntu: CVE-2023-47235 was patched at 2023-11-21
oraclelinux: CVE-2023-47234 was patched at 2024-01-12, 2024-01-26
oraclelinux: CVE-2023-47235 was patched at 2024-01-12, 2024-01-26
almalinux: CVE-2023-47234 was patched at 2024-01-10, 2024-01-25
almalinux: CVE-2023-47235 was patched at 2024-01-10, 2024-01-25
redhat: CVE-2023-47234 was patched at 2024-01-10, 2024-01-25
redhat: CVE-2023-47235 was patched at 2024-01-10, 2024-01-25
debian: CVE-2023-47471 was patched at 2023-11-30, unknown date
debian: CVE-2023-6174 was patched at 2023-11-19, unknown date
debian: CVE-2021-29510 was patched at unknown date
ubuntu: CVE-2021-29510 was patched at 2023-12-12
debian: CVE-2023-38469 was patched at unknown date
debian: CVE-2023-38470 was patched at unknown date
debian: CVE-2023-38471 was patched at unknown date
debian: CVE-2023-38472 was patched at unknown date
debian: CVE-2023-38473 was patched at unknown date
ubuntu: CVE-2023-38469 was patched at 2023-11-20
ubuntu: CVE-2023-38470 was patched at 2023-11-20
ubuntu: CVE-2023-38471 was patched at 2023-11-20
ubuntu: CVE-2023-38472 was patched at 2023-11-20
ubuntu: CVE-2023-38473 was patched at 2023-11-20
oraclelinux: CVE-2023-38469 was patched at 2023-12-15
oraclelinux: CVE-2023-38470 was patched at 2023-12-15
oraclelinux: CVE-2023-38471 was patched at 2023-12-15
oraclelinux: CVE-2023-38472 was patched at 2023-12-15
oraclelinux: CVE-2023-38473 was patched at 2023-12-15
almalinux: CVE-2023-38469 was patched at 2023-12-14
almalinux: CVE-2023-38470 was patched at 2023-12-14
almalinux: CVE-2023-38471 was patched at 2023-12-14
almalinux: CVE-2023-38472 was patched at 2023-12-14
almalinux: CVE-2023-38473 was patched at 2023-12-14
redhat: CVE-2023-38469 was patched at 2023-12-14, 2024-01-25
redhat: CVE-2023-38470 was patched at 2023-12-14, 2024-01-25
redhat: CVE-2023-38471 was patched at 2023-12-14, 2024-01-25
redhat: CVE-2023-38472 was patched at 2023-12-14, 2024-01-25
redhat: CVE-2023-38473 was patched at 2023-12-14, 2024-01-25
debian: CVE-2023-6346 was patched at 2023-11-30, unknown date
debian: CVE-2023-6347 was patched at 2023-11-30, unknown date
debian: CVE-2023-6348 was patched at 2023-11-30, unknown date
debian: CVE-2023-6350 was patched at 2023-11-30, unknown date
debian: CVE-2023-6351 was patched at 2023-11-30, unknown date
debian: CVE-2023-6508 was patched at 2023-12-09, unknown date
debian: CVE-2023-6509 was patched at 2023-12-09, unknown date
debian: CVE-2023-6510 was patched at 2023-12-09, unknown date
debian: CVE-2023-6702 was patched at 2023-12-13, unknown date
debian: CVE-2023-6703 was patched at 2023-12-13, unknown date
debian: CVE-2023-6704 was patched at 2023-12-13, unknown date
debian: CVE-2023-6705 was patched at 2023-12-13, unknown date
debian: CVE-2023-6706 was patched at 2023-12-13, unknown date
debian: CVE-2023-6707 was patched at 2023-12-13, unknown date
debian: CVE-2023-6204 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
debian: CVE-2023-6205 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
debian: CVE-2023-6207 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
debian: CVE-2023-6212 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
ubuntu: CVE-2023-6204 was patched at 2023-11-23, 2023-11-27
ubuntu: CVE-2023-6205 was patched at 2023-11-23, 2023-11-27
ubuntu: CVE-2023-6207 was patched at 2023-11-23, 2023-11-27
ubuntu: CVE-2023-6212 was patched at 2023-11-23, 2023-11-27
ubuntu: CVE-2023-6213 was patched at 2023-11-23
oraclelinux: CVE-2023-6204 was patched at 2023-11-27, 2023-11-28
oraclelinux: CVE-2023-6205 was patched at 2023-11-27, 2023-11-28
oraclelinux: CVE-2023-6207 was patched at 2023-11-27, 2023-11-28
oraclelinux: CVE-2023-6212 was patched at 2023-11-27, 2023-11-28
almalinux: CVE-2023-6204 was patched at 2023-11-27
almalinux: CVE-2023-6205 was patched at 2023-11-27
almalinux: CVE-2023-6207 was patched at 2023-11-27
almalinux: CVE-2023-6212 was patched at 2023-11-27
redhat: CVE-2023-6204 was patched at 2023-11-27, 2023-11-28, 2023-11-29
redhat: CVE-2023-6205 was patched at 2023-11-27, 2023-11-28, 2023-11-29
redhat: CVE-2023-6207 was patched at 2023-11-27, 2023-11-28, 2023-11-29
redhat: CVE-2023-6212 was patched at 2023-11-27, 2023-11-28, 2023-11-29
debian: CVE-2023-46862 was patched at 2024-01-02, 2024-01-11, unknown date
debian: CVE-2023-6039 was patched at unknown date
ubuntu: CVE-2023-45898 was patched at 2023-12-06, 2024-01-09
ubuntu: CVE-2023-46862 was patched at 2023-12-05
ubuntu: CVE-2023-6039 was patched at 2023-12-05, 2023-12-12, 2023-12-13
debian: CVE-2020-21427 was patched at 2023-11-26, 2023-12-17, unknown date
debian: CVE-2020-21428 was patched at 2023-11-26, 2023-12-17, unknown date
ubuntu: CVE-2020-21427 was patched at 2024-01-16
ubuntu: CVE-2020-21428 was patched at 2024-01-16
debian: CVE-2020-22283 was patched at 2023-11-19, unknown date
debian: CVE-2023-48231 was patched at unknown date
ubuntu: CVE-2023-48231 was patched at 2023-12-14
debian: CVE-2023-46751 was patched at 2023-12-15, unknown date
ubuntu: CVE-2023-46751 was patched at 2023-12-12
debian: CVE-2023-47038 was patched at unknown date
ubuntu: CVE-2023-47038 was patched at 2023-11-27
debian: CVE-2023-3006 was patched at unknown date
ubuntu: CVE-2023-3006 was patched at 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-09, 2024-01-10
debian: CVE-2023-40661 was patched at 2023-11-27, unknown date
oraclelinux: CVE-2023-40661 was patched at 2023-12-18, 2023-12-19
almalinux: CVE-2023-40661 was patched at 2023-12-19
redhat: CVE-2023-40661 was patched at 2023-12-19
debian: CVE-2023-39192 was patched at 2024-01-11, unknown date
debian: CVE-2023-39193 was patched at 2024-01-11, unknown date
debian: CVE-2023-39194 was patched at 2024-01-11, unknown date
ubuntu: CVE-2023-39192 was patched at 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
ubuntu: CVE-2023-39193 was patched at 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
ubuntu: CVE-2023-39194 was patched at 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
oraclelinux: CVE-2023-39192 was patched at 2023-12-06
oraclelinux: CVE-2023-39193 was patched at 2023-12-06
debian: CVE-2023-45539 was patched at 2023-12-14, 2023-12-28, unknown date
ubuntu: CVE-2023-45539 was patched at 2023-12-05
debian: CVE-2023-5981 was patched at 2023-11-22, unknown date
ubuntu: CVE-2023-5981 was patched at 2023-11-21, 2024-01-08
oraclelinux: CVE-2023-5981 was patched at 2024-01-11
almalinux: CVE-2023-5981 was patched at 2024-01-10
redhat: CVE-2023-5981 was patched at 2024-01-10, 2024-01-22, 2024-01-24, 2024-01-25, 2024-01-29
debian: CVE-2023-49342 was patched at unknown date
debian: CVE-2023-49344 was patched at unknown date
debian: CVE-2023-49345 was patched at unknown date
debian: CVE-2023-49346 was patched at unknown date
debian: CVE-2023-49347 was patched at unknown date
ubuntu: CVE-2023-49342 was patched at 2023-12-14
ubuntu: CVE-2023-49344 was patched at 2023-12-14
ubuntu: CVE-2023-49345 was patched at 2023-12-14
ubuntu: CVE-2023-49346 was patched at 2023-12-14
ubuntu: CVE-2023-49347 was patched at 2023-12-14
redos: CVE-2023-39956 was patched at 2023-11-21
debian: CVE-2023-6209 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
ubuntu: CVE-2023-6209 was patched at 2023-11-23, 2023-11-27
oraclelinux: CVE-2023-6209 was patched at 2023-11-27, 2023-11-28
almalinux: CVE-2023-6209 was patched at 2023-11-27
redhat: CVE-2023-6209 was patched at 2023-11-27, 2023-11-28, 2023-11-29
redhat: CVE-2023-35887 was patched at 2023-12-04
redhat: CVE-2023-0105 was patched at 2023-11-24
debian: CVE-2023-40660 was patched at 2023-11-27, unknown date
debian: CVE-2023-4535 was patched at unknown date
oraclelinux: CVE-2023-40660 was patched at 2023-12-18, 2023-12-19
oraclelinux: CVE-2023-4535 was patched at 2023-12-19
almalinux: CVE-2023-40660 was patched at 2023-12-19
almalinux: CVE-2023-4535 was patched at 2023-12-19
redhat: CVE-2023-40660 was patched at 2023-12-19
redhat: CVE-2023-4535 was patched at 2023-12-19
debian: CVE-2023-45871 was patched at 2024-01-11, unknown date
ubuntu: CVE-2023-45871 was patched at 2023-11-21, 2023-11-27, 2023-11-28, 2023-11-30, 2023-12-05
oraclelinux: CVE-2023-45871 was patched at 2023-12-13, 2023-12-14, 2023-12-22
almalinux: CVE-2023-45871 was patched at 2023-12-12
redhat: CVE-2023-45871 was patched at 2023-12-12, 2024-01-23, 2024-01-24, 2024-01-25
debian: CVE-2023-38406 was patched at unknown date
ubuntu: CVE-2023-38406 was patched at 2023-11-21
oraclelinux: CVE-2023-38406 was patched at 2024-01-12, 2024-01-26
almalinux: CVE-2023-38406 was patched at 2024-01-10, 2024-01-25
redhat: CVE-2023-38406 was patched at 2024-01-10, 2024-01-25
debian: CVE-2023-6478 was patched at 2023-12-13, unknown date
ubuntu: CVE-2023-6478 was patched at 2023-12-13
oraclelinux: CVE-2023-6478 was patched at 2024-01-02, 2024-01-03, 2024-01-04
almalinux: CVE-2023-6478 was patched at 2024-01-02
redhat: CVE-2023-6478 was patched at 2023-12-20, 2024-01-02
redhat: CVE-2023-2801 was patched at 2023-12-12
debian: CVE-2023-48232 was patched at unknown date
debian: CVE-2023-48233 was patched at unknown date
debian: CVE-2023-48234 was patched at unknown date
debian: CVE-2023-48235 was patched at unknown date
debian: CVE-2023-48236 was patched at unknown date
debian: CVE-2023-48237 was patched at unknown date
ubuntu: CVE-2023-48232 was patched at 2023-12-14
ubuntu: CVE-2023-48233 was patched at 2023-12-14
ubuntu: CVE-2023-48234 was patched at 2023-12-14
ubuntu: CVE-2023-48235 was patched at 2023-12-14
ubuntu: CVE-2023-48236 was patched at 2023-12-14
ubuntu: CVE-2023-48237 was patched at 2023-12-14
debian: CVE-2023-6512 was patched at 2023-12-09, unknown date
redos: CVE-2023-29338 was patched at 2023-11-21
redos: CVE-2023-33144 was patched at 2023-11-21
redhat: CVE-2023-6134 was patched at 2023-12-14
debian: CVE-2023-46734 was patched at 2023-11-24, unknown date
debian: CVE-2023-2976 was patched at unknown date
redhat: CVE-2023-2976 was patched at 2023-12-04
debian: CVE-2022-45582 was patched at 2023-12-01, unknown date
debian: CVE-2023-6208 was patched at 2023-11-22, 2023-11-24, 2023-11-26, unknown date
ubuntu: CVE-2023-6208 was patched at 2023-11-23, 2023-11-27
ubuntu: CVE-2023-6210 was patched at 2023-11-23
oraclelinux: CVE-2023-6208 was patched at 2023-11-27, 2023-11-28
almalinux: CVE-2023-6208 was patched at 2023-11-27
redhat: CVE-2023-6208 was patched at 2023-11-27, 2023-11-28, 2023-11-29
debian: CVE-2023-38409 was patched at unknown date
oraclelinux: CVE-2023-38409 was patched at 2024-01-26
redhat: CVE-2023-38409 was patched at 2023-11-28, 2024-01-25
debian: CVE-2023-38407 was patched at unknown date
ubuntu: CVE-2023-38407 was patched at 2023-11-21
oraclelinux: CVE-2023-38407 was patched at 2024-01-12, 2024-01-26
almalinux: CVE-2023-38407 was patched at 2024-01-10, 2024-01-25
redhat: CVE-2023-38407 was patched at 2024-01-10, 2024-01-25
debian: CVE-2022-48521 was patched at 2023-12-03, unknown date
debian: CVE-2023-39804 was patched at unknown date
debian: CVE-2023-44429 was patched at 2023-11-25, unknown date
debian: CVE-2023-44441 was patched at 2023-11-24, 2023-11-30, unknown date
debian: CVE-2023-44442 was patched at 2023-11-21, 2023-11-24, unknown date
debian: CVE-2023-44443 was patched at 2023-11-24, unknown date
debian: CVE-2023-44444 was patched at 2023-11-21, 2023-11-24, unknown date
debian: CVE-2023-44446 was patched at 2023-11-25, 2023-11-29, unknown date
debian: CVE-2023-5616 was patched at unknown date
debian: CVE-2023-6175 was patched at 2023-11-19, unknown date
ubuntu: CVE-2023-39804 was patched at 2023-12-11
ubuntu: CVE-2023-44429 was patched at 2023-11-29
ubuntu: CVE-2023-44441 was patched at 2023-11-29
ubuntu: CVE-2023-44442 was patched at 2023-11-29
ubuntu: CVE-2023-44443 was patched at 2023-11-29
ubuntu: CVE-2023-44444 was patched at 2023-11-29
ubuntu: CVE-2023-44446 was patched at 2023-11-29
ubuntu: CVE-2023-5616 was patched at 2023-12-13
oraclelinux: CVE-2023-44429 was patched at 2023-12-15
oraclelinux: CVE-2023-44446 was patched at 2023-12-15, 2023-12-19, 2024-01-02, 2024-01-18
almalinux: CVE-2023-44429 was patched at 2023-12-13
almalinux: CVE-2023-44446 was patched at 2023-12-13, 2023-12-14
redhat: CVE-2023-44429 was patched at 2023-12-13, 2023-12-19
redhat: CVE-2023-44446 was patched at 2023-12-13, 2023-12-14, 2023-12-19, 2024-01-02, 2024-01-17
redhat: CVE-2023-4503 was patched at 2023-12-04