Report Name: Linux Patch Wednesday February 2024Generated: 2024-03-05 21:10:30
Product Name | Prevalence | U | C | H | M | L | A | Comment |
---|---|---|---|---|---|---|---|---|
AMD Processor | 0.9 | 1 | 1 | Processor | ||||
Linux Kernel | 0.9 | 6 | 11 | 17 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |||
Sudo | 0.9 | 1 | 1 | 2 | Sudo is a program for Unix-like computer operating systems that allows users to run programs with the security privileges of another user | |||
Chromium | 0.8 | 2 | 14 | 16 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |||
GNU C Library | 0.8 | 2 | 1 | 3 | The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library | |||
Mozilla Firefox | 0.8 | 3 | 10 | 1 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | ||
Node.js | 0.8 | 1 | 1 | Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more | ||||
OpenSSL | 0.8 | 1 | 1 | 2 | A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end | |||
Safari | 0.8 | 2 | 2 | Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML. | ||||
Secure Boot | 0.8 | 1 | 1 | Secure boot is a security standard developed by members of the PC industry to help make sure that a device boots using only software that is trusted by the Original Equipment Manufacturer (OEM) | ||||
.NET | 0.7 | 2 | 2 | .NET | ||||
BIND | 0.7 | 4 | 4 | BIND is a suite of software for interacting with the Domain Name System | ||||
Oracle MySQL | 0.7 | 29 | 1 | 30 | MySQL is an open-source relational database management system | |||
ImageMagick | 0.6 | 1 | 1 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | ||||
Puma | 0.6 | 1 | 1 | Puma is a Ruby/Rack web server built for parallelism | ||||
Redis | 0.6 | 1 | 1 | Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability | ||||
DNSSEC | 0.5 | 1 | 1 | The Domain Name System Security Extensions (DNSSEC) is a feature of the Domain Name System (DNS) that authenticates responses to domain name lookups | ||||
GRUB2 | 0.5 | 1 | 1 | Product detected by a:gnu:grub2 (exists in CPE dict) | ||||
GnuTLS | 0.5 | 1 | 1 | 2 | Product detected by a:gnu:gnutls (exists in CPE dict) | |||
Go | 0.5 | 1 | 1 | Product detected by a:golang:go (exists in CPE dict) | ||||
JGit | 0.5 | 1 | 1 | Product detected by a:eclipse:jgit (exists in CPE dict) | ||||
OpenJ9 | 0.5 | 1 | 1 | Product detected by a:eclipse:openj9 (exists in CPE dict) | ||||
Pillow | 0.5 | 1 | 1 | 2 | Product detected by a:python:pillow (exists in CPE dict) | |||
Santuario XML Security for Java | 0.5 | 1 | 1 | Product detected by a:apache:santuario_xml_security_for_java (exists in CPE dict) | ||||
Secure Endpoint | 0.5 | 1 | 1 | Product detected by a:cisco:secure_endpoint (exists in CPE dict) | ||||
Slurm | 0.5 | 1 | 3 | 4 | Product detected by a:schedmd:slurm (exists in CPE dict) | |||
XTERM | 0.5 | 1 | 1 | 2 | Product detected by a:invisible-island:xterm (exists in CPE dict) | |||
Zstandard | 0.5 | 1 | 1 | Product detected by a:facebook:zstandard (exists in CPE dict) | ||||
atril | 0.5 | 1 | 1 | Product detected by a:mate-desktop:atril (does NOT exist in CPE dict) | ||||
django | 0.5 | 1 | 1 | Product detected by a:djangoproject:django (exists in CPE dict) | ||||
dnsmasq | 0.5 | 1 | 1 | Product detected by a:thekelleys:dnsmasq (exists in CPE dict) | ||||
edk2 | 0.5 | 9 | 9 | Product detected by a:tianocore:edk2 (exists in CPE dict) | ||||
engrampa | 0.5 | 1 | 1 | Product detected by a:mate-desktop:engrampa (does NOT exist in CPE dict) | ||||
glacne_store | 0.5 | 1 | 1 | Product detected by a:openstack:glacne_store (does NOT exist in CPE dict) | ||||
jinja | 0.5 | 1 | 1 | Product detected by a:palletsprojects:jinja (exists in CPE dict) | ||||
libgit2 | 0.5 | 1 | 1 | Product detected by a:libgit2:libgit2 (exists in CPE dict) | ||||
libtiff | 0.5 | 1 | 2 | 3 | Product detected by a:libtiff:libtiff (exists in CPE dict) | |||
linux_kernel | 0.5 | 2 | 2 | Product detected by o:linux:linux_kernel (exists in CPE dict) | ||||
postfix | 0.5 | 1 | 1 | Product detected by a:postfix:postfix (exists in CPE dict) | ||||
postgresql | 0.5 | 1 | 1 | Product detected by a:postgresql:postgresql (exists in CPE dict) | ||||
pycryptodome | 0.5 | 1 | 1 | Product detected by a:pycryptodome:pycryptodome (does NOT exist in CPE dict) | ||||
rpm | 0.5 | 3 | 3 | Product detected by a:rpm:rpm (exists in CPE dict) | ||||
runc | 0.5 | 1 | 1 | Product detected by a:linuxfoundation:runc (exists in CPE dict) | ||||
tcpslice | 0.5 | 1 | 1 | Product detected by a:tcpdump:tcpslice (exists in CPE dict) | ||||
Unknown Product | 0 | 1 | 3 | 4 | Unknown Product |
Vulnerability Type | Criticality | U | C | H | M | L | A |
---|---|---|---|---|---|---|---|
Remote Code Execution | 1.0 | 2 | 6 | 8 | |||
Authentication Bypass | 0.98 | 1 | 1 | 2 | |||
Code Injection | 0.97 | 1 | 1 | ||||
Command Injection | 0.97 | 1 | 2 | 3 | |||
Security Feature Bypass | 0.9 | 5 | 7 | 12 | |||
Elevation of Privilege | 0.85 | 1 | 5 | 2 | 8 | ||
Information Disclosure | 0.83 | 2 | 1 | 2 | 5 | ||
Cross Site Scripting | 0.8 | 1 | 1 | ||||
Denial of Service | 0.7 | 2 | 7 | 55 | 64 | ||
Incorrect Calculation | 0.5 | 1 | 1 | 2 | |||
Memory Corruption | 0.5 | 1 | 24 | 25 | |||
Spoofing | 0.4 | 1 | 1 | ||||
Unknown Vulnerability Type | 0 | 1 | 9 | 7 | 17 |
Source | U | C | H | M | L | A |
---|---|---|---|---|---|---|
debian | 9 | 27 | 69 | 3 | 108 | |
redhat | 3 | 14 | 50 | 3 | 70 | |
oraclelinux | 3 | 8 | 14 | 25 | ||
almalinux | 3 | 7 | 11 | 21 | ||
ubuntu | 5 | 13 | 69 | 3 | 90 | |
redos | 2 | 2 | 4 |
1. Elevation of Privilege - GNU C Library (CVE-2023-6246) - Critical [666]
Description: A heap-based buffer overflow was found in the __vsyslog_internal function of the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:www.qualys.com website | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library | |
0.8 | 10 | CVSS Base Score is 8.4. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00383, EPSS Percentile is 0.72438 |
debian: CVE-2023-6246 was patched at 2024-01-30, unknown date
ubuntu: CVE-2023-6246 was patched at 2024-02-01
2. Remote Code Execution - XTERM (CVE-2022-45063) - Critical [654]
Description: xterm before 375 allows
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:news.ycombinator.com website | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:invisible-island:xterm (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00234, EPSS Percentile is 0.60628 |
debian: CVE-2022-45063 was patched at unknown date
redos: CVE-2022-45063 was patched at 2024-02-01
3. Information Disclosure - runc (CVE-2024-21626) - Critical [648]
Description: runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:linuxfoundation:runc (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.6. According to NVD data source | |
0.9 | 10 | EPSS Probability is 0.05062, EPSS Percentile is 0.92698 |
debian: CVE-2024-21626 was patched at 2024-02-04, unknown date
redhat: CVE-2024-21626 was patched at 2024-02-02, 2024-02-07, 2024-02-08
oraclelinux: CVE-2024-21626 was patched at 2024-02-05, 2024-02-09, 2024-02-14
almalinux: CVE-2024-21626 was patched at 2024-02-02, 2024-02-08
ubuntu: CVE-2024-21626 was patched at 2024-01-31
4. Remote Code Execution - engrampa (CVE-2023-52138) - Critical [642]
Description: Engrampa is an archive manager for the MATE environment. Engrampa is found to be vulnerable to a Path Traversal vulnerability that can be leveraged to achieve full Remote Command Execution (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:mate-desktop:engrampa (does NOT exist in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.2. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00325, EPSS Percentile is 0.70131 |
debian: CVE-2023-52138 was patched at 2024-02-16, unknown date
5. Authentication Bypass - Sudo (CVE-2023-42465) - Critical [634]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:www.openwall.com website | |
0.98 | 15 | Authentication Bypass | |
0.9 | 14 | Sudo is a program for Unix-like computer operating systems that allows users to run programs with the security privileges of another user | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00051, EPSS Percentile is 0.17336 |
debian: CVE-2023-42465 was patched at unknown date
redhat: CVE-2023-42465 was patched at 2024-02-14
oraclelinux: CVE-2023-42465 was patched at 2024-02-14
almalinux: CVE-2023-42465 was patched at 2024-02-14
6. Command Injection - atril (CVE-2023-51698) - Critical [625]
Description: Atril is a simple multi-page document viewer. Atril is vulnerable to a critical
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.97 | 15 | Command Injection | |
0.5 | 14 | Product detected by a:mate-desktop:atril (does NOT exist in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.6. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00101, EPSS Percentile is 0.40288 |
debian: CVE-2023-51698 was patched at unknown date
redos: CVE-2023-51698 was patched at 2024-01-23
7. Information Disclosure - GnuTLS (CVE-2024-0553) - Critical [624]
Description: A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:gitlab.com website | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:gnu:gnutls (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.8 | 10 | EPSS Probability is 0.0068, EPSS Percentile is 0.79457 |
debian: CVE-2024-0553 was patched at unknown date
redhat: CVE-2024-0553 was patched at 2024-01-29, 2024-01-31, 2024-02-13
oraclelinux: CVE-2024-0553 was patched at 2024-01-30, 2024-02-02, 2024-02-05
almalinux: CVE-2024-0553 was patched at 2024-01-29, 2024-01-31
ubuntu: CVE-2024-0553 was patched at 2024-01-22
8. Denial of Service - GNU C Library (CVE-2023-6779) - Critical [615]
Description: An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:www.openwall.com website | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library | |
0.8 | 10 | CVSS Base Score is 8.2. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00142, EPSS Percentile is 0.49005 |
debian: CVE-2023-6779 was patched at 2024-01-30, unknown date
ubuntu: CVE-2023-6779 was patched at 2024-02-01
9. Denial of Service - dnsmasq (CVE-2023-50387) - Critical [613]
Description: Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Allocation of Resources Without Limits or Throttling in Redhat Enterprise Linux) | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:thekelleys:dnsmasq (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.9 | 10 | EPSS Probability is 0.0366, EPSS Percentile is 0.91429 |
debian: CVE-2023-50387 was patched at 2024-02-14, 2024-02-18, unknown date
ubuntu: CVE-2023-50387 was patched at 2024-02-13, 2024-02-19
10. Code Injection - Pillow (CVE-2023-50447) - High [589]
Description: Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:duartecsantos.github.io website | |
0.97 | 15 | Code Injection | |
0.5 | 14 | Product detected by a:python:pillow (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00074, EPSS Percentile is 0.30129 |
debian: CVE-2023-50447 was patched at unknown date
redhat: CVE-2023-50447 was patched at 2024-02-08, 2024-02-19, 2024-02-20
oraclelinux: CVE-2023-50447 was patched at 2024-02-18, 2024-02-20
ubuntu: CVE-2023-50447 was patched at 2024-01-30
11. Security Feature Bypass - GnuTLS (CVE-2024-0567) - High [589]
Description: A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:gitlab.com website | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:gnu:gnutls (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00089, EPSS Percentile is 0.36348 |
debian: CVE-2024-0567 was patched at unknown date
redhat: CVE-2024-0567 was patched at 2024-01-29
oraclelinux: CVE-2024-0567 was patched at 2024-01-30
almalinux: CVE-2024-0567 was patched at 2024-01-29
ubuntu: CVE-2024-0567 was patched at 2024-01-22
12. Security Feature Bypass - postfix (CVE-2023-51764) - High [589]
Description: Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:www.youtube.com website | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:postfix:postfix (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00412, EPSS Percentile is 0.73405 |
debian: CVE-2023-51764 was patched at unknown date
ubuntu: CVE-2023-51764 was patched at 2024-01-22, 2024-01-31
13. Denial of Service - Linux Kernel (CVE-2023-6610) - High [572]
Description: An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:bugzilla.redhat.com website | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2023-6610 was patched at unknown date
redhat: CVE-2023-6610 was patched at 2024-02-07, 2024-02-20
14. Denial of Service - libtiff (CVE-2023-6277) - High [553]
Description: An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:gitlab.com website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:libtiff:libtiff (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00177, EPSS Percentile is 0.53969 |
debian: CVE-2023-6277 was patched at unknown date
ubuntu: CVE-2023-6277 was patched at 2024-02-19
15. Elevation of Privilege - rpm (CVE-2021-35938) - High [532]
Description: A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:bugzilla.suse.com website | |
0.85 | 15 | Elevation of Privilege | |
0.5 | 14 | Product detected by a:rpm:rpm (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.7. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00047, EPSS Percentile is 0.14251 |
debian: CVE-2021-35938 was patched at unknown date
redhat: CVE-2021-35938 was patched at 2024-01-25, 2024-01-30, 2024-02-01
oraclelinux: CVE-2021-35938 was patched at 2024-01-25, 2024-02-02
almalinux: CVE-2021-35938 was patched at 2024-01-25, 2024-02-01
16. Elevation of Privilege - rpm (CVE-2021-35939) - High [532]
Description: It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:bugzilla.redhat.com website | |
0.85 | 15 | Elevation of Privilege | |
0.5 | 14 | Product detected by a:rpm:rpm (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.7. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00047, EPSS Percentile is 0.14251 |
debian: CVE-2021-35939 was patched at unknown date
redhat: CVE-2021-35939 was patched at 2024-01-25, 2024-01-30, 2024-02-01
oraclelinux: CVE-2021-35939 was patched at 2024-01-25, 2024-02-02
almalinux: CVE-2021-35939 was patched at 2024-01-25, 2024-02-01
17. Incorrect Calculation - GNU C Library (CVE-2023-6780) - High [532]
Description: An integer overflow was found in the __vsyslog_internal function of the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:www.openwall.com website | |
0.5 | 15 | Incorrect Calculation | |
0.8 | 14 | The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00089, EPSS Percentile is 0.36528 |
debian: CVE-2023-6780 was patched at 2024-01-30, unknown date
ubuntu: CVE-2023-6780 was patched at 2024-02-01
18. Elevation of Privilege - rpm (CVE-2021-35937) - High [520]
Description: A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501,
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:www.usenix.org website | |
0.85 | 15 | Elevation of Privilege | |
0.5 | 14 | Product detected by a:rpm:rpm (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.4. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2021-35937 was patched at unknown date
redhat: CVE-2021-35937 was patched at 2024-01-25, 2024-01-30, 2024-02-01
oraclelinux: CVE-2021-35937 was patched at 2024-01-25, 2024-02-02
almalinux: CVE-2021-35937 was patched at 2024-01-25, 2024-02-01
19. Unknown Vulnerability Type - Node.js (CVE-2023-42282) - High [490]
Description: {'nvd_cve_data_all': 'The ip package before 1.1.9 for Node.js might allow SSRF because some IP addresses (such as 0x7f.1) are improperly categorized as globally routable via isPublic.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'The ip package before 1.1.9 for Node.js might allow SSRF because some IP addresses (such as 0x7f.1) are improperly categorized as globally routable via isPublic.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:cosmosofcyberspace.github.io website | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00063, EPSS Percentile is 0.2527 |
debian: CVE-2023-42282 was patched at unknown date
ubuntu: CVE-2023-42282 was patched at 2024-02-19
20. Remote Code Execution - Safari (CVE-2024-23213) - High [478]
Description: The issue was addressed with improved memory handling. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5,
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.8 | 14 | Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML. | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00121, EPSS Percentile is 0.45356 |
debian: CVE-2024-23213 was patched at 2024-02-08, unknown date
ubuntu: CVE-2024-23213 was patched at 2024-02-12
21. Memory Corruption - tcpslice (CVE-2021-41043) - High [470]
Description: Use after free in tcpslice triggers AddressSanitizer, no other confirmed impact.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:tcpdump:tcpslice (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00051, EPSS Percentile is 0.17116 |
debian: CVE-2021-41043 was patched at unknown date
redhat: CVE-2021-41043 was patched at 2024-01-25, 2024-01-30, 2024-02-12
oraclelinux: CVE-2021-41043 was patched at 2024-02-13
almalinux: CVE-2021-41043 was patched at 2024-02-12
22. Remote Code Execution - Redis (CVE-2023-41056) - High [469]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.6 | 14 | Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability | |
0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
0.8 | 10 | EPSS Probability is 0.0075, EPSS Percentile is 0.80499 |
debian: CVE-2023-41056 was patched at 2024-01-29, unknown date
23. Remote Code Execution - Linux Kernel (CVE-2021-34866) - High [447]
Description: This vulnerability allows local attackers to escalate privileges on affected installations of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.19414 |
debian: CVE-2021-34866 was patched at unknown date
redhat: CVE-2021-34866 was patched at 2024-02-07
24. Remote Code Execution - libgit2 (CVE-2024-24577) - High [440]
Description: libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:libgit2:libgit2 (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.6. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00229, EPSS Percentile is 0.60259 |
debian: CVE-2024-24577 was patched at 2024-02-09, unknown date
25. Security Feature Bypass - Mozilla Firefox (CVE-2024-0750) - High [436]
Description: A bug in popup notifications delay calculation could have made it possible for an attacker to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00069, EPSS Percentile is 0.28268 |
debian: CVE-2024-0750 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0750 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0750 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0750 was patched at 2024-01-30
ubuntu: CVE-2024-0750 was patched at 2024-01-29
26. Remote Code Execution - JGit (CVE-2023-4759) - High [428]
Description: Arbitrary File Overwrite in Eclipse JGit <= 6.6.0 In Eclipse JGit, all versions <= 6.6.0.202305301015-r, a symbolic link present in a specially crafted git repository can be used to write a file to locations outside the working tree when this repository is cloned with JGit to a case-insensitive filesystem, or when a checkout from a clone of such a repository is performed on a case-insensitive filesystem. This can happen on checkout (DirCacheCheckout), merge (ResolveMerger via its WorkingTreeUpdater), pull (PullCommand using merge), and when applying a patch (PatchApplier). This can be exploited for remote
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:eclipse:jgit (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00128, EPSS Percentile is 0.46666 |
debian: CVE-2023-4759 was patched at unknown date
redhat: CVE-2023-4759 was patched at 2024-02-07
27. Remote Code Execution - Slurm (CVE-2023-49937) - High [428]
Description: An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. Because of a double free, attackers can cause a denial of service or possibly
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:schedmd:slurm (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00105, EPSS Percentile is 0.41625 |
debian: CVE-2023-49937 was patched at 2024-01-28, unknown date
28. Elevation of Privilege - Mozilla Firefox (CVE-2024-0751) - High [427]
Description: A malicious devtools extension could have been used to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00077, EPSS Percentile is 0.31122 |
debian: CVE-2024-0751 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0751 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0751 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0751 was patched at 2024-01-30
ubuntu: CVE-2024-0751 was patched at 2024-01-29
29. Security Feature Bypass - Chromium (CVE-2024-0804) - High [425]
Description: Insufficient policy enforcement in iOS Security UI in Google Chrome prior to 121.0.6167.85 allowed a remote attacker
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00084, EPSS Percentile is 0.34157 |
debian: CVE-2024-0804 was patched at 2024-01-24, unknown date
30. Denial of Service - Linux Kernel (CVE-2023-6356) - High [417]
Description: A flaw was found in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00144, EPSS Percentile is 0.49247 |
debian: CVE-2023-6356 was patched at unknown date
redhat: CVE-2023-6356 was patched at 2024-02-07, 2024-02-20
31. Denial of Service - Linux Kernel (CVE-2023-6535) - High [417]
Description: A flaw was found in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00144, EPSS Percentile is 0.49247 |
debian: CVE-2023-6535 was patched at unknown date
redhat: CVE-2023-6535 was patched at 2024-02-07, 2024-02-20
32. Denial of Service - Linux Kernel (CVE-2023-6536) - High [417]
Description: A flaw was found in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00144, EPSS Percentile is 0.49247 |
debian: CVE-2023-6536 was patched at unknown date
redhat: CVE-2023-6536 was patched at 2024-02-07, 2024-02-20
33. Denial of Service - Mozilla Firefox (CVE-2024-0745) - High [413]
Description: The WebAudio `OscillatorNode` object was susceptible to a stack buffer overflow. This could have led to a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00091, EPSS Percentile is 0.37522 |
ubuntu: CVE-2024-0745 was patched at 2024-01-29
34. Security Feature Bypass - Chromium (CVE-2024-0814) - High [413]
Description: Incorrect security UI in Payments in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00081, EPSS Percentile is 0.32897 |
debian: CVE-2024-0814 was patched at 2024-01-24, unknown date
35. Information Disclosure - Safari (CVE-2024-23206) - High [412]
Description: An access issue was addressed with improved access restrictions. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5,
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.8 | 14 | Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML. | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00097, EPSS Percentile is 0.39295 |
debian: CVE-2024-23206 was patched at 2024-02-08, unknown date
ubuntu: CVE-2024-23206 was patched at 2024-02-12
36. Elevation of Privilege - Linux Kernel (CVE-2024-0193) - High [408]
Description: A use-after-free flaw was found in the netfilter subsystem of the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2024-0193 was patched at unknown date
ubuntu: CVE-2024-0193 was patched at 2024-01-25, 2024-01-26, 2024-01-30, 2024-02-06, 2024-02-09, 2024-02-14, 2024-02-15
37. Denial of Service - OpenSSL (CVE-2024-0727) - High [401]
Description: Issue summary: Processing a maliciously formatted PKCS12 file may lead
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00228, EPSS Percentile is 0.60168 |
debian: CVE-2024-0727 was patched at unknown date
ubuntu: CVE-2024-0727 was patched at 2024-02-05, 2024-02-13
38. Elevation of Privilege - Linux Kernel (CVE-2023-5972) - Medium [397]
Description: A null pointer dereference flaw was found in the nft_inner.c functionality of netfilter in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
ubuntu: CVE-2023-5972 was patched at 2024-02-07
39. Elevation of Privilege - Linux Kernel (CVE-2024-0646) - Medium [397]
Description: An out-of-bounds memory write flaw was found in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2024-0646 was patched at unknown date
redhat: CVE-2024-0646 was patched at 2024-02-07, 2024-02-15, 2024-02-20
ubuntu: CVE-2024-0646 was patched at 2024-02-15
40. Security Feature Bypass - Secure Boot (CVE-2023-48733) - Medium [389]
Description: An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Secure boot is a security standard developed by members of the PC industry to help make sure that a device boots using only software that is trusted by the Original Equipment Manufacturer (OEM) | |
0.7 | 10 | CVSS Base Score is 6.7. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12473 |
debian: CVE-2023-48733 was patched at 2024-02-14, unknown date
ubuntu: CVE-2023-48733 was patched at 2024-02-15
41. Denial of Service - Sudo (CVE-2023-7090) - Medium [382]
Description: A flaw was found in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | Sudo is a program for Unix-like computer operating systems that allows users to run programs with the security privileges of another user | |
0.7 | 10 | CVSS Base Score is 6.6. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00058, EPSS Percentile is 0.22465 |
debian: CVE-2023-7090 was patched at unknown date
redos: CVE-2023-7090 was patched at 2024-02-08
42. Incorrect Calculation - Chromium (CVE-2024-0808) - Medium [377]
Description: Integer underflow in WebUI in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via a malicious file. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00085, EPSS Percentile is 0.3461 |
debian: CVE-2024-0808 was patched at 2024-01-24, unknown date
43. Memory Corruption - Chromium (CVE-2024-1283) - Medium [377]
Description: Heap buffer overflow in Skia in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00085, EPSS Percentile is 0.3461 |
debian: CVE-2024-1283 was patched at 2024-02-08, unknown date
44. Memory Corruption - Chromium (CVE-2024-1284) - Medium [377]
Description: Use after free in Mojo in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00085, EPSS Percentile is 0.3461 |
debian: CVE-2024-1284 was patched at 2024-02-08, unknown date
45. Security Feature Bypass - Chromium (CVE-2024-0809) - Medium [377]
Description: Inappropriate implementation in Autofill in Google Chrome prior to 121.0.6167.85
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00075, EPSS Percentile is 0.30628 |
debian: CVE-2024-0809 was patched at 2024-01-24, unknown date
46. Denial of Service - BIND (CVE-2023-4408) - Medium [372]
Description: The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | BIND is a suite of software for interacting with the Domain Name System | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00081, EPSS Percentile is 0.33262 |
debian: CVE-2023-4408 was patched at 2024-02-14, unknown date
ubuntu: CVE-2023-4408 was patched at 2024-02-13, 2024-02-19
47. Denial of Service - BIND (CVE-2023-5679) - Medium [372]
Description: A bad interaction between DNS64 and serve-stale may cause `named`
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | BIND is a suite of software for interacting with the Domain Name System | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00081, EPSS Percentile is 0.33262 |
debian: CVE-2023-5679 was patched at 2024-02-14, unknown date
ubuntu: CVE-2023-5679 was patched at 2024-02-13
48. Denial of Service - Linux Kernel (CVE-2023-1838) - Medium [370]
Description: A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2023-1838 was patched at unknown date
redhat: CVE-2023-1838 was patched at 2024-01-25, 2024-01-30, 2024-02-20
49. Denial of Service - Linux Kernel (CVE-2024-0565) - Medium [370]
Description: An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 6.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2024-0565 was patched at unknown date
ubuntu: CVE-2024-0565 was patched at 2024-02-15
50. Denial of Service - Linux Kernel (CVE-2024-0607) - Medium [370]
Description: A flaw was found in the Netfilter subsystem in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 6.6. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2024-0607 was patched at unknown date
ubuntu: CVE-2024-0607 was patched at 2024-02-15
51. Authentication Bypass - GRUB2 (CVE-2023-4001) - Medium [365]
Description: An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.98 | 15 | Authentication Bypass | |
0.5 | 14 | Product detected by a:gnu:grub2 (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00063, EPSS Percentile is 0.24817 |
redhat: CVE-2023-4001 was patched at 2024-01-25
oraclelinux: CVE-2023-4001 was patched at 2024-01-25
almalinux: CVE-2023-4001 was patched at 2024-01-25
52. Denial of Service - Mozilla Firefox (CVE-2024-0741) - Medium [365]
Description: An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.20451 |
debian: CVE-2024-0741 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0741 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0741 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0741 was patched at 2024-01-30
ubuntu: CVE-2024-0741 was patched at 2024-01-29
53. Denial of Service - Mozilla Firefox (CVE-2024-0743) - Medium [365]
Description: An unchecked return value in TLS handshake code could have caused a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.14028 |
debian: CVE-2024-0743 was patched at unknown date
ubuntu: CVE-2024-0743 was patched at 2024-01-29
54. Denial of Service - Mozilla Firefox (CVE-2024-0746) - Medium [365]
Description: A Linux user opening the print preview dialog could have caused the browser
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.2044 |
debian: CVE-2024-0746 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0746 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0746 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0746 was patched at 2024-01-30
ubuntu: CVE-2024-0746 was patched at 2024-01-29
55. Denial of Service - OpenSSL (CVE-2023-6129) - Medium [365]
Description: Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00061, EPSS Percentile is 0.23609 |
debian: CVE-2023-6129 was patched at unknown date
ubuntu: CVE-2023-6129 was patched at 2024-02-05
56. Memory Corruption - Chromium (CVE-2024-0806) - Medium [365]
Description: Use after free in Passwords in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00082, EPSS Percentile is 0.33324 |
debian: CVE-2024-0806 was patched at 2024-01-24, unknown date
57. Memory Corruption - Chromium (CVE-2024-0807) - Medium [365]
Description: Use after free in Web Audio in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00082, EPSS Percentile is 0.33324 |
debian: CVE-2024-0807 was patched at 2024-01-24, unknown date
58. Memory Corruption - Chromium (CVE-2024-1059) - Medium [365]
Description: Use after free in Peer Connection in Google Chrome prior to 121.0.6167.139 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00082, EPSS Percentile is 0.33324 |
debian: CVE-2024-1059 was patched at 2024-02-01, unknown date
59. Memory Corruption - Chromium (CVE-2024-1060) - Medium [365]
Description: Use after free in Canvas in Google Chrome prior to 121.0.6167.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00082, EPSS Percentile is 0.33324 |
debian: CVE-2024-1060 was patched at 2024-02-01, unknown date
60. Memory Corruption - Chromium (CVE-2024-1077) - Medium [365]
Description: Use after free in Network in Google Chrome prior to 121.0.6167.139 allowed a remote attacker to potentially exploit heap corruption via a malicious file. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00082, EPSS Percentile is 0.33324 |
debian: CVE-2024-1077 was patched at 2024-02-01, unknown date
61. Memory Corruption - Mozilla Firefox (CVE-2024-0755) - Medium [365]
Description: Memory safety bugs present in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00066, EPSS Percentile is 0.2693 |
debian: CVE-2024-0755 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0755 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0755 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0755 was patched at 2024-01-30
ubuntu: CVE-2024-0755 was patched at 2024-01-29
62. Security Feature Bypass - Chromium (CVE-2024-0810) - Medium [365]
Description: Insufficient policy enforcement in DevTools in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.17676 |
debian: CVE-2024-0810 was patched at 2024-01-24, unknown date
63. Security Feature Bypass - Chromium (CVE-2024-0811) - Medium [365]
Description: Inappropriate implementation in Extensions API in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.17676 |
debian: CVE-2024-0811 was patched at 2024-01-24, unknown date
64. Security Feature Bypass - Mozilla Firefox (CVE-2024-0749) - Medium [365]
Description: A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16613 |
debian: CVE-2024-0749 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0749 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0749 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0749 was patched at 2024-01-30
ubuntu: CVE-2024-0749 was patched at 2024-01-29
65. Denial of Service - libtiff (CVE-2023-52356) - Medium [363]
Description: A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:libtiff:libtiff (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00127, EPSS Percentile is 0.46487 |
debian: CVE-2023-52356 was patched at unknown date
ubuntu: CVE-2023-52356 was patched at 2024-02-19
66. Security Feature Bypass - Slurm (CVE-2023-49933) - Medium [363]
Description: An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:schedmd:slurm (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.20209 |
debian: CVE-2023-49933 was patched at 2024-01-28, unknown date
67. Security Feature Bypass - Slurm (CVE-2023-49938) - Medium [363]
Description: An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:schedmd:slurm (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.2. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00059, EPSS Percentile is 0.22972 |
debian: CVE-2023-49938 was patched at 2024-01-28, unknown date
68. Information Disclosure - Go (CVE-2023-45287) - Medium [362]
Description: Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:golang:go (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00071, EPSS Percentile is 0.28726 |
debian: CVE-2023-45287 was patched at unknown date
redhat: CVE-2023-45287 was patched at 2024-02-08
oraclelinux: CVE-2023-45287 was patched at 2024-02-14
almalinux: CVE-2023-45287 was patched at 2024-02-08
69. Denial of Service - .NET (CVE-2024-21386) - Medium [360]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | .NET | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00063, EPSS Percentile is 0.24902 |
redhat: CVE-2024-21386 was patched at 2024-02-13, 2024-02-14, 2024-02-15
oraclelinux: CVE-2024-21386 was patched at 2024-02-15, 2024-02-16, 2024-02-21
almalinux: CVE-2024-21386 was patched at 2024-02-13, 2024-02-15
ubuntu: CVE-2024-21386 was patched at 2024-02-13
70. Denial of Service - .NET (CVE-2024-21404) - Medium [360]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | .NET | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00063, EPSS Percentile is 0.24902 |
redhat: CVE-2024-21404 was patched at 2024-02-13, 2024-02-14, 2024-02-15
oraclelinux: CVE-2024-21404 was patched at 2024-02-15, 2024-02-16, 2024-02-21
almalinux: CVE-2024-21404 was patched at 2024-02-13, 2024-02-15
ubuntu: CVE-2024-21404 was patched at 2024-02-13
71. Denial of Service - Linux Kernel (CVE-2023-6679) - Medium [358]
Description: A null pointer dereference vulnerability was found in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c in the Digital Phase Locked Loop (DPLL) subsystem in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
redhat: CVE-2023-6679 was patched at 2024-01-25
oraclelinux: CVE-2023-6679 was patched at 2024-02-09
72. Denial of Service - Linux Kernel (CVE-2023-7192) - Medium [358]
Description: A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2023-7192 was patched at unknown date
redhat: CVE-2023-7192 was patched at 2024-02-07
ubuntu: CVE-2023-7192 was patched at 2024-02-20, 2024-02-21
73. Denial of Service - Linux Kernel (CVE-2024-0641) - Medium [358]
Description: A
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2024-0641 was patched at unknown date
ubuntu: CVE-2024-0641 was patched at 2024-02-07, 2024-02-08, 2024-02-09, 2024-02-14, 2024-02-15
74. Command Injection - Puma (CVE-2024-21647) - Medium [356]
Description: Puma is a web server for Ruby/Rack applications built for parallelism. Prior to version 6.4.2,
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.97 | 15 | Command Injection | |
0.6 | 14 | Puma is a Ruby/Rack web server built for parallelism | |
0.6 | 10 | CVSS Base Score is 5.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10447 |
debian: CVE-2024-21647 was patched at unknown date
ubuntu: CVE-2024-21647 was patched at 2024-01-25
75. Memory Corruption - Chromium (CVE-2024-0813) - Medium [353]
Description: Use after free in Reading Mode in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interaction. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00059, EPSS Percentile is 0.22616 |
debian: CVE-2024-0813 was patched at 2024-01-24, unknown date
76. Denial of Service - edk2 (CVE-2023-45232) - Medium [351]
Description: EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:tianocore:edk2 (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00103, EPSS Percentile is 0.40764 |
debian: CVE-2023-45232 was patched at unknown date
ubuntu: CVE-2023-45232 was patched at 2024-02-15
77. Information Disclosure - pycryptodome (CVE-2023-52323) - Medium [350]
Description: PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decryption, exploitable for a Manger attack.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:pycryptodome:pycryptodome (does NOT exist in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.9. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00087, EPSS Percentile is 0.35499 |
debian: CVE-2023-52323 was patched at unknown date
ubuntu: CVE-2023-52323 was patched at 2024-01-23
78. Memory Corruption - Linux Kernel (CVE-2024-0562) - Medium [346]
Description: A use-after-free flaw was found in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2024-0562 was patched at unknown date
redhat: CVE-2024-0562 was patched at 2024-01-25
79. Memory Corruption - Linux Kernel (CVE-2024-22705) - Medium [346]
Description: An issue was discovered in ksmbd in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06997 |
debian: CVE-2024-22705 was patched at unknown date
ubuntu: CVE-2024-22705 was patched at 2024-02-15
80. Denial of Service - Secure Endpoint (CVE-2024-20290) - Medium [339]
Description: A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:cisco:secure_endpoint (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00084, EPSS Percentile is 0.34219 |
debian: CVE-2024-20290 was patched at unknown date
ubuntu: CVE-2024-20290 was patched at 2024-02-14
81. Denial of Service - Zstandard (CVE-2022-4899) - Medium [339]
Description: A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:facebook:zstandard (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00073, EPSS Percentile is 0.29867 |
debian: CVE-2022-4899 was patched at unknown date
redhat: CVE-2022-4899 was patched at 2024-02-20
82. Denial of Service - edk2 (CVE-2023-45233) - Medium [339]
Description: EDK2's Network Package is susceptible to an infinite lop vulnerability when parsing a PadN option in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:tianocore:edk2 (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00072, EPSS Percentile is 0.29474 |
debian: CVE-2023-45233 was patched at unknown date
ubuntu: CVE-2023-45233 was patched at 2024-02-15
83. Memory Corruption - XTERM (CVE-2023-40359) - Medium [339]
Description: xterm before 380 supports ReGIS reporting for character-set names even if they have unexpected characters (i.e., neither alphanumeric nor underscore), aka a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:invisible-island:xterm (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00091, EPSS Percentile is 0.37522 |
debian: CVE-2023-40359 was patched at unknown date
redos: CVE-2023-40359 was patched at 2024-02-01
84. Denial of Service - Oracle MySQL (CVE-2024-20960) - Medium [336]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20960 was patched at 2024-02-20
ubuntu: CVE-2024-20960 was patched at 2024-01-30
85. Denial of Service - Oracle MySQL (CVE-2024-20961) - Medium [336]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20961 was patched at 2024-02-20
ubuntu: CVE-2024-20961 was patched at 2024-01-30
86. Denial of Service - Oracle MySQL (CVE-2024-20962) - Medium [336]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20962 was patched at 2024-02-20
ubuntu: CVE-2024-20962 was patched at 2024-01-30
87. Denial of Service - Oracle MySQL (CVE-2024-20963) - Medium [336]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20963 was patched at 2024-02-20
ubuntu: CVE-2024-20963 was patched at 2024-01-30
88. Denial of Service - Oracle MySQL (CVE-2024-20973) - Medium [336]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20973 was patched at 2024-02-20
ubuntu: CVE-2024-20973 was patched at 2024-01-30
89. Denial of Service - Oracle MySQL (CVE-2024-20977) - Medium [336]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20977 was patched at 2024-02-20
ubuntu: CVE-2024-20977 was patched at 2024-01-30
90. Denial of Service - Oracle MySQL (CVE-2024-20985) - Medium [336]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20985 was patched at 2024-02-20
ubuntu: CVE-2024-20985 was patched at 2024-01-30
91. Memory Corruption - AMD Processor (CVE-2023-20592) - Medium [334]
Description: Improper or unexpected behavior of the INVD instruction in some
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | Processor | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.13012 |
debian: CVE-2023-20592 was patched at unknown date
redhat: CVE-2023-20592 was patched at 2024-02-09
92. Cross Site Scripting - jinja (CVE-2024-22195) - Medium [333]
Description: Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.8 | 15 | Cross Site Scripting | |
0.5 | 14 | Product detected by a:palletsprojects:jinja (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.4. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00098, EPSS Percentile is 0.3967 |
debian: CVE-2024-22195 was patched at unknown date
ubuntu: CVE-2024-22195 was patched at 2024-01-25
93. Memory Corruption - Mozilla Firefox (CVE-2024-0744) - Medium [329]
Description: In some circumstances, JIT compiled code could have dereferenced a wild pointer value. This could have led to an exploitable crash. This vulnerability affects
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.14028 |
ubuntu: CVE-2024-0744 was patched at 2024-01-29
94. Denial of Service - Pillow (CVE-2023-44271) - Medium [327]
Description: An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:python:pillow (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.20305 |
debian: CVE-2023-44271 was patched at unknown date
redhat: CVE-2023-44271 was patched at 2024-01-23
oraclelinux: CVE-2023-44271 was patched at 2024-01-23
ubuntu: CVE-2023-44271 was patched at 2024-01-30
95. Denial of Service - Slurm (CVE-2023-49936) - Medium [327]
Description: An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. A NULL pointer dereference leads to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:schedmd:slurm (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00059, EPSS Percentile is 0.22774 |
debian: CVE-2023-49936 was patched at 2024-01-28, unknown date
96. Denial of Service - django (CVE-2024-24680) - Medium [327]
Description: An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:djangoproject:django (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.18634 |
debian: CVE-2024-24680 was patched at unknown date
ubuntu: CVE-2024-24680 was patched at 2024-02-06
97. Denial of Service - Oracle MySQL (CVE-2024-20965) - Medium [324]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.18842 |
redhat: CVE-2024-20965 was patched at 2024-02-20
ubuntu: CVE-2024-20965 was patched at 2024-01-30
98. Denial of Service - Oracle MySQL (CVE-2024-20967) - Medium [324]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20967 was patched at 2024-02-20
ubuntu: CVE-2024-20967 was patched at 2024-01-30
99. Denial of Service - Oracle MySQL (CVE-2024-20969) - Medium [324]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20969 was patched at 2024-02-20
ubuntu: CVE-2024-20969 was patched at 2024-01-30
100. Memory Corruption - Linux Kernel (CVE-2023-46343) - Medium [322]
Description: In the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2023-46343 was patched at unknown date
ubuntu: CVE-2023-46343 was patched at 2024-02-07, 2024-02-08, 2024-02-20
101. Denial of Service - Oracle MySQL (CVE-2023-22007) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2023-22007 was patched at 2024-02-20
102. Denial of Service - Oracle MySQL (CVE-2023-22065) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2023-22065 was patched at 2024-02-20
103. Denial of Service - Oracle MySQL (CVE-2023-22104) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2023-22104 was patched at 2024-02-20
104. Denial of Service - Oracle MySQL (CVE-2023-22110) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2023-22110 was patched at 2024-02-20
105. Denial of Service - Oracle MySQL (CVE-2023-22111) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2023-22111 was patched at 2024-02-20
106. Denial of Service - Oracle MySQL (CVE-2023-22115) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2023-22115 was patched at 2024-02-20
107. Denial of Service - Oracle MySQL (CVE-2024-20964) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20964 was patched at 2024-02-20
ubuntu: CVE-2024-20964 was patched at 2024-01-30
108. Denial of Service - Oracle MySQL (CVE-2024-20966) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20966 was patched at 2024-02-20
ubuntu: CVE-2024-20966 was patched at 2024-01-30
109. Denial of Service - Oracle MySQL (CVE-2024-20970) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20970 was patched at 2024-02-20
ubuntu: CVE-2024-20970 was patched at 2024-01-30
110. Denial of Service - Oracle MySQL (CVE-2024-20971) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20971 was patched at 2024-02-20
ubuntu: CVE-2024-20971 was patched at 2024-01-30
111. Denial of Service - Oracle MySQL (CVE-2024-20972) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20972 was patched at 2024-02-20
ubuntu: CVE-2024-20972 was patched at 2024-01-30
112. Denial of Service - Oracle MySQL (CVE-2024-20974) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20974 was patched at 2024-02-20
ubuntu: CVE-2024-20974 was patched at 2024-01-30
113. Denial of Service - Oracle MySQL (CVE-2024-20976) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20976 was patched at 2024-02-20
ubuntu: CVE-2024-20976 was patched at 2024-01-30
114. Denial of Service - Oracle MySQL (CVE-2024-20978) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20978 was patched at 2024-02-20
ubuntu: CVE-2024-20978 was patched at 2024-01-30
115. Denial of Service - Oracle MySQL (CVE-2024-20981) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20981 was patched at 2024-02-20
ubuntu: CVE-2024-20981 was patched at 2024-01-30
116. Denial of Service - Oracle MySQL (CVE-2024-20982) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20982 was patched at 2024-02-20
ubuntu: CVE-2024-20982 was patched at 2024-01-30
117. Denial of Service - Oracle MySQL (CVE-2024-20983) - Medium [313]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20983 was patched at 2024-02-20
ubuntu: CVE-2024-20983 was patched at 2024-01-30
118. Denial of Service - Oracle MySQL (CVE-2024-20968) - Medium [301]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.4 | 10 | CVSS Base Score is 4.4. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20968 was patched at 2024-02-20
119. Denial of Service - Oracle MySQL (CVE-2024-20984) - Medium [301]
Description: Vulnerability in the MySQL Server product of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.4 | 10 | CVSS Base Score is 4.4. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.11119 |
redhat: CVE-2024-20984 was patched at 2024-02-20
ubuntu: CVE-2024-20984 was patched at 2024-01-30
120. Denial of Service - libtiff (CVE-2023-6228) - Medium [291]
Description: An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:libtiff:libtiff (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10603 |
debian: CVE-2023-6228 was patched at unknown date
ubuntu: CVE-2023-6228 was patched at 2024-02-19
121. Denial of Service - linux_kernel (CVE-2023-2166) - Medium [291]
Description: A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by o:linux:linux_kernel (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2023-2166 was patched at unknown date
redhat: CVE-2023-2166 was patched at 2024-01-25, 2024-02-07, 2024-02-20
oraclelinux: CVE-2023-2166 was patched at 2024-01-26
122. Memory Corruption - edk2 (CVE-2023-45230) - Medium [291]
Description: EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:tianocore:edk2 (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00051, EPSS Percentile is 0.17383 |
debian: CVE-2023-45230 was patched at unknown date
ubuntu: CVE-2023-45230 was patched at 2024-02-15
123. Memory Corruption - edk2 (CVE-2023-45234) - Medium [291]
Description: EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:tianocore:edk2 (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00051, EPSS Percentile is 0.17383 |
debian: CVE-2023-45234 was patched at unknown date
ubuntu: CVE-2023-45234 was patched at 2024-02-15
124. Memory Corruption - edk2 (CVE-2023-45235) - Medium [291]
Description: EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:tianocore:edk2 (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00051, EPSS Percentile is 0.17383 |
debian: CVE-2023-45235 was patched at unknown date
ubuntu: CVE-2023-45235 was patched at 2024-02-15
125. Spoofing - Chromium (CVE-2024-0805) - Medium [288]
Description: Inappropriate implementation in Downloads in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to perform domain
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.4 | 15 | Spoofing | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00081, EPSS Percentile is 0.32913 |
debian: CVE-2024-0805 was patched at 2024-01-24, unknown date
126. Memory Corruption - edk2 (CVE-2023-45231) - Medium [279]
Description: EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing Neighbor Discovery Redirect message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:tianocore:edk2 (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00056, EPSS Percentile is 0.20674 |
debian: CVE-2023-45231 was patched at unknown date
ubuntu: CVE-2023-45231 was patched at 2024-02-15
127. Memory Corruption - linux_kernel (CVE-2023-6040) - Medium [279]
Description: An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by o:linux:linux_kernel (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2023-6040 was patched at unknown date
ubuntu: CVE-2023-6040 was patched at 2024-01-25, 2024-01-26, 2024-01-29, 2024-01-30, 2024-02-06, 2024-02-07, 2024-02-09, 2024-02-15
128. Unknown Vulnerability Type - Chromium (CVE-2024-0812) - Medium [276]
Description: {'nvd_cve_data_all': 'Inappropriate implementation in Accessibility in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Inappropriate implementation in Accessibility in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00082, EPSS Percentile is 0.33348 |
debian: CVE-2024-0812 was patched at 2024-01-24, unknown date
129. Memory Corruption - ImageMagick (CVE-2023-5341) - Medium [272]
Description: A heap use-after-free flaw was found in coders/bmp.c in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
0.6 | 10 | CVSS Base Score is 6.2. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.05402 |
debian: CVE-2023-5341 was patched at unknown date
ubuntu: CVE-2023-5341 was patched at 2024-02-01
130. Memory Corruption - edk2 (CVE-2022-36763) - Medium [267]
Description: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:tianocore:edk2 (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06997 |
debian: CVE-2022-36763 was patched at unknown date
ubuntu: CVE-2022-36763 was patched at 2024-02-15
131. Memory Corruption - edk2 (CVE-2022-36764) - Medium [267]
Description: EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:tianocore:edk2 (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06997 |
debian: CVE-2022-36764 was patched at unknown date
ubuntu: CVE-2022-36764 was patched at 2024-02-15
132. Memory Corruption - edk2 (CVE-2022-36765) - Medium [267]
Description: EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:tianocore:edk2 (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06997 |
debian: CVE-2022-36765 was patched at unknown date
ubuntu: CVE-2022-36765 was patched at 2024-02-15
133. Unknown Vulnerability Type - BIND (CVE-2023-5517) - Medium [247]
Description: {'nvd_cve_data_all': 'A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when: - `nxdomain-redirect <domain>;` is configured, and - the resolver receives a PTR query for an RFC 1918 address that would normally result in an authoritative NXDOMAIN response. This issue affects BIND 9 versions 9.12.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when:\n\n - `nxdomain-redirect <domain>;` is configured, and\n - the resolver receives a PTR query for an RFC 1918 address that would normally result in an authoritative NXDOMAIN response.\nThis issue affects BIND 9 versions 9.12.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.7 | 14 | BIND is a suite of software for interacting with the Domain Name System | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00081, EPSS Percentile is 0.33262 |
debian: CVE-2023-5517 was patched at 2024-02-14, unknown date
ubuntu: CVE-2023-5517 was patched at 2024-02-13, 2024-02-19
134. Command Injection - Unknown Product (CVE-2024-20328) - Medium [244]
Description: {'nvd_cve_data_all': 'A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands. ClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. ', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands.\nClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\n\n', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.97 | 15 | Command Injection | |
0 | 14 | Unknown Product | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.07643 |
debian: CVE-2024-20328 was patched at unknown date
ubuntu: CVE-2024-20328 was patched at 2024-02-14
135. Unknown Vulnerability Type - Mozilla Firefox (CVE-2024-0747) - Medium [240]
Description: {'nvd_cve_data_all': 'When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00056, EPSS Percentile is 0.20629 |
debian: CVE-2024-0747 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0747 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0747 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0747 was patched at 2024-01-30
ubuntu: CVE-2024-0747 was patched at 2024-01-29
136. Unknown Vulnerability Type - Mozilla Firefox (CVE-2024-0753) - Medium [240]
Description: {'nvd_cve_data_all': 'In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00056, EPSS Percentile is 0.21044 |
debian: CVE-2024-0753 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0753 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0753 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0753 was patched at 2024-01-30
ubuntu: CVE-2024-0753 was patched at 2024-01-29
137. Unknown Vulnerability Type - BIND (CVE-2023-6516) - Medium [235]
Description: {'nvd_cve_data_all': 'To keep its cache database efficient, `named` running as a recursive resolver occasionally attempts to clean up the database. It uses several methods, including some that are asynchronous: a small chunk of memory pointing to the cache element that can be cleaned up is first allocated and then queued for later processing. It was discovered that if the resolver is continuously processing query patterns triggering this type of cache-database maintenance, `named` may not be able to handle the cleanup events in a timely manner. This in turn enables the list of queued cleanup events to grow infinitely large over time, allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.16.0 through 9.16.45 and 9.16.8-S1 through 9.16.45-S1.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'To keep its cache database efficient, `named` running as a recursive resolver occasionally attempts to clean up the database. It uses several methods, including some that are asynchronous: a small chunk of memory pointing to the cache element that can be cleaned up is first allocated and then queued for later processing. It was discovered that if the resolver is continuously processing query patterns triggering this type of cache-database maintenance, `named` may not be able to handle the cleanup events in a timely manner. This in turn enables the list of queued cleanup events to grow infinitely large over time, allowing the configured `max-cache-size` limit to be significantly exceeded.\nThis issue affects BIND 9 versions 9.16.0 through 9.16.45 and 9.16.8-S1 through 9.16.45-S1.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.7 | 14 | BIND is a suite of software for interacting with the Domain Name System | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.17576 |
debian: CVE-2023-6516 was patched at unknown date
ubuntu: CVE-2023-6516 was patched at 2024-02-19
138. Unknown Vulnerability Type - Mozilla Firefox (CVE-2024-0754) - Medium [228]
Description: {'nvd_cve_data_all': 'Some WASM source files could have caused a crash when loaded in devtools. This vulnerability affects Firefox < 122.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Some WASM source files could have caused a crash when loaded in devtools. This vulnerability affects Firefox < 122.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.14028 |
ubuntu: CVE-2024-0754 was patched at 2024-01-29
139. Denial of Service - DNSSEC (CVE-2023-50868) - Medium [220]
Description: The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | The Domain Name System Security Extensions (DNSSEC) is a feature of the Domain Name System (DNS) that authenticates responses to domain name lookups | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.14091 |
debian: CVE-2023-50868 was patched at 2024-02-14, 2024-02-18, unknown date
ubuntu: CVE-2023-50868 was patched at 2024-02-13, 2024-02-19
140. Unknown Vulnerability Type - Santuario XML Security for Java (CVE-2023-44483) - Medium [214]
Description: {'nvd_cve_data_all': 'All versions of Apache Santuario - XML Security for Java prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API, are vulnerable to an issue where a private key may be disclosed in log files when generating an XML Signature and logging with debug level is enabled.\xa0Users are recommended to upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this issue. ', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'All versions of Apache Santuario - XML Security for Java prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API, are vulnerable to an issue where a private key may be disclosed in log files when generating an XML Signature and logging with debug level is enabled.\xa0Users are recommended to upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this issue.\n', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:apache:santuario_xml_security_for_java (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.0009, EPSS Percentile is 0.3711 |
debian: CVE-2023-44483 was patched at unknown date
redhat: CVE-2023-44483 was patched at 2024-02-07, 2024-02-13
141. Unknown Vulnerability Type - Mozilla Firefox (CVE-2024-0742) - Medium [204]
Description: {'nvd_cve_data_all': 'It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.18964 |
debian: CVE-2024-0742 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0742 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0742 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0742 was patched at 2024-01-30
ubuntu: CVE-2024-0742 was patched at 2024-01-29
142. Unknown Vulnerability Type - postgresql (CVE-2024-0985) - Medium [202]
Description: {'nvd_cve_data_all': 'Late privilege drop in REFRESH MATERIALIZED VIEW CONCURRENTLY in PostgreSQL allows an object creator to execute arbitrary SQL functions as the command issuer. The command intends to run SQL functions as the owner of the materialized view, enabling safe refresh of untrusted materialized views. The victim is a superuser or member of one of the attacker's roles. The attack requires luring the victim into running REFRESH MATERIALIZED VIEW CONCURRENTLY on the attacker's materialized view. As part of exploiting this vulnerability, the attacker creates functions that use CREATE RULE to convert the internally-built temporary table to a view. Versions before PostgreSQL 15.6, 14.11, 13.14, and 12.18 are affected. The only known exploit does not work in PostgreSQL 16 and later. For defense in depth, PostgreSQL 16.2 adds the protections that older branches are using to fix their vulnerability.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Late privilege drop in REFRESH MATERIALIZED VIEW CONCURRENTLY in PostgreSQL allows an object creator to execute arbitrary SQL functions as the command issuer. The command intends to run SQL functions as the owner of the materialized view, enabling safe refresh of untrusted materialized views. The victim is a superuser or member of one of the attacker's roles. The attack requires luring the victim into running REFRESH MATERIALIZED VIEW CONCURRENTLY on the attacker's materialized view. As part of exploiting this vulnerability, the attacker creates functions that use CREATE RULE to convert the internally-built temporary table to a view. Versions before PostgreSQL 15.6, 14.11, 13.14, and 12.18 are affected. The only known exploit does not work in PostgreSQL 16 and later. For defense in depth, PostgreSQL 16.2 adds the protections that older branches are using to fix their vulnerability.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:postgresql:postgresql (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.0. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16429 |
debian: CVE-2024-0985 was patched at 2024-02-14, unknown date
143. Unknown Vulnerability Type - Mozilla Firefox (CVE-2024-0748) - Low [192]
Description: {'nvd_cve_data_all': 'A compromised content process could have updated the document URI. This could have allowed an attacker to set an arbitrary URI in the address bar or history. This vulnerability affects Firefox < 122.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A compromised content process could have updated the document URI. This could have allowed an attacker to set an arbitrary URI in the address bar or history. This vulnerability affects Firefox < 122.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.14028 |
ubuntu: CVE-2024-0748 was patched at 2024-01-29
144. Unknown Vulnerability Type - glacne_store (CVE-2024-1141) - Low [166]
Description: {'nvd_cve_data_all': 'A vulnerability was found in python-glance-store. The issue occurs when the package logs the access_key for the glance-store when the DEBUG log level is enabled.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A vulnerability was found in python-glance-store. The issue occurs when the package logs the access_key for the glance-store when the DEBUG log level is enabled.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:openstack:glacne_store (does NOT exist in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06997 |
debian: CVE-2024-1141 was patched at unknown date
ubuntu: CVE-2024-1141 was patched at 2024-02-12
145. Unknown Vulnerability Type - Oracle MySQL (CVE-2023-22113) - Low [164]
Description: {'nvd_cve_data_all': 'Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.7 | 14 | MySQL is an open-source relational database management system | |
0.3 | 10 | CVSS Base Score is 2.7. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.11983 |
redhat: CVE-2023-22113 was patched at 2024-02-20
146. Unknown Vulnerability Type - OpenJ9 (CVE-2023-5676) - Low [142]
Description: {'nvd_cve_data_all': 'In Eclipse OpenJ9 before version 0.41.0, the JVM can be forced into an infinite busy hang on a spinlock or a segmentation fault if a shutdown signal (SIGTERM, SIGINT or SIGHUP) is received before the JVM has finished initializing. ', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In Eclipse OpenJ9 before version 0.41.0, the JVM can be forced into an infinite busy hang on a spinlock or a segmentation fault if a shutdown signal (SIGTERM, SIGINT or SIGHUP) is received before the JVM has finished initializing.\n', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:eclipse:openj9 (exists in CPE dict) | |
0.4 | 10 | CVSS Base Score is 4.1. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10995 |
redhat: CVE-2023-5676 was patched at 2024-02-19, 2024-02-20
147. Unknown Vulnerability Type - Unknown Product (CVE-2023-6237) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-6237 was patched at unknown date
ubuntu: CVE-2023-6237 was patched at 2024-02-05
148. Unknown Vulnerability Type - Unknown Product (CVE-2023-6484) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
redhat: CVE-2023-6484 was patched at 2024-02-13
149. Unknown Vulnerability Type - Unknown Product (CVE-2024-0444) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2024-0444 was patched at 2024-01-27, unknown date
debian: CVE-2023-6246 was patched at 2024-01-30, unknown date
ubuntu: CVE-2023-6246 was patched at 2024-02-01
debian: CVE-2021-35937 was patched at unknown date
debian: CVE-2021-35938 was patched at unknown date
debian: CVE-2021-35939 was patched at unknown date
redhat: CVE-2021-35937 was patched at 2024-01-25, 2024-01-30, 2024-02-01
redhat: CVE-2021-35938 was patched at 2024-01-25, 2024-01-30, 2024-02-01
redhat: CVE-2021-35939 was patched at 2024-01-25, 2024-01-30, 2024-02-01
oraclelinux: CVE-2021-35937 was patched at 2024-01-25, 2024-02-02
oraclelinux: CVE-2021-35938 was patched at 2024-01-25, 2024-02-02
oraclelinux: CVE-2021-35939 was patched at 2024-01-25, 2024-02-02
almalinux: CVE-2021-35937 was patched at 2024-01-25, 2024-02-01
almalinux: CVE-2021-35938 was patched at 2024-01-25, 2024-02-01
almalinux: CVE-2021-35939 was patched at 2024-01-25, 2024-02-01
debian: CVE-2022-45063 was patched at unknown date
redos: CVE-2022-45063 was patched at 2024-02-01
debian: CVE-2023-52138 was patched at 2024-02-16, unknown date
debian: CVE-2024-21626 was patched at 2024-02-04, unknown date
redhat: CVE-2024-21626 was patched at 2024-02-02, 2024-02-07, 2024-02-08
oraclelinux: CVE-2024-21626 was patched at 2024-02-05, 2024-02-09, 2024-02-14
almalinux: CVE-2024-21626 was patched at 2024-02-02, 2024-02-08
ubuntu: CVE-2024-21626 was patched at 2024-01-31
debian: CVE-2024-0553 was patched at unknown date
redhat: CVE-2024-0553 was patched at 2024-01-29, 2024-01-31, 2024-02-13
oraclelinux: CVE-2024-0553 was patched at 2024-01-30, 2024-02-02, 2024-02-05
almalinux: CVE-2024-0553 was patched at 2024-01-29, 2024-01-31
ubuntu: CVE-2024-0553 was patched at 2024-01-22
debian: CVE-2023-42465 was patched at unknown date
redhat: CVE-2023-42465 was patched at 2024-02-14
oraclelinux: CVE-2023-42465 was patched at 2024-02-14
almalinux: CVE-2023-42465 was patched at 2024-02-14
debian: CVE-2023-51698 was patched at unknown date
redos: CVE-2023-51698 was patched at 2024-01-23
debian: CVE-2023-6779 was patched at 2024-01-30, unknown date
ubuntu: CVE-2023-6779 was patched at 2024-02-01
debian: CVE-2023-50387 was patched at 2024-02-14, 2024-02-18, unknown date
ubuntu: CVE-2023-50387 was patched at 2024-02-13, 2024-02-19
debian: CVE-2023-6610 was patched at unknown date
redhat: CVE-2023-6610 was patched at 2024-02-07, 2024-02-20
debian: CVE-2023-6277 was patched at unknown date
ubuntu: CVE-2023-6277 was patched at 2024-02-19
debian: CVE-2023-50447 was patched at unknown date
redhat: CVE-2023-50447 was patched at 2024-02-08, 2024-02-19, 2024-02-20
oraclelinux: CVE-2023-50447 was patched at 2024-02-18, 2024-02-20
ubuntu: CVE-2023-50447 was patched at 2024-01-30
debian: CVE-2024-0567 was patched at unknown date
redhat: CVE-2024-0567 was patched at 2024-01-29
oraclelinux: CVE-2024-0567 was patched at 2024-01-30
almalinux: CVE-2024-0567 was patched at 2024-01-29
ubuntu: CVE-2024-0567 was patched at 2024-01-22
debian: CVE-2023-51764 was patched at unknown date
ubuntu: CVE-2023-51764 was patched at 2024-01-22, 2024-01-31
debian: CVE-2023-6780 was patched at 2024-01-30, unknown date
ubuntu: CVE-2023-6780 was patched at 2024-02-01
debian: CVE-2023-42282 was patched at unknown date
ubuntu: CVE-2023-42282 was patched at 2024-02-19
debian: CVE-2021-41043 was patched at unknown date
redhat: CVE-2021-41043 was patched at 2024-01-25, 2024-01-30, 2024-02-12
oraclelinux: CVE-2021-41043 was patched at 2024-02-13
almalinux: CVE-2021-41043 was patched at 2024-02-12
debian: CVE-2024-23213 was patched at 2024-02-08, unknown date
ubuntu: CVE-2024-23213 was patched at 2024-02-12
debian: CVE-2023-41056 was patched at 2024-01-29, unknown date
debian: CVE-2021-34866 was patched at unknown date
redhat: CVE-2021-34866 was patched at 2024-02-07
debian: CVE-2024-24577 was patched at 2024-02-09, unknown date
debian: CVE-2023-4759 was patched at unknown date
redhat: CVE-2023-4759 was patched at 2024-02-07
debian: CVE-2023-49937 was patched at 2024-01-28, unknown date
debian: CVE-2024-0749 was patched at 2024-01-24, unknown date
debian: CVE-2024-0750 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0749 was patched at 2024-01-30, 2024-01-31
redhat: CVE-2024-0750 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0749 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0750 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0749 was patched at 2024-01-30
almalinux: CVE-2024-0750 was patched at 2024-01-30
ubuntu: CVE-2024-0749 was patched at 2024-01-29
ubuntu: CVE-2024-0750 was patched at 2024-01-29
debian: CVE-2024-0804 was patched at 2024-01-24, unknown date
debian: CVE-2024-0809 was patched at 2024-01-24, unknown date
debian: CVE-2024-0810 was patched at 2024-01-24, unknown date
debian: CVE-2024-0811 was patched at 2024-01-24, unknown date
debian: CVE-2024-0814 was patched at 2024-01-24, unknown date
debian: CVE-2023-48733 was patched at 2024-02-14, unknown date
ubuntu: CVE-2023-48733 was patched at 2024-02-15
debian: CVE-2023-49933 was patched at 2024-01-28, unknown date
debian: CVE-2023-49938 was patched at 2024-01-28, unknown date
debian: CVE-2024-0751 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0751 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0751 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0751 was patched at 2024-01-30
ubuntu: CVE-2024-0751 was patched at 2024-01-29
debian: CVE-2024-0193 was patched at unknown date
debian: CVE-2024-0646 was patched at unknown date
redhat: CVE-2024-0646 was patched at 2024-02-07, 2024-02-15, 2024-02-20
ubuntu: CVE-2023-5972 was patched at 2024-02-07
ubuntu: CVE-2024-0193 was patched at 2024-01-25, 2024-01-26, 2024-01-30, 2024-02-06, 2024-02-09, 2024-02-14, 2024-02-15
ubuntu: CVE-2024-0646 was patched at 2024-02-15
debian: CVE-2023-1838 was patched at unknown date
debian: CVE-2023-6356 was patched at unknown date
debian: CVE-2023-6535 was patched at unknown date
debian: CVE-2023-6536 was patched at unknown date
debian: CVE-2023-7192 was patched at unknown date
debian: CVE-2024-0565 was patched at unknown date
debian: CVE-2024-0607 was patched at unknown date
debian: CVE-2024-0641 was patched at unknown date
redhat: CVE-2023-1838 was patched at 2024-01-25, 2024-01-30, 2024-02-20
redhat: CVE-2023-6356 was patched at 2024-02-07, 2024-02-20
redhat: CVE-2023-6535 was patched at 2024-02-07, 2024-02-20
redhat: CVE-2023-6536 was patched at 2024-02-07, 2024-02-20
redhat: CVE-2023-6679 was patched at 2024-01-25
redhat: CVE-2023-7192 was patched at 2024-02-07
oraclelinux: CVE-2023-6679 was patched at 2024-02-09
ubuntu: CVE-2023-7192 was patched at 2024-02-20, 2024-02-21
ubuntu: CVE-2024-0565 was patched at 2024-02-15
ubuntu: CVE-2024-0607 was patched at 2024-02-15
ubuntu: CVE-2024-0641 was patched at 2024-02-07, 2024-02-08, 2024-02-09, 2024-02-14, 2024-02-15
debian: CVE-2024-0741 was patched at 2024-01-24, unknown date
debian: CVE-2024-0743 was patched at unknown date
debian: CVE-2024-0746 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0741 was patched at 2024-01-30, 2024-01-31
redhat: CVE-2024-0746 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0741 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0746 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0741 was patched at 2024-01-30
almalinux: CVE-2024-0746 was patched at 2024-01-30
ubuntu: CVE-2024-0741 was patched at 2024-01-29
ubuntu: CVE-2024-0743 was patched at 2024-01-29
ubuntu: CVE-2024-0745 was patched at 2024-01-29
ubuntu: CVE-2024-0746 was patched at 2024-01-29
debian: CVE-2023-6129 was patched at unknown date
debian: CVE-2024-0727 was patched at unknown date
ubuntu: CVE-2023-6129 was patched at 2024-02-05
ubuntu: CVE-2024-0727 was patched at 2024-02-05, 2024-02-13
debian: CVE-2023-7090 was patched at unknown date
redos: CVE-2023-7090 was patched at 2024-02-08
debian: CVE-2023-4408 was patched at 2024-02-14, unknown date
debian: CVE-2023-5679 was patched at 2024-02-14, unknown date
ubuntu: CVE-2023-4408 was patched at 2024-02-13, 2024-02-19
ubuntu: CVE-2023-5679 was patched at 2024-02-13
debian: CVE-2023-52356 was patched at unknown date
debian: CVE-2023-6228 was patched at unknown date
ubuntu: CVE-2023-52356 was patched at 2024-02-19
ubuntu: CVE-2023-6228 was patched at 2024-02-19
redhat: CVE-2024-21386 was patched at 2024-02-13, 2024-02-14, 2024-02-15
redhat: CVE-2024-21404 was patched at 2024-02-13, 2024-02-14, 2024-02-15
oraclelinux: CVE-2024-21386 was patched at 2024-02-15, 2024-02-16, 2024-02-21
oraclelinux: CVE-2024-21404 was patched at 2024-02-15, 2024-02-16, 2024-02-21
almalinux: CVE-2024-21386 was patched at 2024-02-13, 2024-02-15
almalinux: CVE-2024-21404 was patched at 2024-02-13, 2024-02-15
ubuntu: CVE-2024-21386 was patched at 2024-02-13
ubuntu: CVE-2024-21404 was patched at 2024-02-13
debian: CVE-2023-45232 was patched at unknown date
debian: CVE-2023-45233 was patched at unknown date
ubuntu: CVE-2023-45232 was patched at 2024-02-15
ubuntu: CVE-2023-45233 was patched at 2024-02-15
debian: CVE-2024-20290 was patched at unknown date
ubuntu: CVE-2024-20290 was patched at 2024-02-14
debian: CVE-2022-4899 was patched at unknown date
redhat: CVE-2022-4899 was patched at 2024-02-20
redhat: CVE-2023-22007 was patched at 2024-02-20
redhat: CVE-2023-22065 was patched at 2024-02-20
redhat: CVE-2023-22104 was patched at 2024-02-20
redhat: CVE-2023-22110 was patched at 2024-02-20
redhat: CVE-2023-22111 was patched at 2024-02-20
redhat: CVE-2023-22115 was patched at 2024-02-20
redhat: CVE-2024-20960 was patched at 2024-02-20
redhat: CVE-2024-20961 was patched at 2024-02-20
redhat: CVE-2024-20962 was patched at 2024-02-20
redhat: CVE-2024-20963 was patched at 2024-02-20
redhat: CVE-2024-20964 was patched at 2024-02-20
redhat: CVE-2024-20965 was patched at 2024-02-20
redhat: CVE-2024-20966 was patched at 2024-02-20
redhat: CVE-2024-20967 was patched at 2024-02-20
redhat: CVE-2024-20968 was patched at 2024-02-20
redhat: CVE-2024-20969 was patched at 2024-02-20
redhat: CVE-2024-20970 was patched at 2024-02-20
redhat: CVE-2024-20971 was patched at 2024-02-20
redhat: CVE-2024-20972 was patched at 2024-02-20
redhat: CVE-2024-20973 was patched at 2024-02-20
redhat: CVE-2024-20974 was patched at 2024-02-20
redhat: CVE-2024-20976 was patched at 2024-02-20
redhat: CVE-2024-20977 was patched at 2024-02-20
redhat: CVE-2024-20978 was patched at 2024-02-20
redhat: CVE-2024-20981 was patched at 2024-02-20
redhat: CVE-2024-20982 was patched at 2024-02-20
redhat: CVE-2024-20983 was patched at 2024-02-20
redhat: CVE-2024-20984 was patched at 2024-02-20
redhat: CVE-2024-20985 was patched at 2024-02-20
ubuntu: CVE-2024-20960 was patched at 2024-01-30
ubuntu: CVE-2024-20961 was patched at 2024-01-30
ubuntu: CVE-2024-20962 was patched at 2024-01-30
ubuntu: CVE-2024-20963 was patched at 2024-01-30
ubuntu: CVE-2024-20964 was patched at 2024-01-30
ubuntu: CVE-2024-20965 was patched at 2024-01-30
ubuntu: CVE-2024-20966 was patched at 2024-01-30
ubuntu: CVE-2024-20967 was patched at 2024-01-30
ubuntu: CVE-2024-20969 was patched at 2024-01-30
ubuntu: CVE-2024-20970 was patched at 2024-01-30
ubuntu: CVE-2024-20971 was patched at 2024-01-30
ubuntu: CVE-2024-20972 was patched at 2024-01-30
ubuntu: CVE-2024-20973 was patched at 2024-01-30
ubuntu: CVE-2024-20974 was patched at 2024-01-30
ubuntu: CVE-2024-20976 was patched at 2024-01-30
ubuntu: CVE-2024-20977 was patched at 2024-01-30
ubuntu: CVE-2024-20978 was patched at 2024-01-30
ubuntu: CVE-2024-20981 was patched at 2024-01-30
ubuntu: CVE-2024-20982 was patched at 2024-01-30
ubuntu: CVE-2024-20983 was patched at 2024-01-30
ubuntu: CVE-2024-20984 was patched at 2024-01-30
ubuntu: CVE-2024-20985 was patched at 2024-01-30
debian: CVE-2023-44271 was patched at unknown date
redhat: CVE-2023-44271 was patched at 2024-01-23
oraclelinux: CVE-2023-44271 was patched at 2024-01-23
ubuntu: CVE-2023-44271 was patched at 2024-01-30
debian: CVE-2023-49936 was patched at 2024-01-28, unknown date
debian: CVE-2024-24680 was patched at unknown date
ubuntu: CVE-2024-24680 was patched at 2024-02-06
debian: CVE-2023-2166 was patched at unknown date
redhat: CVE-2023-2166 was patched at 2024-01-25, 2024-02-07, 2024-02-20
oraclelinux: CVE-2023-2166 was patched at 2024-01-26
debian: CVE-2023-50868 was patched at 2024-02-14, 2024-02-18, unknown date
ubuntu: CVE-2023-50868 was patched at 2024-02-13, 2024-02-19
debian: CVE-2024-23206 was patched at 2024-02-08, unknown date
ubuntu: CVE-2024-23206 was patched at 2024-02-12
debian: CVE-2023-45287 was patched at unknown date
redhat: CVE-2023-45287 was patched at 2024-02-08
oraclelinux: CVE-2023-45287 was patched at 2024-02-14
almalinux: CVE-2023-45287 was patched at 2024-02-08
debian: CVE-2023-52323 was patched at unknown date
ubuntu: CVE-2023-52323 was patched at 2024-01-23
debian: CVE-2024-0808 was patched at 2024-01-24, unknown date
debian: CVE-2024-0806 was patched at 2024-01-24, unknown date
debian: CVE-2024-0807 was patched at 2024-01-24, unknown date
debian: CVE-2024-0813 was patched at 2024-01-24, unknown date
debian: CVE-2024-1059 was patched at 2024-02-01, unknown date
debian: CVE-2024-1060 was patched at 2024-02-01, unknown date
debian: CVE-2024-1077 was patched at 2024-02-01, unknown date
debian: CVE-2024-1283 was patched at 2024-02-08, unknown date
debian: CVE-2024-1284 was patched at 2024-02-08, unknown date
debian: CVE-2024-0755 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0755 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0755 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0755 was patched at 2024-01-30
ubuntu: CVE-2024-0744 was patched at 2024-01-29
ubuntu: CVE-2024-0755 was patched at 2024-01-29
debian: CVE-2023-46343 was patched at unknown date
debian: CVE-2024-0562 was patched at unknown date
debian: CVE-2024-22705 was patched at unknown date
redhat: CVE-2024-0562 was patched at 2024-01-25
ubuntu: CVE-2023-46343 was patched at 2024-02-07, 2024-02-08, 2024-02-20
ubuntu: CVE-2024-22705 was patched at 2024-02-15
debian: CVE-2023-40359 was patched at unknown date
redos: CVE-2023-40359 was patched at 2024-02-01
debian: CVE-2023-20592 was patched at unknown date
redhat: CVE-2023-20592 was patched at 2024-02-09
debian: CVE-2022-36763 was patched at unknown date
debian: CVE-2022-36764 was patched at unknown date
debian: CVE-2022-36765 was patched at unknown date
debian: CVE-2023-45230 was patched at unknown date
debian: CVE-2023-45231 was patched at unknown date
debian: CVE-2023-45234 was patched at unknown date
debian: CVE-2023-45235 was patched at unknown date
ubuntu: CVE-2022-36763 was patched at 2024-02-15
ubuntu: CVE-2022-36764 was patched at 2024-02-15
ubuntu: CVE-2022-36765 was patched at 2024-02-15
ubuntu: CVE-2023-45230 was patched at 2024-02-15
ubuntu: CVE-2023-45231 was patched at 2024-02-15
ubuntu: CVE-2023-45234 was patched at 2024-02-15
ubuntu: CVE-2023-45235 was patched at 2024-02-15
debian: CVE-2023-6040 was patched at unknown date
ubuntu: CVE-2023-6040 was patched at 2024-01-25, 2024-01-26, 2024-01-29, 2024-01-30, 2024-02-06, 2024-02-07, 2024-02-09, 2024-02-15
debian: CVE-2023-5341 was patched at unknown date
ubuntu: CVE-2023-5341 was patched at 2024-02-01
redhat: CVE-2023-4001 was patched at 2024-01-25
oraclelinux: CVE-2023-4001 was patched at 2024-01-25
almalinux: CVE-2023-4001 was patched at 2024-01-25
debian: CVE-2024-21647 was patched at unknown date
ubuntu: CVE-2024-21647 was patched at 2024-01-25
debian: CVE-2024-20328 was patched at unknown date
ubuntu: CVE-2024-20328 was patched at 2024-02-14
debian: CVE-2024-22195 was patched at unknown date
ubuntu: CVE-2024-22195 was patched at 2024-01-25
debian: CVE-2024-0805 was patched at 2024-01-24, unknown date
debian: CVE-2024-0812 was patched at 2024-01-24, unknown date
debian: CVE-2023-5517 was patched at 2024-02-14, unknown date
debian: CVE-2023-6516 was patched at unknown date
ubuntu: CVE-2023-5517 was patched at 2024-02-13, 2024-02-19
ubuntu: CVE-2023-6516 was patched at 2024-02-19
debian: CVE-2024-0742 was patched at 2024-01-24, unknown date
debian: CVE-2024-0747 was patched at 2024-01-24, unknown date
debian: CVE-2024-0753 was patched at 2024-01-24, unknown date
redhat: CVE-2024-0742 was patched at 2024-01-30, 2024-01-31
redhat: CVE-2024-0747 was patched at 2024-01-30, 2024-01-31
redhat: CVE-2024-0753 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0742 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0747 was patched at 2024-01-30, 2024-01-31
oraclelinux: CVE-2024-0753 was patched at 2024-01-30, 2024-01-31
almalinux: CVE-2024-0742 was patched at 2024-01-30
almalinux: CVE-2024-0747 was patched at 2024-01-30
almalinux: CVE-2024-0753 was patched at 2024-01-30
ubuntu: CVE-2024-0742 was patched at 2024-01-29
ubuntu: CVE-2024-0747 was patched at 2024-01-29
ubuntu: CVE-2024-0748 was patched at 2024-01-29
ubuntu: CVE-2024-0753 was patched at 2024-01-29
ubuntu: CVE-2024-0754 was patched at 2024-01-29
debian: CVE-2023-44483 was patched at unknown date
redhat: CVE-2023-44483 was patched at 2024-02-07, 2024-02-13
debian: CVE-2024-0985 was patched at 2024-02-14, unknown date
debian: CVE-2024-1141 was patched at unknown date
ubuntu: CVE-2024-1141 was patched at 2024-02-12
redhat: CVE-2023-22113 was patched at 2024-02-20
redhat: CVE-2023-5676 was patched at 2024-02-19, 2024-02-20
debian: CVE-2023-6237 was patched at unknown date
debian: CVE-2024-0444 was patched at 2024-01-27, unknown date
redhat: CVE-2023-6484 was patched at 2024-02-13
ubuntu: CVE-2023-6237 was patched at 2024-02-05