Report Name: Linux Patch Wednesday January 2024Generated: 2024-01-30 03:03:48
Product Name | Prevalence | U | C | H | M | L | A | Comment |
---|---|---|---|---|---|---|---|---|
Linux Kernel | 0.9 | 5 | 9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |||
Sudo | 0.9 | 1 | 1 | Sudo is a program for Unix-like computer operating systems that allows users to run programs with the security privileges of another user | ||||
Chromium | 0.8 | 5 | 5 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | ||||
Mozilla Firefox | 0.8 | 1 | 4 | 5 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |||
OpenSSH | 0.8 | 1 | 1 | 2 | OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture | |||
Apache Tomcat | 0.7 | 1 | 1 | 2 | Apache Tomcat is a free and open-source implementation of the Jakarta Servlet, Jakarta Expression Language, and WebSocket technologies | |||
QEMU | 0.7 | 2 | 4 | 6 | QEMU is a generic and open source machine & userspace emulator and virtualizer | |||
SQLite | 0.7 | 2 | 2 | SQLite is a database engine written in the C programming language | ||||
Exim | 0.6 | 1 | 1 | Exim is a mail transfer agent (MTA) used on Unix-like operating systems | ||||
Python | 0.6 | 1 | 1 | Python is a high-level, general-purpose programming language | ||||
.NET | 0.5 | 1 | 1 | Product detected by a:microsoft:.net (exists in CPE dict) | ||||
Asterisk | 0.5 | 1 | 2 | 3 | Product detected by a:digium:asterisk (exists in CPE dict) | |||
Go | 0.5 | 1 | 1 | 2 | Product detected by a:golang:go (exists in CPE dict) | |||
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider | 0.5 | 1 | 1 | Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider | ||||
Monit | 0.5 | 1 | 1 | Product detected by a:tildeslash:monit (exists in CPE dict) | ||||
NET, .NET Framework, and Visual Studio | 0.5 | 1 | 1 | NET, .NET Framework, and Visual Studio | ||||
Osslsigncode | 0.5 | 1 | 1 | Product detected by a:osslsigncode_project:osslsigncode (exists in CPE dict) | ||||
PJSIP | 0.5 | 1 | 1 | Product detected by a:teluu:pjsip (exists in CPE dict) | ||||
Psr-7 | 0.5 | 1 | 1 | Product detected by a:guzzlephp:psr-7 (exists in CPE dict) | ||||
Squid | 0.5 | 2 | 1 | 3 | Product detected by a:squid-cache:squid (exists in CPE dict) | |||
TinyXML | 0.5 | 1 | 1 | Product detected by a:tinyxml_project:tinyxml (exists in CPE dict) | ||||
Werkzeug | 0.5 | 1 | 1 | Werkzeug is a comprehensive WSGI web application library | ||||
Xorg-server | 0.5 | 1 | 1 | Product detected by a:x.org:xorg-server (exists in CPE dict) | ||||
ansible | 0.5 | 1 | 1 | Product detected by a:redhat:ansible (exists in CPE dict) | ||||
ansible_automation_platform | 0.5 | 1 | 1 | Product detected by a:redhat:ansible_automation_platform (exists in CPE dict) | ||||
cJSON | 0.5 | 1 | 1 | Product detected by a:cjson_project:cjson (exists in CPE dict) | ||||
drupal | 0.5 | 1 | 1 | Product detected by a:drupal:drupal (exists in CPE dict) | ||||
es450 | 0.5 | 1 | 1 | Product detected by h:sierrawireless:es450 (exists in CPE dict) | ||||
freeipa | 0.5 | 1 | 1 | Product detected by a:freeipa:freeipa (exists in CPE dict) | ||||
keycloak | 0.5 | 1 | 1 | Product detected by a:redhat:keycloak (exists in CPE dict) | ||||
libde265 | 0.5 | 3 | 3 | Product detected by a:struktur:libde265 (exists in CPE dict) | ||||
libssh | 0.5 | 1 | 1 | 2 | Product detected by a:libssh:libssh (exists in CPE dict) | |||
openshift_container_platform_for_arm64 | 0.5 | 1 | 1 | Product detected by a:redhat:openshift_container_platform_for_arm64 (exists in CPE dict) | ||||
spreadsheet::parseexcel | 0.5 | 1 | 1 | Product detected by a:jmcnamara:spreadsheet | ||||
twisted | 0.5 | 1 | 1 | Product detected by a:twistedmatrix:twisted (exists in CPE dict) | ||||
w3m | 0.5 | 1 | 1 | Product detected by a:tats:w3m (does NOT exist in CPE dict) | ||||
xerces-c\\+\\+ | 0.5 | 1 | 1 | Product detected by a:apache:xerces-c\\+\\+ (does NOT exist in CPE dict) | ||||
Unknown Product | 0 | 7 | 7 | Unknown Product |
Vulnerability Type | Criticality | U | C | H | M | L | A |
---|---|---|---|---|---|---|---|
Remote Code Execution | 1.0 | 1 | 1 | 2 | |||
Code Injection | 0.97 | 1 | 1 | ||||
Command Injection | 0.97 | 1 | 1 | ||||
Authentication Bypass | 0.95 | 1 | 1 | ||||
Security Feature Bypass | 0.9 | 6 | 4 | 10 | |||
Elevation of Privilege | 0.85 | 4 | 4 | ||||
Information Disclosure | 0.83 | 1 | 1 | ||||
Open Redirect | 0.75 | 1 | 1 | ||||
Denial of Service | 0.7 | 4 | 9 | 13 | |||
Path Traversal | 0.7 | 2 | 2 | ||||
Incorrect Calculation | 0.5 | 1 | 3 | 4 | |||
Memory Corruption | 0.5 | 7 | 14 | 1 | 22 | ||
Unknown Vulnerability Type | 0 | 2 | 7 | 10 | 19 |
Source | U | C | H | M | L | A |
---|---|---|---|---|---|---|
debian | 1 | 20 | 38 | 9 | 68 | |
ubuntu | 16 | 17 | 9 | 42 | ||
redhat | 9 | 8 | 8 | 25 | ||
oraclelinux | 6 | 4 | 7 | 17 | ||
almalinux | 6 | 3 | 2 | 11 |
1. Remote Code Execution - spreadsheet::parseexcel (CVE-2023-7101) - Critical [678]
Description: Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV websites | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:jmcnamara:spreadsheet | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.9 | 10 | EPSS Probability is 0.02119, EPSS Percentile is 0.88039 |
debian: CVE-2023-7101 was patched at 2023-12-30, 2023-12-31, unknown date
2. Denial of Service - Asterisk (CVE-2023-49786) - High [589]
Description: Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:digium:asterisk (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00513, EPSS Percentile is 0.74185 |
debian: CVE-2023-49786 was patched at 2023-12-29, 2024-01-04, unknown date
3. Security Feature Bypass - Python (CVE-2023-27043) - High [570]
Description: The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.9 | 15 | Security Feature Bypass | |
0.6 | 14 | Python is a high-level, general-purpose programming language | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00095, EPSS Percentile is 0.39718 |
debian: CVE-2023-27043 was patched at unknown date
redhat: CVE-2023-27043 was patched at 2024-01-15, 2024-01-25
oraclelinux: CVE-2023-27043 was patched at 2024-01-16, 2024-01-25
almalinux: CVE-2023-27043 was patched at 2024-01-15, 2024-01-25
4. Memory Corruption - SQLite (CVE-2023-7104) - High [539]
Description: A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:sqlite.org website | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | SQLite is a database engine written in the C programming language | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00131, EPSS Percentile is 0.47912 |
debian: CVE-2023-7104 was patched at unknown date
ubuntu: CVE-2023-7104 was patched at 2024-01-03
redhat: CVE-2023-7104 was patched at 2024-01-15, 2024-01-25
oraclelinux: CVE-2023-7104 was patched at 2024-01-16, 2024-01-25
almalinux: CVE-2023-7104 was patched at 2024-01-15, 2024-01-25
5. Memory Corruption - Linux Kernel (CVE-2023-6606) - High [536]
Description: An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:bugzilla.redhat.com website | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-6606 was patched at 2024-01-11, unknown date
ubuntu: CVE-2023-6606 was patched at 2024-01-25, 2024-01-26
6. Memory Corruption - libde265 (CVE-2023-49465) - High [529]
Description: Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vulnerability in the derive_spatial_luma_vector_prediction function at motion.cc.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:struktur:libde265 (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00087, EPSS Percentile is 0.36563 |
debian: CVE-2023-49465 was patched at 2023-12-30, unknown date
7. Memory Corruption - libde265 (CVE-2023-49467) - High [529]
Description: Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vulnerability in the derive_combined_bipredictive_merging_candidates function at motion.cc.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:struktur:libde265 (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00087, EPSS Percentile is 0.36563 |
debian: CVE-2023-49467 was patched at 2023-12-30, unknown date
8. Memory Corruption - libde265 (CVE-2023-49468) - High [529]
Description: Libde265 v1.0.14 was discovered to contain a global buffer overflow vulnerability in the read_coding_unit function at slice.cc.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:struktur:libde265 (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00087, EPSS Percentile is 0.36563 |
debian: CVE-2023-49468 was patched at 2023-12-30, unknown date
9. Security Feature Bypass - twisted (CVE-2023-46137) - High [517]
Description: Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc1, when sending multiple HTTP requests in one TCP packet, twisted.web will process the requests asynchronously without guaranteeing the response order. If one of the endpoints is controlled by an attacker, the attacker can delay the response on purpose to manipulate the response of the second request when a victim launched two requests using HTTP pipeline. Version 23.10.0rc1 contains a patch for this issue.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:twistedmatrix:twisted (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.1372 |
debian: CVE-2023-46137 was patched at unknown date
ubuntu: CVE-2023-46137 was patched at 2024-01-10
10. Denial of Service - w3m (CVE-2023-4255) - High [494]
Description: An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:tats:w3m (does NOT exist in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.08097 |
debian: CVE-2023-4255 was patched at unknown date
ubuntu: CVE-2023-4255 was patched at 2024-01-15
11. Incorrect Calculation - QEMU (CVE-2023-42467) - High [491]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:gitlab.com website | |
0.5 | 15 | Incorrect Calculation | |
0.7 | 14 | QEMU is a generic and open source machine & userspace emulator and virtualizer | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-42467 was patched at unknown date
ubuntu: CVE-2023-42467 was patched at 2024-01-08
12. Memory Corruption - QEMU (CVE-2023-40360) - High [491]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:gitlab.com website | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | QEMU is a generic and open source machine & userspace emulator and virtualizer | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.08097 |
ubuntu: CVE-2023-40360 was patched at 2024-01-08
13. Memory Corruption - cJSON (CVE-2023-50471) - High [482]
Description: cJSON v1.7.16 was discovered to contain a segmentation violation via the function cJSON_InsertItemInArray at cJSON.c.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:cjson_project:cjson (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.1372 |
debian: CVE-2023-50471 was patched at 2023-12-30, unknown date
14. Command Injection - OpenSSH (CVE-2023-51385) - High [461]
Description: In ssh in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.97 | 15 | Command Injection | |
0.8 | 14 | OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00189, EPSS Percentile is 0.56474 |
debian: CVE-2023-51385 was patched at 2023-12-22, 2023-12-26, unknown date
ubuntu: CVE-2023-51385 was patched at 2024-01-03, 2024-01-11
redhat: CVE-2023-51385 was patched at 2024-01-25
15. Security Feature Bypass - Apache Tomcat (CVE-2023-46589) - High [455]
Description: Improper Input Validation vulnerability in Apache
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.7 | 14 | Apache Tomcat is a free and open-source implementation of the Jakarta Servlet, Jakarta Expression Language, and WebSocket technologies | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00484, EPSS Percentile is 0.73468 |
debian: CVE-2023-46589 was patched at 2024-01-05, unknown date
redhat: CVE-2023-46589 was patched at 2024-01-29
16. Unknown Vulnerability Type - Mozilla Firefox (CVE-2023-6872) - High [454]
Description: {'nvd_cve_data_all': 'Browser tab titles were being leaked by GNOME to system logs. This could potentially expose the browsing habits of users running in a private tab. This vulnerability affects Firefox < 121.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Browser tab titles were being leaked by GNOME to system logs. This could potentially expose the browsing habits of users running in a private tab. This vulnerability affects Firefox < 121.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:bugzilla.mozilla.org website | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00064, EPSS Percentile is 0.26465 |
ubuntu: CVE-2023-6872 was patched at 2024-01-02
17. Denial of Service - Squid (CVE-2023-49285) - High [422]
Description: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:squid-cache:squid (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.6. According to NVD data source | |
0.9 | 10 | EPSS Probability is 0.01466, EPSS Percentile is 0.85392 |
debian: CVE-2023-49285 was patched at 2024-01-09, unknown date
ubuntu: CVE-2023-49285 was patched at 2024-01-23
redhat: CVE-2023-49285 was patched at 2024-01-03, 2024-01-08, 2024-01-24
oraclelinux: CVE-2023-49285 was patched at 2024-01-04, 2024-01-10
almalinux: CVE-2023-49285 was patched at 2024-01-03, 2024-01-08
18. Denial of Service - Squid (CVE-2023-49286) - High [422]
Description: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerable to a Denial of Service attack against its Helper process management. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:squid-cache:squid (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.6. According to NVD data source | |
0.9 | 10 | EPSS Probability is 0.0194, EPSS Percentile is 0.87435 |
debian: CVE-2023-49286 was patched at 2024-01-09, unknown date
ubuntu: CVE-2023-49286 was patched at 2024-01-23
redhat: CVE-2023-49286 was patched at 2024-01-03, 2024-01-08, 2024-01-24
oraclelinux: CVE-2023-49286 was patched at 2024-01-04, 2024-01-10
almalinux: CVE-2023-49286 was patched at 2024-01-03, 2024-01-08
19. Security Feature Bypass - Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider (CVE-2024-0056) - High [422]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider | |
0.9 | 10 | CVSS Base Score is 8.7. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00197, EPSS Percentile is 0.57617 |
redhat: CVE-2024-0056 was patched at 2024-01-10, 2024-01-15
oraclelinux: CVE-2024-0056 was patched at 2024-01-12, 2024-01-16, 2024-01-17
almalinux: CVE-2024-0056 was patched at 2024-01-10
20. Security Feature Bypass - NET, .NET Framework, and Visual Studio (CVE-2024-0057) - High [422]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | NET, .NET Framework, and Visual Studio | |
0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00227, EPSS Percentile is 0.61026 |
ubuntu: CVE-2024-0057 was patched at 2024-01-11
redhat: CVE-2024-0057 was patched at 2024-01-10, 2024-01-15
oraclelinux: CVE-2024-0057 was patched at 2024-01-12, 2024-01-16, 2024-01-17
almalinux: CVE-2024-0057 was patched at 2024-01-10
21. Security Feature Bypass - Sudo (CVE-2022-38060) - High [417]
Description: A privilege escalation vulnerability exists in the sudo functionality of OpenStack Kolla git master 05194e7618. A misconfiguration in /etc/
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.9 | 14 | Sudo is a program for Unix-like computer operating systems that allows users to run programs with the security privileges of another user | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
redhat: CVE-2022-38060 was patched at 2024-01-16
22. Unknown Vulnerability Type - SQLite (CVE-2022-46908) - High [414]
Description: {'nvd_cve_data_all': 'SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:sqlite.org website | |
0 | 15 | Unknown Vulnerability Type | |
0.7 | 14 | SQLite is a database engine written in the C programming language | |
0.7 | 10 | CVSS Base Score is 7.3. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12067 |
debian: CVE-2022-46908 was patched at unknown date
ubuntu: CVE-2022-46908 was patched at 2024-01-03
23. Elevation of Privilege - Linux Kernel (CVE-2023-6111) - High [408]
Description: A use-after-free vulnerability in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-6111 was patched at unknown date
ubuntu: CVE-2023-6111 was patched at 2024-01-10
24. Elevation of Privilege - Linux Kernel (CVE-2023-6817) - High [408]
Description: A use-after-free vulnerability in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-6817 was patched at 2024-01-01, 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-6817 was patched at 2024-01-25, 2024-01-26
25. Elevation of Privilege - Linux Kernel (CVE-2023-6931) - High [408]
Description: A heap out-of-bounds write vulnerability in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-6931 was patched at 2024-01-01, 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-6931 was patched at 2024-01-25, 2024-01-26
26. Elevation of Privilege - Linux Kernel (CVE-2023-6932) - High [408]
Description: A use-after-free vulnerability in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-6932 was patched at 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-6932 was patched at 2024-01-25, 2024-01-26
27. Denial of Service - Squid (CVE-2023-50269) - Medium [398]
Description: Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:squid-cache:squid (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.6. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00454, EPSS Percentile is 0.72597 |
debian: CVE-2023-50269 was patched at 2024-01-09, unknown date
ubuntu: CVE-2023-50269 was patched at 2024-01-23
redhat: CVE-2023-50269 was patched at 2024-01-24
28. Security Feature Bypass - drupal (CVE-2022-24775) - Medium [386]
Description: guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:drupal:drupal (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00095, EPSS Percentile is 0.39651 |
debian: CVE-2022-24775 was patched at 2024-01-01, unknown date
29. Security Feature Bypass - Exim (CVE-2023-51766) - Medium [379]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.6 | 14 | Exim is a mail transfer agent (MTA) used on Unix-like operating systems | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00181, EPSS Percentile is 0.55472 |
debian: CVE-2023-51766 was patched at 2024-01-04, 2024-01-06, unknown date
ubuntu: CVE-2023-51766 was patched at 2024-01-29
30. Memory Corruption - Chromium (CVE-2024-0225) - Medium [377]
Description: Use after free in WebGPU in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00085, EPSS Percentile is 0.3541 |
debian: CVE-2024-0225 was patched at 2024-01-04, unknown date
31. Security Feature Bypass - Chromium (CVE-2024-0333) - Medium [377]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.19394 |
debian: CVE-2024-0333 was patched at 2024-01-10, unknown date
32. Security Feature Bypass - freeipa (CVE-2023-5455) - Medium [375]
Description: A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:freeipa:freeipa (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00084, EPSS Percentile is 0.35112 |
debian: CVE-2023-5455 was patched at unknown date
redhat: CVE-2023-5455 was patched at 2024-01-10, 2024-01-15
oraclelinux: CVE-2023-5455 was patched at 2024-01-10, 2024-01-11, 2024-01-12
almalinux: CVE-2023-5455 was patched at 2024-01-10
33. Authentication Bypass - QEMU (CVE-2023-2861) - Medium [369]
Description: A flaw was found in the 9p passthrough filesystem (9pfs) implementation in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.95 | 15 | Authentication Bypass | |
0.7 | 14 | QEMU is a generic and open source machine & userspace emulator and virtualizer | |
0.6 | 10 | CVSS Base Score is 6.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-2861 was patched at unknown date
ubuntu: CVE-2023-2861 was patched at 2024-01-08
34. Remote Code Execution - Osslsigncode (CVE-2023-36377) - Medium [369]
Description: Buffer Overflow vulnerability in mtrojnar osslsigncode v.2.3 and before allows a local attacker to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:osslsigncode_project:osslsigncode (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-36377 was patched at 2023-12-23, unknown date
35. Incorrect Calculation - Mozilla Firefox (CVE-2023-6866) - Medium [365]
Description: TypedArrays can be fallible and lacked proper exception handling. This could lead to abuse in other APIs which expect TypedArrays to always succeed. This vulnerability affects
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00068, EPSS Percentile is 0.28196 |
ubuntu: CVE-2023-6866 was patched at 2024-01-02
36. Memory Corruption - Chromium (CVE-2024-0222) - Medium [365]
Description: Use after free in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00082, EPSS Percentile is 0.33926 |
debian: CVE-2024-0222 was patched at 2024-01-04, unknown date
37. Memory Corruption - Chromium (CVE-2024-0223) - Medium [365]
Description: Heap buffer overflow in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00082, EPSS Percentile is 0.33955 |
debian: CVE-2024-0223 was patched at 2024-01-04, unknown date
38. Memory Corruption - Chromium (CVE-2024-0224) - Medium [365]
Description: Use after free in WebAudio in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00082, EPSS Percentile is 0.33926 |
debian: CVE-2024-0224 was patched at 2024-01-04, unknown date
39. Denial of Service - Asterisk (CVE-2023-37457) - Medium [363]
Description: Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the 'update' functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:digium:asterisk (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00121, EPSS Percentile is 0.46245 |
debian: CVE-2023-37457 was patched at 2023-12-29, 2024-01-04, unknown date
40. Incorrect Calculation - xerces-c\\+\\+ (CVE-2023-37536) - Medium [363]
Description: An integer overflow in xerces-c++ 3.2.3 in BigFix Platform allows remote attackers to cause out-of-bound access via HTTP request.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:apache:xerces-c\\+\\+ (does NOT exist in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.2. According to NVD data source | |
0.8 | 10 | EPSS Probability is 0.00677, EPSS Percentile is 0.77831 |
debian: CVE-2023-37536 was patched at 2023-12-31, unknown date
ubuntu: CVE-2023-37536 was patched at 2024-01-18
41. Denial of Service - Linux Kernel (CVE-2022-36402) - Medium [358]
Description: An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 6.3. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2022-36402 was patched at unknown date
redhat: CVE-2022-36402 was patched at 2024-01-10
42. Denial of Service - Linux Kernel (CVE-2023-6622) - Medium [358]
Description: A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-6622 was patched at 2024-01-01, unknown date
43. Memory Corruption - Linux Kernel (CVE-2023-51780) - Medium [358]
Description: An issue was discovered in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00063, EPSS Percentile is 0.2498 |
debian: CVE-2023-51780 was patched at 2024-01-01, 2024-01-02, 2024-01-11, unknown date
44. Information Disclosure - Mozilla Firefox (CVE-2023-6135) - Medium [352]
Description: Multiple NSS NIST curves were susceptible to a side-channel attack known as "Minerva". This attack could potentially allow an attacker to recover the private key. This vulnerability affects
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.18 |
debian: CVE-2023-6135 was patched at unknown date
ubuntu: CVE-2023-6135 was patched at 2024-01-02
45. Memory Corruption - Xorg-server (CVE-2023-6816) - Medium [351]
Description: A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:x.org:xorg-server (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00126, EPSS Percentile is 0.47173 |
debian: CVE-2023-6816 was patched at 2024-01-23, unknown date
ubuntu: CVE-2023-6816 was patched at 2024-01-16, 2024-01-22
redhat: CVE-2023-6816 was patched at 2024-01-22
oraclelinux: CVE-2023-6816 was patched at 2024-01-22
46. Memory Corruption - Linux Kernel (CVE-2023-6531) - Medium [346]
Description: A
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.18855 |
debian: CVE-2023-6531 was patched at 2024-01-01, 2024-01-02, 2024-01-11, unknown date
47. Open Redirect - keycloak (CVE-2023-6927) - Medium [336]
Description: A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.75 | 15 | Open Redirect | |
0.5 | 14 | Product detected by a:redhat:keycloak (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.6. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00118, EPSS Percentile is 0.45751 |
redhat: CVE-2023-6927 was patched at 2024-01-09
48. Memory Corruption - Linux Kernel (CVE-2023-35827) - Medium [334]
Description: An issue was discovered in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-35827 was patched at 2024-01-02, 2024-01-11, unknown date
49. Memory Corruption - Linux Kernel (CVE-2023-51781) - Medium [334]
Description: An issue was discovered in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-51781 was patched at 2024-01-01, 2024-01-02, 2024-01-11, unknown date
50. Memory Corruption - Linux Kernel (CVE-2023-51782) - Medium [334]
Description: An issue was discovered in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-51782 was patched at 2024-01-01, 2024-01-02, 2024-01-11, unknown date
51. Memory Corruption - Linux Kernel (CVE-2023-6121) - Medium [334]
Description: An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00111, EPSS Percentile is 0.44177 |
debian: CVE-2023-6121 was patched at 2024-01-02, 2024-01-11, unknown date
52. Code Injection - libssh (CVE-2023-6004) - Medium [327]
Description: A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.97 | 15 | Code Injection | |
0.5 | 14 | Product detected by a:libssh:libssh (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12067 |
debian: CVE-2023-6004 was patched at 2023-12-28, unknown date
ubuntu: CVE-2023-6004 was patched at 2024-01-22
53. Denial of Service - TinyXML (CVE-2023-34194) - Medium [327]
Description: StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML through 2.6.2 has a reachable assertion (and application exit) via a crafted XML document with a '\0' located after whitespace.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:tinyxml_project:tinyxml (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.17545 |
debian: CVE-2023-34194 was patched at 2023-12-31, unknown date
ubuntu: CVE-2023-34194 was patched at 2024-01-29
54. Denial of Service - Werkzeug (CVE-2023-46136) - Medium [327]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Werkzeug is a comprehensive WSGI web application library | |
0.8 | 10 | CVSS Base Score is 8.0. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.1868 |
debian: CVE-2023-46136 was patched at unknown date
redhat: CVE-2023-46136 was patched at 2024-01-16
55. Memory Corruption - PJSIP (CVE-2023-38703) - Medium [327]
Description: PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:teluu:pjsip (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00068, EPSS Percentile is 0.28196 |
debian: CVE-2023-38703 was patched at 2023-12-29, 2024-01-04, unknown date
56. Denial of Service - Apache Tomcat (CVE-2023-42794) - Medium [324]
Description: Incomplete Cleanup vulnerability in Apache
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | Apache Tomcat is a free and open-source implementation of the Jakarta Servlet, Jakarta Expression Language, and WebSocket technologies | |
0.6 | 10 | CVSS Base Score is 5.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12325 |
redhat: CVE-2023-42794 was patched at 2024-01-10, 2024-01-25
oraclelinux: CVE-2023-42794 was patched at 2024-01-11, 2024-01-25
almalinux: CVE-2023-42794 was patched at 2024-01-10, 2024-01-25
57. Denial of Service - QEMU (CVE-2023-3019) - Medium [324]
Description: A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | QEMU is a generic and open source machine & userspace emulator and virtualizer | |
0.6 | 10 | CVSS Base Score is 6.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-3019 was patched at unknown date
redhat: CVE-2023-3019 was patched at 2024-01-10, 2024-01-25
oraclelinux: CVE-2023-3019 was patched at 2024-01-12
almalinux: CVE-2023-3019 was patched at 2024-01-10
58. Memory Corruption - Linux Kernel (CVE-2023-45863) - Medium [322]
Description: An issue was discovered in lib/kobject.c in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 6.4. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-45863 was patched at 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-45863 was patched at 2024-01-10, 2024-01-25
59. Denial of Service - es450 (CVE-2023-40462) - Medium [315]
Description: The ACEManager component of ALEOS 4.16 and earlier does not perform input sanitization during authentication, which could potentially result in a Denial of Service (DoS) condition for ACEManager without impairing other router functions. ACEManager recovers from the DoS condition by restarting within ten seconds of becoming unavailable.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by h:sierrawireless:es450 (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.1372 |
debian: CVE-2023-40462 was patched at 2023-12-31
60. Path Traversal - Asterisk (CVE-2023-49294) - Medium [315]
Description: Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Path Traversal | |
0.5 | 14 | Product detected by a:digium:asterisk (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00104, EPSS Percentile is 0.42293 |
debian: CVE-2023-49294 was patched at 2023-12-29, 2024-01-04, unknown date
61. Path Traversal - ansible_automation_platform (CVE-2023-5115) - Medium [315]
Description: An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Path Traversal | |
0.5 | 14 | Product detected by a:redhat:ansible_automation_platform (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.3. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00067, EPSS Percentile is 0.27708 |
debian: CVE-2023-5115 was patched at 2023-12-28, unknown date
62. Incorrect Calculation - QEMU (CVE-2023-5088) - Medium [289]
Description: A bug in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.7 | 14 | QEMU is a generic and open source machine & userspace emulator and virtualizer | |
0.6 | 10 | CVSS Base Score is 6.4. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-5088 was patched at unknown date
ubuntu: CVE-2023-5088 was patched at 2024-01-08
63. Memory Corruption - QEMU (CVE-2023-4135) - Medium [289]
Description: A heap out-of-bounds memory read flaw was found in the virtual nvme device in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | QEMU is a generic and open source machine & userspace emulator and virtualizer | |
0.6 | 10 | CVSS Base Score is 6.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12483 |
ubuntu: CVE-2023-4135 was patched at 2024-01-08
64. Unknown Vulnerability Type - Mozilla Firefox (CVE-2023-6869) - Medium [240]
Description: {'nvd_cve_data_all': 'A `<dialog>` element could have been manipulated to paint content outside of a sandboxed iframe. This could allow untrusted content to display under the guise of trusted content. This vulnerability affects Firefox < 121.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A `<dialog>` element could have been manipulated to paint content outside of a sandboxed iframe. This could allow untrusted content to display under the guise of trusted content. This vulnerability affects Firefox < 121.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.19514 |
ubuntu: CVE-2023-6869 was patched at 2024-01-02
65. Unknown Vulnerability Type - Monit (CVE-2022-26563) - Medium [238]
Description: {'nvd_cve_data_all': 'An issue was discovered in Tildeslash Monit before 5.31.0, allows remote attackers to gain escilated privlidges due to improper PAM-authorization.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An issue was discovered in Tildeslash Monit before 5.31.0, allows remote attackers to gain escilated privlidges due to improper PAM-authorization.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:tildeslash:monit (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.001, EPSS Percentile is 0.40767 |
debian: CVE-2022-26563 was patched at unknown date
ubuntu: CVE-2022-26563 was patched at 2024-01-09
66. Unknown Vulnerability Type - ansible (CVE-2022-3697) - Medium [238]
Description: {'nvd_cve_data_all': 'A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:redhat:ansible (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00143, EPSS Percentile is 0.50007 |
debian: CVE-2022-3697 was patched at 2023-12-28, unknown date
67. Unknown Vulnerability Type - OpenSSH (CVE-2023-51384) - Medium [216]
Description: {'nvd_cve_data_all': 'In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12067 |
debian: CVE-2023-51384 was patched at unknown date
ubuntu: CVE-2023-51384 was patched at 2024-01-03
68. Unknown Vulnerability Type - Mozilla Firefox (CVE-2023-6871) - Medium [204]
Description: {'nvd_cve_data_all': 'Under certain conditions, Firefox did not display a warning when a user attempted to navigate to a new protocol handler. This vulnerability affects Firefox < 121.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Under certain conditions, Firefox did not display a warning when a user attempted to navigate to a new protocol handler. This vulnerability affects Firefox < 121.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.18 |
ubuntu: CVE-2023-6871 was patched at 2024-01-02
69. Unknown Vulnerability Type - Go (CVE-2023-45285) - Medium [202]
Description: {'nvd_cve_data_all': 'Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:golang:go (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0006, EPSS Percentile is 0.23748 |
debian: CVE-2023-45285 was patched at unknown date
ubuntu: CVE-2023-45285 was patched at 2024-01-11
70. Unknown Vulnerability Type - Psr-7 (CVE-2023-29197) - Medium [202]
Description: {'nvd_cve_data_all': 'guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\\n) into both the header names and values. While the specification states that \\r\\n\\r\\n is used to terminate the header list, many servers in the wild will also accept \\n\\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\\n) into both the header names and values. While the specification states that \\r\\n\\r\\n is used to terminate the header list, many servers in the wild will also accept \\n\\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:guzzlephp:psr-7 (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00152, EPSS Percentile is 0.51488 |
debian: CVE-2023-29197 was patched at 2024-01-01, unknown date
71. Memory Corruption - Unknown Product (CVE-2024-0409) - Low [196]
Description: {'nvd_cve_data_all': 'A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0 | 14 | Unknown Product | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12067 |
debian: CVE-2024-0409 was patched at 2024-01-23, unknown date
ubuntu: CVE-2024-0409 was patched at 2024-01-16, 2024-01-22
redhat: CVE-2024-0409 was patched at 2024-01-22
oraclelinux: CVE-2024-0409 was patched at 2024-01-22
72. Unknown Vulnerability Type - .NET (CVE-2024-21319) - Low [190]
Description: {'nvd_cve_data_all': 'Microsoft Identity Denial of service vulnerability', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Microsoft Identity Denial of service vulnerability', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:microsoft:.net (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00057, EPSS Percentile is 0.21355 |
ubuntu: CVE-2024-21319 was patched at 2024-01-11
redhat: CVE-2024-21319 was patched at 2024-01-10, 2024-01-15
oraclelinux: CVE-2024-21319 was patched at 2024-01-12, 2024-01-16, 2024-01-17
almalinux: CVE-2024-21319 was patched at 2024-01-10
73. Unknown Vulnerability Type - Go (CVE-2023-39326) - Low [166]
Description: {'nvd_cve_data_all': 'A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:golang:go (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.17651 |
debian: CVE-2023-39326 was patched at unknown date
ubuntu: CVE-2023-39326 was patched at 2024-01-11
74. Unknown Vulnerability Type - openshift_container_platform_for_arm64 (CVE-2023-5625) - Low [166]
Description: {'nvd_cve_data_all': 'A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:redhat:openshift_container_platform_for_arm64 (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.19647 |
redhat: CVE-2023-5625 was patched at 2024-01-16
75. Unknown Vulnerability Type - libssh (CVE-2023-6918) - Low [154]
Description: {'nvd_cve_data_all': 'A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.5 | 14 | Product detected by a:libssh:libssh (exists in CPE dict) | |
0.4 | 10 | CVSS Base Score is 3.7. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0006, EPSS Percentile is 0.23712 |
debian: CVE-2023-6918 was patched at 2023-12-28, unknown date
ubuntu: CVE-2023-6918 was patched at 2024-01-22
76. Unknown Vulnerability Type - Unknown Product (CVE-2024-0408) - Low [83]
Description: {'nvd_cve_data_all': 'A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12067 |
debian: CVE-2024-0408 was patched at 2024-01-23, unknown date
ubuntu: CVE-2024-0408 was patched at 2024-01-16, 2024-01-22
redhat: CVE-2024-0408 was patched at 2024-01-22
oraclelinux: CVE-2024-0408 was patched at 2024-01-22
77. Unknown Vulnerability Type - Unknown Product (CVE-2023-51779) - Low [23]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16829 |
debian: CVE-2023-51779 was patched at 2024-01-01, unknown date
ubuntu: CVE-2023-51779 was patched at 2024-01-25
78. Unknown Vulnerability Type - Unknown Product (CVE-2023-5388) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-5388 was patched at unknown date
redhat: CVE-2023-5388 was patched at 2024-01-09, 2024-01-10
oraclelinux: CVE-2023-5388 was patched at 2024-01-10
almalinux: CVE-2023-5388 was patched at 2024-01-10
79. Unknown Vulnerability Type - Unknown Product (CVE-2024-0229) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2024-0229 was patched at 2024-01-23, unknown date
ubuntu: CVE-2024-0229 was patched at 2024-01-16, 2024-01-22
redhat: CVE-2024-0229 was patched at 2024-01-22
oraclelinux: CVE-2024-0229 was patched at 2024-01-22
80. Unknown Vulnerability Type - Unknown Product (CVE-2024-21885) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2024-21885 was patched at 2024-01-23, unknown date
ubuntu: CVE-2024-21885 was patched at 2024-01-16, 2024-01-22
redhat: CVE-2024-21885 was patched at 2024-01-22
oraclelinux: CVE-2024-21885 was patched at 2024-01-22
81. Unknown Vulnerability Type - Unknown Product (CVE-2024-21886) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2024-21886 was patched at 2024-01-23, unknown date
ubuntu: CVE-2024-21886 was patched at 2024-01-16, 2024-01-22
redhat: CVE-2024-21886 was patched at 2024-01-22
oraclelinux: CVE-2024-21886 was patched at 2024-01-22
debian: CVE-2023-7101 was patched at 2023-12-30, 2023-12-31, unknown date
debian: CVE-2023-49786 was patched at 2023-12-29, 2024-01-04, unknown date
debian: CVE-2023-4255 was patched at unknown date
ubuntu: CVE-2023-4255 was patched at 2024-01-15
debian: CVE-2023-27043 was patched at unknown date
redhat: CVE-2023-27043 was patched at 2024-01-15, 2024-01-25
oraclelinux: CVE-2023-27043 was patched at 2024-01-16, 2024-01-25
almalinux: CVE-2023-27043 was patched at 2024-01-15, 2024-01-25
debian: CVE-2023-46137 was patched at unknown date
ubuntu: CVE-2023-46137 was patched at 2024-01-10
debian: CVE-2023-7104 was patched at unknown date
ubuntu: CVE-2023-7104 was patched at 2024-01-03
redhat: CVE-2023-7104 was patched at 2024-01-15, 2024-01-25
oraclelinux: CVE-2023-7104 was patched at 2024-01-16, 2024-01-25
almalinux: CVE-2023-7104 was patched at 2024-01-15, 2024-01-25
debian: CVE-2023-6606 was patched at 2024-01-11, unknown date
ubuntu: CVE-2023-6606 was patched at 2024-01-25, 2024-01-26
debian: CVE-2023-49465 was patched at 2023-12-30, unknown date
debian: CVE-2023-49467 was patched at 2023-12-30, unknown date
debian: CVE-2023-49468 was patched at 2023-12-30, unknown date
ubuntu: CVE-2023-40360 was patched at 2024-01-08
debian: CVE-2023-50471 was patched at 2023-12-30, unknown date
debian: CVE-2023-42467 was patched at unknown date
ubuntu: CVE-2023-42467 was patched at 2024-01-08
ubuntu: CVE-2023-6872 was patched at 2024-01-02
debian: CVE-2022-46908 was patched at unknown date
ubuntu: CVE-2022-46908 was patched at 2024-01-03
debian: CVE-2023-51385 was patched at 2023-12-22, 2023-12-26, unknown date
ubuntu: CVE-2023-51385 was patched at 2024-01-03, 2024-01-11
redhat: CVE-2023-51385 was patched at 2024-01-25
debian: CVE-2023-46589 was patched at 2024-01-05, unknown date
redhat: CVE-2023-46589 was patched at 2024-01-29
redhat: CVE-2024-0056 was patched at 2024-01-10, 2024-01-15
oraclelinux: CVE-2024-0056 was patched at 2024-01-12, 2024-01-16, 2024-01-17
almalinux: CVE-2024-0056 was patched at 2024-01-10
ubuntu: CVE-2024-0057 was patched at 2024-01-11
redhat: CVE-2024-0057 was patched at 2024-01-10, 2024-01-15
oraclelinux: CVE-2024-0057 was patched at 2024-01-12, 2024-01-16, 2024-01-17
almalinux: CVE-2024-0057 was patched at 2024-01-10
redhat: CVE-2022-38060 was patched at 2024-01-16
debian: CVE-2022-24775 was patched at 2024-01-01, unknown date
debian: CVE-2023-51766 was patched at 2024-01-04, 2024-01-06, unknown date
ubuntu: CVE-2023-51766 was patched at 2024-01-29
debian: CVE-2024-0333 was patched at 2024-01-10, unknown date
debian: CVE-2023-5455 was patched at unknown date
redhat: CVE-2023-5455 was patched at 2024-01-10, 2024-01-15
oraclelinux: CVE-2023-5455 was patched at 2024-01-10, 2024-01-11, 2024-01-12
almalinux: CVE-2023-5455 was patched at 2024-01-10
debian: CVE-2023-49285 was patched at 2024-01-09, unknown date
debian: CVE-2023-49286 was patched at 2024-01-09, unknown date
debian: CVE-2023-50269 was patched at 2024-01-09, unknown date
ubuntu: CVE-2023-49285 was patched at 2024-01-23
ubuntu: CVE-2023-49286 was patched at 2024-01-23
ubuntu: CVE-2023-50269 was patched at 2024-01-23
redhat: CVE-2023-49285 was patched at 2024-01-03, 2024-01-08, 2024-01-24
redhat: CVE-2023-49286 was patched at 2024-01-03, 2024-01-08, 2024-01-24
redhat: CVE-2023-50269 was patched at 2024-01-24
oraclelinux: CVE-2023-49285 was patched at 2024-01-04, 2024-01-10
oraclelinux: CVE-2023-49286 was patched at 2024-01-04, 2024-01-10
almalinux: CVE-2023-49285 was patched at 2024-01-03, 2024-01-08
almalinux: CVE-2023-49286 was patched at 2024-01-03, 2024-01-08
debian: CVE-2023-37457 was patched at 2023-12-29, 2024-01-04, unknown date
debian: CVE-2022-36402 was patched at unknown date
debian: CVE-2023-6622 was patched at 2024-01-01, unknown date
redhat: CVE-2022-36402 was patched at 2024-01-10
debian: CVE-2023-34194 was patched at 2023-12-31, unknown date
ubuntu: CVE-2023-34194 was patched at 2024-01-29
debian: CVE-2023-46136 was patched at unknown date
redhat: CVE-2023-46136 was patched at 2024-01-16
redhat: CVE-2023-42794 was patched at 2024-01-10, 2024-01-25
oraclelinux: CVE-2023-42794 was patched at 2024-01-11, 2024-01-25
almalinux: CVE-2023-42794 was patched at 2024-01-10, 2024-01-25
debian: CVE-2023-3019 was patched at unknown date
redhat: CVE-2023-3019 was patched at 2024-01-10, 2024-01-25
oraclelinux: CVE-2023-3019 was patched at 2024-01-12
almalinux: CVE-2023-3019 was patched at 2024-01-10
debian: CVE-2023-40462 was patched at 2023-12-31
debian: CVE-2023-6111 was patched at unknown date
debian: CVE-2023-6817 was patched at 2024-01-01, 2024-01-02, 2024-01-11, unknown date
debian: CVE-2023-6931 was patched at 2024-01-01, 2024-01-02, 2024-01-11, unknown date
debian: CVE-2023-6932 was patched at 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-6111 was patched at 2024-01-10
ubuntu: CVE-2023-6817 was patched at 2024-01-25, 2024-01-26
ubuntu: CVE-2023-6931 was patched at 2024-01-25, 2024-01-26
ubuntu: CVE-2023-6932 was patched at 2024-01-25, 2024-01-26
debian: CVE-2024-0222 was patched at 2024-01-04, unknown date
debian: CVE-2024-0223 was patched at 2024-01-04, unknown date
debian: CVE-2024-0224 was patched at 2024-01-04, unknown date
debian: CVE-2024-0225 was patched at 2024-01-04, unknown date
debian: CVE-2023-35827 was patched at 2024-01-02, 2024-01-11, unknown date
debian: CVE-2023-45863 was patched at 2024-01-02, 2024-01-11, unknown date
debian: CVE-2023-51780 was patched at 2024-01-01, 2024-01-02, 2024-01-11, unknown date
debian: CVE-2023-51781 was patched at 2024-01-01, 2024-01-02, 2024-01-11, unknown date
debian: CVE-2023-51782 was patched at 2024-01-01, 2024-01-02, 2024-01-11, unknown date
debian: CVE-2023-6121 was patched at 2024-01-02, 2024-01-11, unknown date
debian: CVE-2023-6531 was patched at 2024-01-01, 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-45863 was patched at 2024-01-10, 2024-01-25
debian: CVE-2023-6816 was patched at 2024-01-23, unknown date
ubuntu: CVE-2023-6816 was patched at 2024-01-16, 2024-01-22
redhat: CVE-2023-6816 was patched at 2024-01-22
oraclelinux: CVE-2023-6816 was patched at 2024-01-22
debian: CVE-2023-38703 was patched at 2023-12-29, 2024-01-04, unknown date
ubuntu: CVE-2023-4135 was patched at 2024-01-08
debian: CVE-2024-0409 was patched at 2024-01-23, unknown date
ubuntu: CVE-2024-0409 was patched at 2024-01-16, 2024-01-22
redhat: CVE-2024-0409 was patched at 2024-01-22
oraclelinux: CVE-2024-0409 was patched at 2024-01-22
debian: CVE-2023-2861 was patched at unknown date
ubuntu: CVE-2023-2861 was patched at 2024-01-08
debian: CVE-2023-36377 was patched at 2023-12-23, unknown date
ubuntu: CVE-2023-6866 was patched at 2024-01-02
debian: CVE-2023-37536 was patched at 2023-12-31, unknown date
ubuntu: CVE-2023-37536 was patched at 2024-01-18
debian: CVE-2023-5088 was patched at unknown date
ubuntu: CVE-2023-5088 was patched at 2024-01-08
debian: CVE-2023-6135 was patched at unknown date
ubuntu: CVE-2023-6135 was patched at 2024-01-02
redhat: CVE-2023-6927 was patched at 2024-01-09
debian: CVE-2023-6004 was patched at 2023-12-28, unknown date
ubuntu: CVE-2023-6004 was patched at 2024-01-22
debian: CVE-2023-49294 was patched at 2023-12-29, 2024-01-04, unknown date
debian: CVE-2023-5115 was patched at 2023-12-28, unknown date
ubuntu: CVE-2023-6869 was patched at 2024-01-02
ubuntu: CVE-2023-6871 was patched at 2024-01-02
debian: CVE-2022-26563 was patched at unknown date
ubuntu: CVE-2022-26563 was patched at 2024-01-09
debian: CVE-2022-3697 was patched at 2023-12-28, unknown date
debian: CVE-2023-51384 was patched at unknown date
ubuntu: CVE-2023-51384 was patched at 2024-01-03
debian: CVE-2023-39326 was patched at unknown date
debian: CVE-2023-45285 was patched at unknown date
ubuntu: CVE-2023-39326 was patched at 2024-01-11
ubuntu: CVE-2023-45285 was patched at 2024-01-11
debian: CVE-2023-29197 was patched at 2024-01-01, unknown date
ubuntu: CVE-2024-21319 was patched at 2024-01-11
redhat: CVE-2024-21319 was patched at 2024-01-10, 2024-01-15
oraclelinux: CVE-2024-21319 was patched at 2024-01-12, 2024-01-16, 2024-01-17
almalinux: CVE-2024-21319 was patched at 2024-01-10
redhat: CVE-2023-5625 was patched at 2024-01-16
debian: CVE-2023-6918 was patched at 2023-12-28, unknown date
ubuntu: CVE-2023-6918 was patched at 2024-01-22
debian: CVE-2023-51779 was patched at 2024-01-01, unknown date
debian: CVE-2023-5388 was patched at unknown date
debian: CVE-2024-0229 was patched at 2024-01-23, unknown date
debian: CVE-2024-0408 was patched at 2024-01-23, unknown date
debian: CVE-2024-21885 was patched at 2024-01-23, unknown date
debian: CVE-2024-21886 was patched at 2024-01-23, unknown date
ubuntu: CVE-2023-51779 was patched at 2024-01-25
ubuntu: CVE-2024-0229 was patched at 2024-01-16, 2024-01-22
ubuntu: CVE-2024-0408 was patched at 2024-01-16, 2024-01-22
ubuntu: CVE-2024-21885 was patched at 2024-01-16, 2024-01-22
ubuntu: CVE-2024-21886 was patched at 2024-01-16, 2024-01-22
redhat: CVE-2023-5388 was patched at 2024-01-09, 2024-01-10
redhat: CVE-2024-0229 was patched at 2024-01-22
redhat: CVE-2024-0408 was patched at 2024-01-22
redhat: CVE-2024-21885 was patched at 2024-01-22
redhat: CVE-2024-21886 was patched at 2024-01-22
oraclelinux: CVE-2023-5388 was patched at 2024-01-10
oraclelinux: CVE-2024-0229 was patched at 2024-01-22
oraclelinux: CVE-2024-0408 was patched at 2024-01-22
oraclelinux: CVE-2024-21885 was patched at 2024-01-22
oraclelinux: CVE-2024-21886 was patched at 2024-01-22
almalinux: CVE-2023-5388 was patched at 2024-01-10