Report Name: Linux Patch Wednesday November 2023Generated: 2024-01-30 02:38:05
Product Name | Prevalence | U | C | H | M | L | A | Comment |
---|---|---|---|---|---|---|---|---|
Kerberos | 1 | 1 | 1 | 2 | Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet | |||
Apache HTTP Server | 0.9 | 2 | 2 | Apache HTTP Server is a free and open-source web server that delivers web content through the internet | ||||
Intel(R) Processor | 0.9 | 1 | 1 | Intel's processors from the pioneering 4-bit 4004 (1971) to the present high-end offerings | ||||
Linux Kernel | 0.9 | 4 | 12 | 16 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |||
Chromium | 0.8 | 14 | 1 | 15 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |||
GNOME desktop | 0.8 | 1 | 1 | 2 | GNOME originally an acronym for GNU Network Object Model Environment, is a free and open-source desktop environment for Linux and other Unix-like operating systems | |||
Mozilla Firefox | 0.8 | 1 | 9 | 10 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |||
Node.js | 0.8 | 1 | 1 | 2 | Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more | |||
OpenSSL | 0.8 | 1 | 1 | A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end | ||||
FFmpeg | 0.7 | 1 | 1 | FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams | ||||
QEMU | 0.7 | 1 | 1 | QEMU is a generic and open source machine & userspace emulator and virtualizer | ||||
VMware Tools | 0.7 | 1 | 1 | VMware Tools is a set of services and modules that enable several features in VMware products for better management of, and seamless user interactions with, guests operating systems | ||||
vim | 0.7 | 10 | 10 | Vim is a free and open-source, screen-based text editor program | ||||
ImageMagick | 0.6 | 1 | 1 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | ||||
Jetty | 0.6 | 1 | 1 | Jetty is a Java based web server and servlet engine | ||||
Python | 0.6 | 1 | 1 | 2 | Python is a high-level, general-purpose programming language | |||
Redis | 0.6 | 2 | 2 | Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability | ||||
Roundcube | 0.6 | 1 | 1 | Roundcube is a web-based IMAP email client | ||||
tiffcrop | 0.6 | 1 | 1 | Tiffcrop processes one or more files created according to the Tag Image File Format, Revision 6.0, specification into one or more TIFF file(s) | ||||
Audio File Library | 0.5 | 2 | 2 | Product detected by a:audio_file_library_project:audio_file_library (exists in CPE dict) | ||||
Barbican | 0.5 | 1 | 1 | Product detected by a:openstack:barbican (exists in CPE dict) | ||||
Cacti | 0.5 | 4 | 4 | 8 | Cacti is an open source operational monitoring and fault management framework | |||
Calendar | 0.5 | 1 | 1 | Product detected by a:nextcloud:calendar (exists in CPE dict) | ||||
Cobbler | 0.5 | 2 | 4 | 4 | 10 | Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS | ||
Create Agent | 0.5 | 1 | 1 | Product detected by a:arduino:create_agent (exists in CPE dict) | ||||
GLPI | 0.5 | 9 | 9 | Product detected by a:glpi-project:glpi (exists in CPE dict) | ||||
Ghostscript | 0.5 | 1 | 1 | Product detected by a:artifex:ghostscript (exists in CPE dict) | ||||
Go | 0.5 | 1 | 4 | 5 | Product detected by a:golang:go (exists in CPE dict) | |||
MySQL | 0.5 | 14 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | ||||
NSS | 0.5 | 1 | 1 | Product detected by a:mozilla:nss (exists in CPE dict) | ||||
Networking | 0.5 | 1 | 1 | Product detected by a:golang:networking (exists in CPE dict) | ||||
Open VM Tools | 0.5 | 1 | 1 | Product detected by a:vmware:open_vm_tools (exists in CPE dict) | ||||
Open Virtual Network | 0.5 | 1 | 1 | Product detected by a:ovn:open_virtual_network (exists in CPE dict) | ||||
Procps | 0.5 | 1 | 1 | Product detected by a:procps_project:procps (exists in CPE dict) | ||||
Rabbitmq-c | 0.5 | 1 | 1 | Product detected by a:rabbitmq-c_project:rabbitmq-c (exists in CPE dict) | ||||
Request Tracker | 0.5 | 3 | 3 | Product detected by a:bestpractical:request_tracker (exists in CPE dict) | ||||
Sanitize | 0.5 | 1 | 1 | Product detected by a:sanitize_project:sanitize (exists in CPE dict) | ||||
Slurm | 0.5 | 1 | 1 | Product detected by a:schedmd:slurm (exists in CPE dict) | ||||
Squid | 0.5 | 3 | 3 | Product detected by a:squid-cache:squid (exists in CPE dict) | ||||
TPM2 Software Stack | 0.5 | 1 | 1 | Product detected by a:tpm2_software_stack_project:tpm2_software_stack (exists in CPE dict) | ||||
Tang | 0.5 | 1 | 1 | Product detected by a:tang_project:tang (exists in CPE dict) | ||||
Traceroute | 0.5 | 1 | 1 | Product detected by a:buc:traceroute (exists in CPE dict) | ||||
Traffic Server | 0.5 | 1 | 1 | Product detected by a:apache:traffic_server (exists in CPE dict) | ||||
VLC Media Player | 0.5 | 2 | 2 | Product detected by a:videolan:vlc_media_player (exists in CPE dict) | ||||
X Server | 0.5 | 2 | 2 | Product detected by a:x.org:x_server (exists in CPE dict) | ||||
Xrdp | 0.5 | 3 | 3 | xrdp is an open source remote desktop protocol server | ||||
ZooKeeper | 0.5 | 1 | 1 | Product detected by a:apache:zookeeper (exists in CPE dict) | ||||
browserify-sign | 0.5 | 1 | 1 | Product detected by a:browserify:browserify-sign (exists in CPE dict) | ||||
certifi | 0.5 | 1 | 1 | Product detected by a:kennethreitz:certifi (exists in CPE dict) | ||||
ffmpeg | 0.5 | 6 | 6 | Product detected by a:ffmpeg:ffmpeg (exists in CPE dict) | ||||
goproxy | 0.5 | 1 | 1 | Product detected by a:goproxy_project:goproxy (exists in CPE dict) | ||||
grafana | 0.5 | 7 | 7 | Product detected by a:grafana:grafana (exists in CPE dict) | ||||
http::tiny | 0.5 | 1 | 1 | Product detected by a:http | ||||
insights-client | 0.5 | 1 | 1 | Product detected by a:redhat:insights-client (exists in CPE dict) | ||||
libsndfile | 0.5 | 1 | 1 | Product detected by a:libsndfile_project:libsndfile (exists in CPE dict) | ||||
memcached | 0.5 | 2 | 2 | Product detected by a:memcached:memcached (exists in CPE dict) | ||||
nextcloud_server | 0.5 | 1 | 1 | Product detected by a:nextcloud:nextcloud_server (exists in CPE dict) | ||||
plexus-archiver | 0.5 | 1 | 1 | Product detected by a:codehaus-plexus:plexus-archiver (exists in CPE dict) | ||||
postgresql | 0.5 | 1 | 2 | 3 | Product detected by a:postgresql:postgresql (exists in CPE dict) | |||
qt | 0.5 | 1 | 1 | Product detected by a:qt:qt (exists in CPE dict) | ||||
shadow-utils | 0.5 | 1 | 1 | Product detected by a:shadow-maint:shadow-utils (does NOT exist in CPE dict) | ||||
urllib3 | 0.5 | 2 | 2 | Product detected by a:python:urllib3 (exists in CPE dict) | ||||
zchunk | 0.5 | 1 | 1 | Product detected by a:zchunk:zchunk (exists in CPE dict) | ||||
zlib | 0.5 | 1 | 1 | Product detected by a:zlib:zlib (exists in CPE dict) | ||||
GPAC | 0.4 | 1 | 2 | 3 | GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity) | |||
Unknown Product | 0 | 7 | 7 | Unknown Product |
Vulnerability Type | Criticality | U | C | H | M | L | A |
---|---|---|---|---|---|---|---|
Remote Code Execution | 1.0 | 6 | 6 | 1 | 13 | ||
Code Injection | 0.97 | 1 | 2 | 3 | |||
Command Injection | 0.97 | 2 | 2 | ||||
Arbitrary File Writing | 0.95 | 1 | 1 | ||||
Authentication Bypass | 0.95 | 1 | 7 | 8 | |||
Security Feature Bypass | 0.9 | 14 | 9 | 23 | |||
Elevation of Privilege | 0.85 | 1 | 2 | 5 | 8 | ||
Arbitrary File Reading | 0.83 | 1 | 1 | ||||
Information Disclosure | 0.83 | 1 | 17 | 18 | |||
Cross Site Scripting | 0.8 | 1 | 2 | 6 | 9 | ||
Open Redirect | 0.75 | 1 | 1 | 2 | |||
Denial of Service | 0.7 | 15 | 30 | 45 | |||
Path Traversal | 0.7 | 1 | 3 | 4 | |||
Incorrect Calculation | 0.5 | 4 | 6 | 10 | |||
Memory Corruption | 0.5 | 20 | 13 | 33 | |||
Spoofing | 0.4 | 3 | 3 | ||||
Unknown Vulnerability Type | 0 | 9 | 9 |
Source | U | C | H | M | L | A |
---|---|---|---|---|---|---|
debian | 1 | 5 | 64 | 55 | 8 | 133 |
ubuntu | 3 | 40 | 51 | 6 | 100 | |
oraclelinux | 3 | 15 | 44 | 1 | 63 | |
almalinux | 1 | 14 | 40 | 1 | 56 | |
redhat | 2 | 16 | 45 | 1 | 64 | |
redos | 1 | 11 | 20 | 2 | 34 |
1. Cross Site Scripting - Roundcube (CVE-2023-5631) - Urgent [826]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), NVD:CISAKEV websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.8 | 15 | Cross Site Scripting | |
0.6 | 14 | Roundcube is a web-based IMAP email client | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.8 | 10 | EPSS Probability is 0.0068, EPSS Percentile is 0.77872 |
debian: CVE-2023-5631 was patched at 2023-10-23, 2023-10-25, unknown date
redos: CVE-2023-5631 was patched at 2023-10-26
2. Remote Code Execution - Cacti (CVE-2023-39361) - Critical [702]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Cacti is an open source operational monitoring and fault management framework | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
1.0 | 10 | EPSS Probability is 0.13486, EPSS Percentile is 0.95109 |
debian: CVE-2023-39361 was patched at 2023-11-08, unknown date
3. Remote Code Execution - Cobbler (CVE-2017-1000469) - Critical [678]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.8 | 10 | EPSS Probability is 0.0115, EPSS Percentile is 0.83298 |
ubuntu: CVE-2017-1000469 was patched at 2023-11-13
4. Remote Code Execution - Cacti (CVE-2023-39362) - Critical [654]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Cacti is an open source operational monitoring and fault management framework | |
0.7 | 10 | CVSS Base Score is 7.2. According to NVD data source | |
0.9 | 10 | EPSS Probability is 0.01493, EPSS Percentile is 0.85527 |
debian: CVE-2023-39362 was patched at 2023-11-08, unknown date
5. Arbitrary File Writing - Python (CVE-2007-4559) - Critical [650]
Description: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:mail.python.org website | |
0.95 | 15 | Arbitrary File Writing | |
0.6 | 14 | Python is a high-level, general-purpose programming language | |
0.7 | 10 | CVSS Base Score is 6.8. According to NVD data source | |
0.8 | 10 | EPSS Probability is 0.00947, EPSS Percentile is 0.81465 |
oraclelinux: CVE-2007-4559 was patched at 2023-11-11, 2023-11-17, 2023-11-18
almalinux: CVE-2007-4559 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2007-4559 was patched at 2023-11-07, 2023-11-08, 2023-11-14, 2024-01-23, 2024-01-25
6. Remote Code Execution - Cacti (CVE-2023-39357) - Critical [642]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Cacti is an open source operational monitoring and fault management framework | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00215, EPSS Percentile is 0.59568 |
debian: CVE-2023-39357 was patched at 2023-11-08, unknown date
7. Remote Code Execution - plexus-archiver (CVE-2023-37460) - Critical [642]
Description: Plexis Archiver is a collection of Plexus components to create archives or extract archives to a directory with a unified `Archiver`/`UnArchiver` API. Prior to version 4.8.0, using AbstractUnArchiver for extracting an archive might lead to an arbitrary file creation and possibly
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:codehaus-plexus:plexus-archiver (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00404, EPSS Percentile is 0.71027 |
oraclelinux: CVE-2023-37460 was patched at 2023-11-13
redhat: CVE-2023-37460 was patched at 2023-11-13
8. Remote Code Execution - Cacti (CVE-2023-39359) - Critical [630]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Cacti is an open source operational monitoring and fault management framework | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00168, EPSS Percentile is 0.53563 |
debian: CVE-2023-39359 was patched at 2023-11-08, unknown date
9. Elevation of Privilege - Intel(R) Processor (CVE-2023-23583) - Critical [623]
Description: Sequence of processor instructions leads to unexpected behavior for some
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Vulnerability in Intel Core I3-10100Y Firmware) | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | Intel's processors from the pioneering 4-bit 4004 (1971) to the present high-end offerings | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-23583 was patched at 2023-11-23, 2023-12-16, unknown date
ubuntu: CVE-2023-23583 was patched at 2023-11-17
oraclelinux: CVE-2023-23583 was patched at 2023-11-13, 2023-11-16
10. Authentication Bypass - Cobbler (CVE-2022-0860) - Critical [622]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS | |
0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00149, EPSS Percentile is 0.50899 |
ubuntu: CVE-2022-0860 was patched at 2023-11-13
11. Denial of Service - Jetty (CVE-2023-36478) - High [594]
Description: Eclipse
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.7 | 15 | Denial of Service | |
0.6 | 14 | Jetty is a Java based web server and servlet engine | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.0025, EPSS Percentile is 0.6295 |
debian: CVE-2023-36478 was patched at 2023-10-30, unknown date
12. Code Injection - Cacti (CVE-2023-39365) - High [589]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.97 | 15 | Code Injection | |
0.5 | 14 | Cacti is an open source operational monitoring and fault management framework | |
0.5 | 10 | CVSS Base Score is 4.6. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00184, EPSS Percentile is 0.55825 |
debian: CVE-2023-39365 was patched at 2023-11-08, unknown date
13. Command Injection - Cobbler (CVE-2021-45082) - High [589]
Description: An issue was discovered in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:bugzilla.suse.com website | |
0.97 | 15 | Command Injection | |
0.5 | 14 | Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00069, EPSS Percentile is 0.28604 |
ubuntu: CVE-2021-45082 was patched at 2023-11-13
14. Arbitrary File Reading - Cobbler (CVE-2014-3225) - High [588]
Description: Absolute path traversal vulnerability in the web interface in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:www.youtube.com website | |
0.83 | 15 | Arbitrary File Reading | |
0.5 | 14 | Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS | |
0.4 | 10 | CVSS Base Score is 4.0. According to NVD data source | |
0.9 | 10 | EPSS Probability is 0.02927, EPSS Percentile is 0.89819 |
ubuntu: CVE-2014-3225 was patched at 2023-11-13
15. Security Feature Bypass - Python (CVE-2023-41105) - High [582]
Description: An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Untrusted Search Path in Python, [githubexploit] Exploit for Untrusted Search Path in Python) | |
0.9 | 15 | Security Feature Bypass | |
0.6 | 14 | Python is a high-level, general-purpose programming language | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.20473 |
debian: CVE-2023-41105 was patched at unknown date
ubuntu: CVE-2023-41105 was patched at 2023-12-11
oraclelinux: CVE-2023-41105 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-41105 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-41105 was patched at 2023-11-07, 2023-11-14
16. Denial of Service - ffmpeg (CVE-2020-20898) - High [577]
Description: Integer Overflow vulnerability in function filter16_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:ffmpeg:ffmpeg (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00155, EPSS Percentile is 0.51757 |
debian: CVE-2020-20898 was patched at unknown date
ubuntu: CVE-2020-20898 was patched at 2023-10-24
17. Denial of Service - ffmpeg (CVE-2021-38090) - High [577]
Description: Integer Overflow vulnerability in function filter16_roberts in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:ffmpeg:ffmpeg (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00155, EPSS Percentile is 0.51757 |
debian: CVE-2021-38090 was patched at unknown date
ubuntu: CVE-2021-38090 was patched at 2023-10-24
18. Denial of Service - ffmpeg (CVE-2021-38091) - High [577]
Description: Integer Overflow vulnerability in function filter16_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:ffmpeg:ffmpeg (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00155, EPSS Percentile is 0.51757 |
debian: CVE-2021-38091 was patched at unknown date
ubuntu: CVE-2021-38091 was patched at 2023-10-24
19. Denial of Service - ffmpeg (CVE-2021-38092) - High [577]
Description: Integer Overflow vulnerability in function filter_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:ffmpeg:ffmpeg (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00155, EPSS Percentile is 0.51757 |
debian: CVE-2021-38092 was patched at unknown date
ubuntu: CVE-2021-38092 was patched at 2023-10-24
20. Denial of Service - ffmpeg (CVE-2021-38093) - High [577]
Description: Integer Overflow vulnerability in function filter_robert in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:ffmpeg:ffmpeg (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00155, EPSS Percentile is 0.51757 |
debian: CVE-2021-38093 was patched at unknown date
ubuntu: CVE-2021-38093 was patched at 2023-10-24
21. Denial of Service - ffmpeg (CVE-2021-38094) - High [577]
Description: Integer Overflow vulnerability in function filter_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:ffmpeg:ffmpeg (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00155, EPSS Percentile is 0.51757 |
debian: CVE-2021-38094 was patched at unknown date
ubuntu: CVE-2021-38094 was patched at 2023-10-24
22. Denial of Service - FFmpeg (CVE-2020-22038) - High [575]
Description: A
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:trac.ffmpeg.org website | |
0.7 | 15 | Denial of Service | |
0.7 | 14 | FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00088, EPSS Percentile is 0.3684 |
debian: CVE-2020-22038 was patched at unknown date
ubuntu: CVE-2020-22038 was patched at 2023-10-24
23. Memory Corruption - vim (CVE-2023-5344) - High [575]
Description: Heap-based Buffer Overflow in GitHub repository
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | Vim is a free and open-source, screen-based text editor program | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00182, EPSS Percentile is 0.55585 |
debian: CVE-2023-5344 was patched at unknown date
ubuntu: CVE-2023-5344 was patched at 2023-10-25
24. Denial of Service - Audio File Library (CVE-2019-13147) - High [553]
Description: In Audio File Library (aka audiofile) 0.3.6, there exists one NULL pointer dereference bug in ulaw2linear_buf in G711.cpp in libmodules.a that allows an attacker to cause a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:audio_file_library_project:audio_file_library (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00146, EPSS Percentile is 0.50553 |
debian: CVE-2019-13147 was patched at 2023-11-13, unknown date
ubuntu: CVE-2019-13147 was patched at 2023-12-14
25. Remote Code Execution - TPM2 Software Stack (CVE-2023-22745) - High [547]
Description: tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:tpm2_software_stack_project:tpm2_software_stack (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.4. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-22745 was patched at unknown date
oraclelinux: CVE-2023-22745 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-22745 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-22745 was patched at 2023-11-07, 2023-11-14
26. Memory Corruption - VLC Media Player (CVE-2023-47359) - High [541]
Description: Videolan VLC prior to version 3.0.20 contains an incorrect offset read that leads to a Heap-Based Buffer Overflow in function GetPacket() and results in a memory corruption.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:0xariana.github.io website | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:videolan:vlc_media_player (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00087, EPSS Percentile is 0.36563 |
debian: CVE-2023-47359 was patched at 2023-11-02, 2023-12-01, unknown date
redos: CVE-2023-47359 was patched at 2023-11-21
27. Denial of Service - libsndfile (CVE-2022-33065) - High [529]
Description: Multiple signed integers overflow in function au_read_header in src/au.c and in functions mat4_open and mat4_read_header in src/mat4.c in Libsndfile, allows an attacker to cause
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:libsndfile_project:libsndfile (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.19018 |
debian: CVE-2022-33065 was patched at unknown date
ubuntu: CVE-2022-33065 was patched at 2023-11-02
28. Memory Corruption - Audio File Library (CVE-2022-24599) - High [529]
Description: In autofile Audio File Library 0.3.6, there exists one
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:audio_file_library_project:audio_file_library (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00263, EPSS Percentile is 0.64022 |
debian: CVE-2022-24599 was patched at 2023-11-13, unknown date
ubuntu: CVE-2022-24599 was patched at 2023-12-14
29. Security Feature Bypass - Traceroute (CVE-2023-46316) - High [529]
Description: In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Traceroute 2.1.2 Privilege Escalation, [zdt] Traceroute 2.1.2 Privilege Escalation Vulnerability) | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:buc:traceroute (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-46316 was patched at unknown date
ubuntu: CVE-2023-46316 was patched at 2023-11-14
redos: CVE-2023-46316 was patched at 2023-11-02
30. Incorrect Calculation - vim (CVE-2023-3896) - High [527]
Description: Divide By Zero in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.5 | 15 | Incorrect Calculation | |
0.7 | 14 | Vim is a free and open-source, screen-based text editor program | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16754 |
debian: CVE-2023-3896 was patched at unknown date
ubuntu: CVE-2023-3896 was patched at 2023-10-25
31. Incorrect Calculation - vim (CVE-2023-4734) - High [527]
Description: Integer Overflow or Wraparound in GitHub repository
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website | |
0.5 | 15 | Incorrect Calculation | |
0.7 | 14 | Vim is a free and open-source, screen-based text editor program | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16754 |
debian: CVE-2023-4734 was patched at unknown date
ubuntu: CVE-2023-4734 was patched at 2023-10-25
32. Memory Corruption - vim (CVE-2023-4733) - High [527]
Description: Use After Free in GitHub repository
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | Vim is a free and open-source, screen-based text editor program | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00056, EPSS Percentile is 0.21045 |
debian: CVE-2023-4733 was patched at unknown date
ubuntu: CVE-2023-4733 was patched at 2023-10-25
33. Memory Corruption - vim (CVE-2023-4735) - High [527]
Description: Out-of-bounds Write in GitHub repository
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | Vim is a free and open-source, screen-based text editor program | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16754 |
debian: CVE-2023-4735 was patched at unknown date
debian: CVE-2023-47359 was patched at 2023-11-02, 2023-12-01, unknown date
ubuntu: CVE-2023-4735 was patched at 2023-10-25
redos: CVE-2023-47359 was patched at 2023-11-21
34. Memory Corruption - vim (CVE-2023-4738) - High [527]
Description: Heap-based Buffer Overflow in GitHub repository
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | Vim is a free and open-source, screen-based text editor program | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16754 |
debian: CVE-2023-4738 was patched at unknown date
ubuntu: CVE-2023-4738 was patched at 2023-10-25
35. Memory Corruption - vim (CVE-2023-4750) - High [527]
Description: Use After Free in GitHub repository
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | Vim is a free and open-source, screen-based text editor program | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00056, EPSS Percentile is 0.21045 |
debian: CVE-2023-4750 was patched at unknown date
ubuntu: CVE-2023-4750 was patched at 2023-10-25
36. Memory Corruption - vim (CVE-2023-4751) - High [527]
Description: Heap-based Buffer Overflow in GitHub repository
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | Vim is a free and open-source, screen-based text editor program | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16754 |
debian: CVE-2023-4751 was patched at unknown date
ubuntu: CVE-2023-4751 was patched at 2023-10-25
37. Memory Corruption - vim (CVE-2023-5535) - High [527]
Description: Use After Free in GitHub repository
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | Vim is a free and open-source, screen-based text editor program | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16029 |
debian: CVE-2023-5535 was patched at unknown date
ubuntu: CVE-2023-5535 was patched at 2023-10-25
38. Memory Corruption - Linux Kernel (CVE-2023-42754) - High [525]
Description: A NULL pointer dereference flaw was found in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:seclists.org website | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-42754 was patched at 2024-01-11, unknown date
ubuntu: CVE-2023-42754 was patched at 2023-10-31, 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
39. Cross Site Scripting - Cacti (CVE-2023-39515) - High [523]
Description: Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.8 | 15 | Cross Site Scripting | |
0.5 | 14 | Cacti is an open source operational monitoring and fault management framework | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00056, EPSS Percentile is 0.20838 |
debian: CVE-2023-39515 was patched at 2023-11-08, unknown date
40. Cross Site Scripting - Cacti (CVE-2023-39516) - High [523]
Description: Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.8 | 15 | Cross Site Scripting | |
0.5 | 14 | Cacti is an open source operational monitoring and fault management framework | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00056, EPSS Percentile is 0.20838 |
debian: CVE-2023-39516 was patched at 2023-11-08, unknown date
41. Denial of Service - goproxy (CVE-2023-37788) - High [517]
Description: goproxy v1.1 was discovered to contain an issue which can lead to a Denial of service (DoS) via unspecified vectors.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:goproxy_project:goproxy (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.1372 |
debian: CVE-2023-37788 was patched at unknown date
redhat: CVE-2023-37788 was patched at 2023-10-31
42. Information Disclosure - Tang (CVE-2023-1672) - High [517]
Description: A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:www.openwall.com website | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:tang_project:tang (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.18061 |
debian: CVE-2023-1672 was patched at 2023-11-07, unknown date
ubuntu: CVE-2023-1672 was patched at 2023-11-20
oraclelinux: CVE-2023-1672 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-1672 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-1672 was patched at 2023-11-07, 2023-11-14
43. Security Feature Bypass - Calendar (CVE-2023-45150) - High [517]
Description: Nextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabytes of data were provided, eventually making the server busy and unresponsive. It is recommended that the Nextcloud Calendar app is upgraded to 4.4.4. The only workaround for users unable to upgrade is to disable the calendar app.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:hackerone.com website | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:nextcloud:calendar (exists in CPE dict) | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00051, EPSS Percentile is 0.17019 |
redos: CVE-2023-45150 was patched at 2023-10-20
44. Remote Code Execution - Chromium (CVE-2023-5857) - High [502]
Description: Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00523, EPSS Percentile is 0.74456 |
debian: CVE-2023-5857 was patched at 2023-11-02, unknown date
45. Denial of Service - ImageMagick (CVE-2023-5349) - High [498]
Description: A memory leak flaw was found in ruby-magick, an interface between Ruby and
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.7 | 15 | Denial of Service | |
0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.1379 |
debian: CVE-2023-5349 was patched at 2023-10-22, unknown date
46. Memory Corruption - vim (CVE-2023-5441) - High [491]
Description: NULL Pointer Dereference in GitHub repository
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:huntr.dev website | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | Vim is a free and open-source, screen-based text editor program | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.0802 |
debian: CVE-2023-5441 was patched at unknown date
ubuntu: CVE-2023-5441 was patched at 2023-10-25
47. Remote Code Execution - Cobbler (CVE-2021-40323) - High [488]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.9 | 10 | EPSS Probability is 0.02948, EPSS Percentile is 0.89848 |
ubuntu: CVE-2021-40323 was patched at 2023-11-13
48. Incorrect Calculation - VLC Media Player (CVE-2023-47360) - High [482]
Description: Videolan VLC prior to version 3.0.20 contains an Integer underflow that leads to an incorrect packet length.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:0xariana.github.io website | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:videolan:vlc_media_player (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.13815 |
debian: CVE-2023-47360 was patched at 2023-11-02, 2023-12-01, unknown date
redos: CVE-2023-47360 was patched at 2023-11-21
49. Open Redirect - Cacti (CVE-2023-39364) - High [479]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:Exploit:github.com website | |
0.75 | 15 | Open Redirect | |
0.5 | 14 | Cacti is an open source operational monitoring and fault management framework | |
0.3 | 10 | CVSS Base Score is 3.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00058, EPSS Percentile is 0.21579 |
debian: CVE-2023-39364 was patched at 2023-11-08, unknown date
50. Remote Code Execution - postgresql (CVE-2023-5869) - High [476]
Description: A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:postgresql:postgresql (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.9 | 10 | EPSS Probability is 0.0145, EPSS Percentile is 0.85312 |
debian: CVE-2023-5869 was patched at 2023-11-13, 2023-11-14, unknown date
ubuntu: CVE-2023-5869 was patched at 2023-12-06, 2024-01-09, 2024-01-17
oraclelinux: CVE-2023-5869 was patched at 2023-11-30, 2023-12-13, 2023-12-15, 2023-12-18, 2023-12-19, 2023-12-20
almalinux: CVE-2023-5869 was patched at 2023-11-29, 2023-12-11, 2023-12-13, 2023-12-20
redhat: CVE-2023-5869 was patched at 2023-11-28, 2023-11-29, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-07, 2023-12-11, 2023-12-13, 2023-12-19, 2023-12-20
51. Security Feature Bypass - Chromium (CVE-2023-5482) - High [460]
Description: Insufficient data validation in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00149, EPSS Percentile is 0.5093 |
debian: CVE-2023-5482 was patched at 2023-11-02, unknown date
52. Security Feature Bypass - Cobbler (CVE-2018-1000226) - High [458]
Description: Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.8 | 10 | EPSS Probability is 0.01309, EPSS Percentile is 0.84494 |
ubuntu: CVE-2018-1000226 was patched at 2023-11-13
53. Security Feature Bypass - Slurm (CVE-2022-29502) - High [458]
Description: SchedMD Slurm 21.08.x through 20.11.x has
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:schedmd:slurm (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.8 | 10 | EPSS Probability is 0.00742, EPSS Percentile is 0.78902 |
debian: CVE-2022-29502 was patched at unknown date
ubuntu: CVE-2022-29502 was patched at 2023-10-30
54. Command Injection - Squid (CVE-2023-46846) - High [447]
Description: SQUID is vulnerable to HTTP
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.97 | 15 | Command Injection | |
0.5 | 14 | Product detected by a:squid-cache:squid (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 9.3. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00412, EPSS Percentile is 0.71309 |
debian: CVE-2023-46846 was patched at 2024-01-09, unknown date
ubuntu: CVE-2023-46846 was patched at 2023-11-21
oraclelinux: CVE-2023-46846 was patched at 2023-11-03, 2023-11-07, 2023-11-16, 2023-11-22
almalinux: CVE-2023-46846 was patched at 2023-11-02, 2023-11-07, 2023-11-14
redhat: CVE-2023-46846 was patched at 2023-11-02, 2023-11-07, 2023-11-08, 2023-11-14
redos: CVE-2023-46846 was patched at 2023-11-21
55. Remote Code Execution - Linux Kernel (CVE-2023-39191) - High [435]
Description: An improper input validation flaw was found in the eBPF subsystem in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 8.2. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00047, EPSS Percentile is 0.14149 |
debian: CVE-2023-39191 was patched at unknown date
oraclelinux: CVE-2023-39191 was patched at 2023-11-12
redhat: CVE-2023-39191 was patched at 2024-01-23, 2024-01-25
56. Security Feature Bypass - ZooKeeper (CVE-2023-44981) - High [434]
Description: Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authentication ID is listed in zoo.cfg server list. The instance part in SASL auth ID is optional and if it's missing, like 'eve@EXAMPLE.COM', the authorization check will be skipped. As a result an arbitrary endpoint could join the cluster and begin propagating counterfeit changes to the leader, essentially giving it
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:apache:zookeeper (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
0.7 | 10 | EPSS Probability is 0.00354, EPSS Percentile is 0.69136 |
debian: CVE-2023-44981 was patched at 2023-10-21, 2023-10-31, unknown date
ubuntu: CVE-2023-44981 was patched at 2024-01-16
57. Memory Corruption - Apache HTTP Server (CVE-2023-31122) - High [429]
Description: Out-of-bounds Read vulnerability in mod_macro of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | Apache HTTP Server is a free and open-source web server that delivers web content through the internet | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.8 | 10 | EPSS Probability is 0.00759, EPSS Percentile is 0.79174 |
debian: CVE-2023-31122 was patched at unknown date
ubuntu: CVE-2023-31122 was patched at 2023-11-22, 2023-11-23
redos: CVE-2023-31122 was patched at 2023-10-30
58. Security Feature Bypass - GNOME desktop (CVE-2023-28100) - High [425]
Description: Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4 contain a vulnerability similar to CVE-2017-5226, but using the `TIOCLINUX` ioctl command instead of `TIOCSTI`. If a Flatpak app is run on a Linux virtual console such as `/dev/tty1`, it can copy text from the virtual console and paste it into the command buffer, from which the command might be run after the Flatpak app has exited. Ordinary graphical terminal emulators like xterm,
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | GNOME originally an acronym for GNU Network Object Model Environment, is a free and open-source desktop environment for Linux and other Unix-like operating systems | |
1.0 | 10 | CVSS Base Score is 10.0. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-28100 was patched at unknown date
oraclelinux: CVE-2023-28100 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-28100 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-28100 was patched at 2023-11-07, 2023-11-14
59. Denial of Service - Squid (CVE-2023-46847) - High [422]
Description: Squid is vulnerable to a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:squid-cache:squid (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.6. According to NVD data source | |
0.9 | 10 | EPSS Probability is 0.03523, EPSS Percentile is 0.9066 |
debian: CVE-2023-46847 was patched at 2024-01-09, unknown date
ubuntu: CVE-2023-46847 was patched at 2023-11-21, 2023-12-11
oraclelinux: CVE-2023-46847 was patched at 2023-11-03, 2023-11-07, 2023-11-08, 2023-11-16, 2023-11-22, 2024-01-12
almalinux: CVE-2023-46847 was patched at 2023-11-02, 2023-11-07, 2023-11-14
redhat: CVE-2023-46847 was patched at 2023-11-02, 2023-11-07, 2023-11-08, 2023-11-13, 2023-11-14, 2023-11-29
redos: CVE-2023-46847 was patched at 2023-11-21
60. Remote Code Execution - Go (CVE-2023-39323) - High [416]
Description: Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Product detected by a:golang:go (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00165, EPSS Percentile is 0.53156 |
debian: CVE-2023-39323 was patched at unknown date
ubuntu: CVE-2023-39323 was patched at 2024-01-11
redos: CVE-2023-39323 was patched at 2023-11-09
61. Security Feature Bypass - Chromium (CVE-2023-5480) - High [413]
Description: Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00104, EPSS Percentile is 0.42251 |
debian: CVE-2023-5480 was patched at 2023-11-02, unknown date
62. Security Feature Bypass - Chromium (CVE-2023-5853) - High [413]
Description: Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00204, EPSS Percentile is 0.58428 |
debian: CVE-2023-5853 was patched at 2023-11-02, unknown date
63. Security Feature Bypass - Chromium (CVE-2023-5859) - High [413]
Description: Incorrect security UI in Picture In Picture in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted local HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00204, EPSS Percentile is 0.58378 |
debian: CVE-2023-5859 was patched at 2023-11-02, unknown date
64. Denial of Service - Squid (CVE-2023-46848) - High [410]
Description: Squid is vulnerable to Denial of Service, where a remote attacker can perform
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:squid-cache:squid (exists in CPE dict) | |
0.9 | 10 | CVSS Base Score is 8.6. According to NVD data source | |
0.8 | 10 | EPSS Probability is 0.01357, EPSS Percentile is 0.84811 |
debian: CVE-2023-46848 was patched at unknown date
ubuntu: CVE-2023-46848 was patched at 2023-11-21
oraclelinux: CVE-2023-46848 was patched at 2023-11-03, 2023-11-16
almalinux: CVE-2023-46848 was patched at 2023-11-02, 2023-11-07
redhat: CVE-2023-46848 was patched at 2023-11-02, 2023-11-07
redos: CVE-2023-46848 was patched at 2023-11-21
65. Memory Corruption - Kerberos (CVE-2023-36054) - High [410]
Description: lib/kadm5/kadm_rpc_xdr.c in MIT
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
1 | 14 | Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00267, EPSS Percentile is 0.64307 |
debian: CVE-2023-36054 was patched at 2023-10-22, unknown date
ubuntu: CVE-2023-36054 was patched at 2023-11-01, 2023-11-06
oraclelinux: CVE-2023-36054 was patched at 2023-11-11
almalinux: CVE-2023-36054 was patched at 2023-11-07
redhat: CVE-2023-36054 was patched at 2023-11-07
66. Security Feature Bypass - http::tiny (CVE-2023-31486) - High [410]
Description: HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:http | |
0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.0024, EPSS Percentile is 0.62059 |
debian: CVE-2023-31486 was patched at unknown date
oraclelinux: CVE-2023-31486 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-31486 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-31486 was patched at 2023-11-07, 2023-11-14, 2024-01-25
67. Elevation of Privilege - Linux Kernel (CVE-2023-1252) - High [408]
Description: A use-after-free flaw was found in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-1252 was patched at unknown date
oraclelinux: CVE-2023-1252 was patched at 2023-11-12, 2023-11-17
almalinux: CVE-2023-1252 was patched at 2023-11-14
redhat: CVE-2023-1252 was patched at 2023-11-14
68. Elevation of Privilege - Linux Kernel (CVE-2023-5345) - High [408]
Description: A use-after-free vulnerability in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-5345 was patched at unknown date
ubuntu: CVE-2023-5345 was patched at 2023-10-31, 2023-11-21, 2023-11-27, 2023-11-28, 2023-11-30, 2023-12-06, 2024-01-09, 2024-01-25
oraclelinux: CVE-2023-5345 was patched at 2023-12-14, 2023-12-22
almalinux: CVE-2023-5345 was patched at 2023-12-12
redhat: CVE-2023-5345 was patched at 2023-12-12
69. Denial of Service - Apache HTTP Server (CVE-2023-43622) - High [405]
Description: An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | Apache HTTP Server is a free and open-source web server that delivers web content through the internet | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00063, EPSS Percentile is 0.25666 |
debian: CVE-2023-43622 was patched at unknown date
ubuntu: CVE-2023-43622 was patched at 2023-11-22
redos: CVE-2023-43622 was patched at 2023-10-30
70. Incorrect Calculation - Chromium (CVE-2023-5849) - High [401]
Description: Integer overflow in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.0018, EPSS Percentile is 0.55352 |
debian: CVE-2023-5849 was patched at 2023-11-02, unknown date
71. Memory Corruption - Chromium (CVE-2023-5472) - High [401]
Description: Use after free in Profiles in Google Chrome prior to 118.0.5993.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00229, EPSS Percentile is 0.61106 |
debian: CVE-2023-5472 was patched at 2023-10-26, unknown date
72. Memory Corruption - Chromium (CVE-2023-5852) - High [401]
Description: Use after free in Printing in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00181, EPSS Percentile is 0.55387 |
debian: CVE-2023-5852 was patched at 2023-11-02, unknown date
73. Memory Corruption - Chromium (CVE-2023-5854) - High [401]
Description: Use after free in Profiles in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00181, EPSS Percentile is 0.55387 |
debian: CVE-2023-5854 was patched at 2023-11-02, unknown date
74. Memory Corruption - Chromium (CVE-2023-5855) - High [401]
Description: Use after free in Reading Mode in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00181, EPSS Percentile is 0.55387 |
debian: CVE-2023-5855 was patched at 2023-11-02, unknown date
75. Memory Corruption - Chromium (CVE-2023-5856) - High [401]
Description: Use after free in Side Panel in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.0018, EPSS Percentile is 0.55352 |
debian: CVE-2023-5856 was patched at 2023-11-02, unknown date
76. Memory Corruption - Chromium (CVE-2023-5996) - High [401]
Description: Use after free in WebAudio in Google Chrome prior to 119.0.6045.123 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.00215, EPSS Percentile is 0.59531 |
debian: CVE-2023-5996 was patched at 2023-11-09, unknown date
77. Memory Corruption - Mozilla Firefox (CVE-2023-5730) - High [401]
Description: Memory safety bugs present in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00122, EPSS Percentile is 0.46432 |
debian: CVE-2023-5730 was patched at 2023-10-25, 2023-10-27, unknown date
ubuntu: CVE-2023-5730 was patched at 2023-10-30, 2023-11-02
oraclelinux: CVE-2023-5730 was patched at 2023-10-30, 2023-10-31
almalinux: CVE-2023-5730 was patched at 2023-10-30
redhat: CVE-2023-5730 was patched at 2023-10-30
78. Path Traversal - Node.js (CVE-2023-39332) - High [401]
Description: Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Path Traversal | |
0.8 | 14 | Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00062, EPSS Percentile is 0.24383 |
oraclelinux: CVE-2023-39332 was patched at 2023-11-22
almalinux: CVE-2023-39332 was patched at 2023-11-14
redhat: CVE-2023-39332 was patched at 2023-11-14
79. Security Feature Bypass - Chromium (CVE-2023-5851) - High [401]
Description: Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00138, EPSS Percentile is 0.49305 |
debian: CVE-2023-5851 was patched at 2023-11-02, unknown date
80. Security Feature Bypass - Chromium (CVE-2023-5858) - High [401]
Description: Inappropriate implementation in WebApp Provider in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00157, EPSS Percentile is 0.52179 |
debian: CVE-2023-5858 was patched at 2023-11-02, unknown date
81. Memory Corruption - Kerberos (CVE-2023-39975) - Medium [398]
Description: kdc/do_tgs_req.c in MIT
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
1 | 14 | Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet | |
0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00075, EPSS Percentile is 0.30911 |
oraclelinux: CVE-2023-39975 was patched at 2023-11-11
almalinux: CVE-2023-39975 was patched at 2023-11-07
redhat: CVE-2023-39975 was patched at 2023-11-07
82. Elevation of Privilege - Linux Kernel (CVE-2023-33952) - Medium [397]
Description: A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 6.7. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12483 |
debian: CVE-2023-33952 was patched at unknown date
oraclelinux: CVE-2023-33952 was patched at 2023-11-12, 2023-11-17
almalinux: CVE-2023-33952 was patched at 2023-11-14
redhat: CVE-2023-33952 was patched at 2023-11-14
83. Security Feature Bypass - VMware Tools (CVE-2023-34058) - Medium [396]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.7 | 14 | VMware Tools is a set of services and modules that enable several features in VMware products for better management of, and seamless user interactions with, guests operating systems | |
0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.0008, EPSS Percentile is 0.33192 |
debian: CVE-2023-34058 was patched at 2023-10-31, 2023-11-06, unknown date
ubuntu: CVE-2023-34058 was patched at 2023-10-31, 2023-12-06
oraclelinux: CVE-2023-34058 was patched at 2023-11-16, 2023-11-21
almalinux: CVE-2023-34058 was patched at 2023-11-15
redhat: CVE-2023-34058 was patched at 2023-11-15
84. Information Disclosure - Linux Kernel (CVE-2023-33951) - Medium [393]
Description: A race condition vulnerability was found in the vmwgfx driver in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.7 | 10 | CVSS Base Score is 6.7. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12483 |
debian: CVE-2023-33951 was patched at unknown date
oraclelinux: CVE-2023-33951 was patched at 2023-11-12, 2023-11-17
almalinux: CVE-2023-33951 was patched at 2023-11-14
redhat: CVE-2023-33951 was patched at 2023-11-14
85. Denial of Service - Mozilla Firefox (CVE-2023-5724) - Medium [389]
Description: Drivers are not always robust to extremely large draw calls and in some cases this scenario could have
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00076, EPSS Percentile is 0.31234 |
debian: CVE-2023-5724 was patched at 2023-10-25, 2023-10-27, unknown date
ubuntu: CVE-2023-5724 was patched at 2023-10-30, 2023-11-02
oraclelinux: CVE-2023-5724 was patched at 2023-10-30, 2023-10-31
almalinux: CVE-2023-5724 was patched at 2023-10-30
redhat: CVE-2023-5724 was patched at 2023-10-30
86. Denial of Service - Mozilla Firefox (CVE-2023-5728) - Medium [389]
Description: During garbage collection extra operations were performed on a object that should not be. This could have led to a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00076, EPSS Percentile is 0.31234 |
debian: CVE-2023-5728 was patched at 2023-10-25, 2023-10-27, unknown date
ubuntu: CVE-2023-5728 was patched at 2023-10-30, 2023-11-02
oraclelinux: CVE-2023-5728 was patched at 2023-10-30, 2023-10-31
almalinux: CVE-2023-5728 was patched at 2023-10-30
redhat: CVE-2023-5728 was patched at 2023-10-30
87. Elevation of Privilege - X Server (CVE-2023-5367) - Medium [389]
Description: A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.5 | 14 | Product detected by a:x.org:x_server (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00125, EPSS Percentile is 0.46981 |
debian: CVE-2023-5367 was patched at 2023-10-25, unknown date
ubuntu: CVE-2023-5367 was patched at 2023-10-25, 2023-10-31
oraclelinux: CVE-2023-5367 was patched at 2023-11-08, 2023-11-22, 2024-01-03
almalinux: CVE-2023-5367 was patched at 2024-01-02
redhat: CVE-2023-5367 was patched at 2023-11-08, 2023-11-21, 2023-11-28, 2024-01-02, 2024-01-10
redos: CVE-2023-5367 was patched at 2023-11-15
88. Code Injection - GLPI (CVE-2023-41320) - Medium [387]
Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. UI layout preferences management can be hijacked to lead to SQL injection. This injection can be use to takeover an administrator account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.97 | 15 | Code Injection | |
0.5 | 14 | Product detected by a:glpi-project:glpi (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00076, EPSS Percentile is 0.31592 |
redos: CVE-2023-41320 was patched at 2023-11-09
89. Authentication Bypass - Cobbler (CVE-2021-40325) - Medium [383]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00082, EPSS Percentile is 0.34079 |
ubuntu: CVE-2021-40325 was patched at 2023-11-13
90. Information Disclosure - Linux Kernel (CVE-2024-0443) - Medium [381]
Description: A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
redhat: CVE-2024-0443 was patched at 2023-11-14
91. Elevation of Privilege - GNOME desktop (CVE-2023-28101) - Medium [380]
Description: Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4, if an attacker publishes a Flatpak app
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | GNOME originally an acronym for GNU Network Object Model Environment, is a free and open-source desktop environment for Linux and other Unix-like operating systems | |
0.5 | 10 | CVSS Base Score is 5.0. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00063, EPSS Percentile is 0.25695 |
debian: CVE-2023-28101 was patched at unknown date
oraclelinux: CVE-2023-28101 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-28101 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-28101 was patched at 2023-11-07, 2023-11-14
92. Remote Code Execution - Xrdp (CVE-2022-23613) - Medium [380]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | xrdp is an open source remote desktop protocol server | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16825 |
debian: CVE-2022-23613 was patched at unknown date
ubuntu: CVE-2022-23613 was patched at 2023-11-08
93. Memory Corruption - Mozilla Firefox (CVE-2023-5731) - Medium [377]
Description: Memory safety bugs present in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00068, EPSS Percentile is 0.28196 |
ubuntu: CVE-2023-5731 was patched at 2023-10-30
94. Path Traversal - Node.js (CVE-2023-39331) - Medium [377]
Description: A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Please note that at the time this CVE was issued, the permission model is an experimental feature of
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Path Traversal | |
0.8 | 14 | Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.19684 |
oraclelinux: CVE-2023-39331 was patched at 2023-11-22
almalinux: CVE-2023-39331 was patched at 2023-11-07, 2023-11-14, 2023-11-15
redhat: CVE-2023-39331 was patched at 2023-11-07, 2023-11-14, 2023-11-15
95. Security Feature Bypass - Mozilla Firefox (CVE-2023-5723) - Medium [377]
Description: An attacker with temporary script access to a site could have set a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.18 |
ubuntu: CVE-2023-5723 was patched at 2023-10-30
96. Code Injection - GLPI (CVE-2023-42461) - Medium [375]
Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The ITIL actors input field from the Ticket form can be used to perform a SQL injection. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.97 | 15 | Code Injection | |
0.5 | 14 | Product detected by a:glpi-project:glpi (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00076, EPSS Percentile is 0.31592 |
redos: CVE-2023-42461 was patched at 2023-11-09
97. Security Feature Bypass - grafana (CVE-2022-39306) - Medium [375]
Description: Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:grafana:grafana (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.4. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00145, EPSS Percentile is 0.50334 |
oraclelinux: CVE-2022-39306 was patched at 2023-11-11
almalinux: CVE-2022-39306 was patched at 2023-11-07
redhat: CVE-2022-39306 was patched at 2023-11-07
98. Information Disclosure - Request Tracker (CVE-2023-45024) - Medium [374]
Description: Best Practical Request Tracker (RT) 5 before 5.0.5 allows
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:bestpractical:request_tracker (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00087, EPSS Percentile is 0.3625 |
debian: CVE-2023-45024 was patched at 2023-10-30, unknown date
99. Information Disclosure - Traffic Server (CVE-2023-41752) - Medium [374]
Description: Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2. Users are recommended to upgrade to version 8.1.9 or 9.2.3, which fixes the issue.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:apache:traffic_server (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00102, EPSS Percentile is 0.41352 |
debian: CVE-2023-41752 was patched at 2023-11-05, 2023-11-06, unknown date
100. Information Disclosure - Linux Kernel (CVE-2023-39189) - Medium [369]
Description: A flaw was found in the Netfilter subsystem in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.5 | 10 | CVSS Base Score is 5.1. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-39189 was patched at 2024-01-11, unknown date
ubuntu: CVE-2023-39189 was patched at 2023-10-31, 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
101. Elevation of Privilege - grafana (CVE-2022-23552) - Medium [366]
Description: Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. An attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file containing JavaScript. This means that vertical
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.5 | 14 | Product detected by a:grafana:grafana (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 7.3. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.001, EPSS Percentile is 0.40862 |
oraclelinux: CVE-2022-23552 was patched at 2023-11-11
almalinux: CVE-2022-23552 was patched at 2023-11-07
redhat: CVE-2022-23552 was patched at 2023-11-07
102. Information Disclosure - Mozilla Firefox (CVE-2023-5722) - Medium [364]
Description: Using iterative requests an attacker was able to learn the size of an opaque response, as well as the contents of a server-supplied Vary header. This vulnerability affects
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.18 |
ubuntu: CVE-2023-5722 was patched at 2023-10-30
103. Information Disclosure - Mozilla Firefox (CVE-2023-5725) - Medium [364]
Description: A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00067, EPSS Percentile is 0.27733 |
debian: CVE-2023-5725 was patched at 2023-10-25, 2023-10-27, unknown date
ubuntu: CVE-2023-5725 was patched at 2023-10-30, 2023-11-02
oraclelinux: CVE-2023-5725 was patched at 2023-10-30, 2023-10-31
almalinux: CVE-2023-5725 was patched at 2023-10-30
redhat: CVE-2023-5725 was patched at 2023-10-30
104. Security Feature Bypass - Cobbler (CVE-2021-40324) - Medium [363]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00062, EPSS Percentile is 0.24803 |
ubuntu: CVE-2021-40324 was patched at 2023-11-13
105. Security Feature Bypass - certifi (CVE-2023-37920) - Medium [363]
Description: Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:kennethreitz:certifi (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00059, EPSS Percentile is 0.22827 |
debian: CVE-2023-37920 was patched at unknown date
oraclelinux: CVE-2023-37920 was patched at 2023-12-18, 2024-01-11
almalinux: CVE-2023-37920 was patched at 2023-12-12, 2024-01-10
redhat: CVE-2023-37920 was patched at 2023-11-08, 2023-11-21, 2023-11-28, 2023-12-12, 2024-01-10
106. Information Disclosure - Request Tracker (CVE-2023-41259) - Medium [362]
Description: Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:bestpractical:request_tracker (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00064, EPSS Percentile is 0.26465 |
debian: CVE-2023-41259 was patched at 2023-10-30, 2023-10-31, unknown date
ubuntu: CVE-2023-41259 was patched at 2023-12-04
107. Information Disclosure - Request Tracker (CVE-2023-41260) - Medium [362]
Description: Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:bestpractical:request_tracker (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00064, EPSS Percentile is 0.26465 |
debian: CVE-2023-41260 was patched at 2023-10-30, 2023-10-31, unknown date
ubuntu: CVE-2023-41260 was patched at 2023-12-04
108. Information Disclosure - grafana (CVE-2022-39201) - Medium [362]
Description: Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:grafana:grafana (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00092, EPSS Percentile is 0.38923 |
oraclelinux: CVE-2022-39201 was patched at 2023-11-11
almalinux: CVE-2022-39201 was patched at 2023-11-07
redhat: CVE-2022-39201 was patched at 2023-11-07
109. Authentication Bypass - grafana (CVE-2022-31130) - Medium [360]
Description: Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | Product detected by a:grafana:grafana (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00102, EPSS Percentile is 0.41291 |
oraclelinux: CVE-2022-31130 was patched at 2023-11-11
almalinux: CVE-2022-31130 was patched at 2023-11-07
redhat: CVE-2022-31130 was patched at 2023-11-07
110. Denial of Service - Linux Kernel (CVE-2022-38457) - Medium [358]
Description: A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 6.3. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2022-38457 was patched at unknown date
oraclelinux: CVE-2022-38457 was patched at 2023-11-12, 2023-11-17
almalinux: CVE-2022-38457 was patched at 2023-11-14
redhat: CVE-2022-38457 was patched at 2023-11-14
111. Denial of Service - Linux Kernel (CVE-2022-40133) - Medium [358]
Description: A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 6.3. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2022-40133 was patched at unknown date
oraclelinux: CVE-2022-40133 was patched at 2023-11-12, 2023-11-17
almalinux: CVE-2022-40133 was patched at 2023-11-14
redhat: CVE-2022-40133 was patched at 2023-11-14
112. Denial of Service - Linux Kernel (CVE-2023-34324) - Medium [358]
Description: Closing of an event channel in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.19171 |
debian: CVE-2023-34324 was patched at 2024-01-02, 2024-01-11, unknown date
ubuntu: CVE-2023-34324 was patched at 2023-10-31
113. Cross Site Scripting - grafana (CVE-2022-39324) - Medium [357]
Description: Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.8 | 15 | Cross Site Scripting | |
0.5 | 14 | Product detected by a:grafana:grafana (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.7. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00092, EPSS Percentile is 0.387 |
oraclelinux: CVE-2022-39324 was patched at 2023-11-11
almalinux: CVE-2022-39324 was patched at 2023-11-07
redhat: CVE-2022-39324 was patched at 2023-11-07
114. Memory Corruption - OpenSSL (CVE-2023-5363) - Medium [353]
Description: Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases,
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.8 | 14 | A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00069, EPSS Percentile is 0.2866 |
debian: CVE-2023-5363 was patched at 2023-10-24, unknown date
ubuntu: CVE-2023-5363 was patched at 2023-10-24
oraclelinux: CVE-2023-5363 was patched at 2024-01-22, 2024-01-25
almalinux: CVE-2023-5363 was patched at 2024-01-22
redhat: CVE-2023-5363 was patched at 2024-01-22, 2024-01-25
redos: CVE-2023-5363 was patched at 2023-11-09, 2023-11-10
115. Denial of Service - Go (CVE-2023-39322) - Medium [351]
Description: QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:golang:go (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00088, EPSS Percentile is 0.36917 |
oraclelinux: CVE-2023-39322 was patched at 2023-12-13, 2023-12-14, 2024-01-11
almalinux: CVE-2023-39322 was patched at 2023-12-12, 2024-01-10
redhat: CVE-2023-39322 was patched at 2023-10-31, 2023-11-15, 2023-12-12, 2024-01-10
116. Incorrect Calculation - zlib (CVE-2023-45853) - Medium [351]
Description: MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:zlib:zlib (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00121, EPSS Percentile is 0.46321 |
debian: CVE-2023-45853 was patched at 2023-11-28, unknown date
redos: CVE-2023-45853 was patched at 2023-10-20
117. Security Feature Bypass - GLPI (CVE-2023-42462) - Medium [351]
Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The document upload process can be diverted to delete some files. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:glpi-project:glpi (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.7. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00048, EPSS Percentile is 0.14748 |
redos: CVE-2023-42462 was patched at 2023-11-09
118. Security Feature Bypass - browserify-sign (CVE-2023-46234) - Medium [351]
Description: browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:browserify:browserify-sign (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.17739 |
debian: CVE-2023-46234 was patched at 2023-10-29, 2023-10-30, unknown date
119. Information Disclosure - grafana (CVE-2022-39307) - Medium [350]
Description: Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a “user not found” message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:grafana:grafana (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.7. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00075, EPSS Percentile is 0.30833 |
oraclelinux: CVE-2022-39307 was patched at 2023-11-11
almalinux: CVE-2022-39307 was patched at 2023-11-07
redhat: CVE-2022-39307 was patched at 2023-11-07
120. Authentication Bypass - Barbican (CVE-2023-1633) - Medium [348]
Description: A credentials leak flaw was found in OpenStack Barbican. This flaw allows a local authenticated attacker to read the configuration file, gaining access to sensitive credentials.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | Product detected by a:openstack:barbican (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.6. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
redhat: CVE-2023-1633 was patched at 2023-11-08
121. Authentication Bypass - Cobbler (CVE-2021-45083) - Medium [348]
Description: An issue was discovered in Cobbler before 3.3.1. Files in /etc/
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS | |
0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
ubuntu: CVE-2021-45083 was patched at 2023-11-13
122. Denial of Service - Linux Kernel (CVE-2023-4732) - Medium [346]
Description: A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.5 | 10 | CVSS Base Score is 4.7. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-4732 was patched at unknown date
oraclelinux: CVE-2023-4732 was patched at 2023-11-17
almalinux: CVE-2023-4732 was patched at 2023-11-14
redhat: CVE-2023-4732 was patched at 2023-11-14, 2023-11-28, 2024-01-25
123. Elevation of Privilege - insights-client (CVE-2023-3972) - Medium [342]
Description: A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.85 | 15 | Elevation of Privilege | |
0.5 | 14 | Product detected by a:redhat:insights-client (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
redhat: CVE-2023-3972 was patched at 2023-11-02, 2023-11-08
124. Authentication Bypass - Redis (CVE-2023-45148) - Medium [341]
Description: Nextcloud is an open source home cloud server. When Memcached is used as `memcache.distributed` the rate limiting in Nextcloud Server could be reset unexpectedly resetting the rate count earlier than intended. Users are advised to upgrade to versions 25.0.11, 26.0.6 or 27.1.0. Users unable to upgrade should change their config setting `memcache.distributed` to `\OC\Memcache\
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.95 | 15 | Authentication Bypass | |
0.6 | 14 | Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.18495 |
redos: CVE-2023-45148 was patched at 2023-10-24
125. Denial of Service - Mozilla Firefox (CVE-2023-5721) - Medium [341]
Description: It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay. This vulnerability affects
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.0007, EPSS Percentile is 0.29117 |
debian: CVE-2023-5721 was patched at 2023-10-25, 2023-10-27, unknown date
ubuntu: CVE-2023-5721 was patched at 2023-10-30, 2023-11-02
oraclelinux: CVE-2023-5721 was patched at 2023-10-30, 2023-10-31
almalinux: CVE-2023-5721 was patched at 2023-10-30
redhat: CVE-2023-5721 was patched at 2023-10-30
126. Denial of Service - Go (CVE-2023-39321) - Medium [339]
Description: Processing an incomplete post-handshake message for a QUIC connection can
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:golang:go (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00074, EPSS Percentile is 0.3069 |
oraclelinux: CVE-2023-39321 was patched at 2023-12-13, 2023-12-14, 2024-01-11
almalinux: CVE-2023-39321 was patched at 2023-12-12, 2024-01-10
redhat: CVE-2023-39321 was patched at 2023-10-31, 2023-11-15, 2023-12-12, 2024-01-10
127. Incorrect Calculation - memcached (CVE-2023-46853) - Medium [339]
Description: In Memcached before 1.6.22, an off-by-one error exists when processing proxy requests in proxy mode, if \n is used instead of \r\n.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:memcached:memcached (exists in CPE dict) | |
1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00091, EPSS Percentile is 0.38375 |
debian: CVE-2023-46853 was patched at unknown date
ubuntu: CVE-2023-46853 was patched at 2023-11-13
128. Security Feature Bypass - Open VM Tools (CVE-2023-34059) - Medium [339]
Description: open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper. A malicious actor with non-root privileges may be able to hijack the /dev/uinput file descriptor allowing them to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:vmware:open_vm_tools (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 7.4. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-34059 was patched at 2023-10-31, 2023-11-06, unknown date
ubuntu: CVE-2023-34059 was patched at 2023-10-31, 2023-12-06
oraclelinux: CVE-2023-34059 was patched at 2023-11-16, 2023-11-21
almalinux: CVE-2023-34059 was patched at 2023-11-15
redhat: CVE-2023-34059 was patched at 2023-11-15
129. Security Feature Bypass - grafana (CVE-2022-31123) - Medium [339]
Description: Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Product detected by a:grafana:grafana (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00057, EPSS Percentile is 0.21578 |
oraclelinux: CVE-2022-31123 was patched at 2023-11-11
almalinux: CVE-2022-31123 was patched at 2023-11-07
redhat: CVE-2022-31123 was patched at 2023-11-07
130. Information Disclosure - nextcloud_server (CVE-2023-45151) - Medium [338]
Description: Nextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:nextcloud:nextcloud_server (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0006, EPSS Percentile is 0.23686 |
redos: CVE-2023-45151 was patched at 2023-10-24
131. Authentication Bypass - Rabbitmq-c (CVE-2023-35789) - Medium [336]
Description: An issue was discovered in the C AMQP client library (aka rabbitmq-c) through 0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g., for amqp-publish or amqp-consume) and are thus visible to local attackers by listing a process and its arguments.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | Product detected by a:rabbitmq-c_project:rabbitmq-c (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-35789 was patched at unknown date
oraclelinux: CVE-2023-35789 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-35789 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-35789 was patched at 2023-11-07, 2023-11-14
132. Spoofing - Mozilla Firefox (CVE-2023-5732) - Medium [335]
Description: An attacker could have created a malicious link using bidirectional characters to
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.4 | 15 | Spoofing | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00099, EPSS Percentile is 0.40734 |
debian: CVE-2023-5732 was patched at 2023-10-25, 2023-10-27, unknown date
ubuntu: CVE-2023-5732 was patched at 2023-11-02
oraclelinux: CVE-2023-5732 was patched at 2023-10-30, 2023-10-31
almalinux: CVE-2023-5732 was patched at 2023-10-30
redhat: CVE-2023-5732 was patched at 2023-10-30
133. Memory Corruption - Linux Kernel (CVE-2022-3523) - Medium [334]
Description: A vulnerability was found in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00073, EPSS Percentile is 0.30126 |
debian: CVE-2022-3523 was patched at unknown date
oraclelinux: CVE-2022-3523 was patched at 2023-11-12
134. Cross Site Scripting - Cobbler (CVE-2018-1000225) - Medium [333]
Description: Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Cross Site Scripting (XSS) vulnerability in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.8 | 15 | Cross Site Scripting | |
0.5 | 14 | Cobbler is a Linux provisioning server that facilitates and automates the network-based system installation of multiple computer operating systems from a central point using services such as DHCP, TFTP, and DNS | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00066, EPSS Percentile is 0.27532 |
ubuntu: CVE-2018-1000225 was patched at 2023-11-13
135. Cross Site Scripting - Go (CVE-2023-39318) - Medium [333]
Description: The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.8 | 15 | Cross Site Scripting | |
0.5 | 14 | Product detected by a:golang:go (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00084, EPSS Percentile is 0.34874 |
debian: CVE-2023-39318 was patched at unknown date
ubuntu: CVE-2023-39318 was patched at 2024-01-11
oraclelinux: CVE-2023-39318 was patched at 2023-12-13, 2023-12-14, 2024-01-11
almalinux: CVE-2023-39318 was patched at 2023-12-12, 2024-01-10
redhat: CVE-2023-39318 was patched at 2023-10-31, 2023-11-15, 2023-12-12, 2024-01-10
136. Cross Site Scripting - Sanitize (CVE-2023-36823) - Medium [333]
Description: Sanitize is an allowlist-based HTML and CSS sanitizer. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML and CSS through Sanitize starting with version 3.0.0 and prior to version 6.0.2 when Sanitize is configured to use the built-in "relaxed" config or when using a custom config that allows `style` elements and one or more CSS at-rules. This could result in cross-site scripting or other undesired behavior when the malicious HTML and CSS are rendered in a browser. Sanitize 6.0.2 performs additional escaping of CSS in `style` element content, which fixes this issue. Users who are unable to upgrade can prevent this issue by using a Sanitize config that doesn't allow `style` elements, using a Sanitize config that doesn't allow CSS at-rules, or by manually escaping the character sequence `</` as `<\/` in `style` element content.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.8 | 15 | Cross Site Scripting | |
0.5 | 14 | Product detected by a:sanitize_project:sanitize (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16459 |
debian: CVE-2023-36823 was patched at 2023-11-14, unknown date
137. Denial of Service - GLPI (CVE-2023-41324) - Medium [327]
Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user that have read access on users resource can steal accounts of other users. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:glpi-project:glpi (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16274 |
redos: CVE-2023-41324 was patched at 2023-11-09
138. Denial of Service - GLPI (CVE-2023-41326) - Medium [327]
Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A logged user from any profile can hijack the Kanban feature to alter any user field, and end-up with stealing its account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:glpi-project:glpi (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16274 |
redos: CVE-2023-41326 was patched at 2023-11-09
139. Information Disclosure - NSS (CVE-2023-4421) - Medium [326]
Description: The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks. Both the overall correctness of the padding as well as the length of the encrypted message was leaking through timing side-channel. By sending large number of attacker-selected ciphertexts, the attacker would be able to decrypt a previously intercepted PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA key exchange), or forge a signature using the victim's key. The issue was fixed by implementing the implicit rejection algorithm, in which the NSS returns a deterministic random message in case invalid padding is detected, as proposed in the Marvin Attack paper. This vulnerability affects NSS < 3.61.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:mozilla:nss (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00049, EPSS Percentile is 0.1497 |
debian: CVE-2023-4421 was patched at 2023-10-28, unknown date
140. Authentication Bypass - shadow-utils (CVE-2023-4641) - Medium [324]
Description: A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.95 | 15 | Authentication Bypass | |
0.5 | 14 | Product detected by a:shadow-maint:shadow-utils (does NOT exist in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.7. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12067 |
debian: CVE-2023-4641 was patched at unknown date
oraclelinux: CVE-2023-4641 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-4641 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-4641 was patched at 2023-11-07, 2023-11-14, 2024-01-25
141. Open Redirect - urllib3 (CVE-2018-25091) - Medium [324]
Description: urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.75 | 15 | Open Redirect | |
0.5 | 14 | Product detected by a:python:urllib3 (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00072, EPSS Percentile is 0.29656 |
debian: CVE-2018-25091 was patched at unknown date
ubuntu: CVE-2018-25091 was patched at 2023-11-07, 2023-11-15
142. Incorrect Calculation - Linux Kernel (CVE-2023-31085) - Medium [322]
Description: An issue was discovered in drivers/mtd/ubi/cdev.c in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-31085 was patched at unknown date
ubuntu: CVE-2023-31085 was patched at 2023-10-31, 2023-11-21, 2023-11-27, 2023-11-28, 2023-11-30, 2023-12-05, 2023-12-06, 2024-01-09
143. Memory Corruption - Linux Kernel (CVE-2023-1249) - Medium [322]
Description: A use-after-free flaw was found in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-1249 was patched at unknown date
oraclelinux: CVE-2023-1249 was patched at 2023-11-12
144. Memory Corruption - Linux Kernel (CVE-2023-3358) - Medium [322]
Description: A null pointer dereference was found in the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
debian: CVE-2023-3358 was patched at unknown date
oraclelinux: CVE-2023-3358 was patched at 2023-11-12
145. Cross Site Scripting - Go (CVE-2023-39319) - Medium [321]
Description: The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.8 | 15 | Cross Site Scripting | |
0.5 | 14 | Product detected by a:golang:go (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00061, EPSS Percentile is 0.2399 |
debian: CVE-2023-39319 was patched at unknown date
ubuntu: CVE-2023-39319 was patched at 2024-01-11
oraclelinux: CVE-2023-39319 was patched at 2023-12-13, 2023-12-14, 2024-01-11
almalinux: CVE-2023-39319 was patched at 2023-12-12, 2024-01-10
redhat: CVE-2023-39319 was patched at 2023-10-31, 2023-11-15, 2023-12-12, 2024-01-10
146. Cross Site Scripting - Networking (CVE-2023-3978) - Medium [321]
Description: Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.8 | 15 | Cross Site Scripting | |
0.5 | 14 | Product detected by a:golang:networking (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.18 |
debian: CVE-2023-3978 was patched at unknown date
oraclelinux: CVE-2023-3978 was patched at 2023-11-11, 2023-11-18
almalinux: CVE-2023-3978 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-3978 was patched at 2023-10-31, 2023-11-07, 2023-11-14
147. Information Disclosure - GLPI (CVE-2023-41323) - Medium [314]
Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can enumerate users logins. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:glpi-project:glpi (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.179 |
redos: CVE-2023-41323 was patched at 2023-11-09
148. Memory Corruption - QEMU (CVE-2023-2680) - Medium [313]
Description: This CVE exists because of an incomplete fix for CVE-2021-3750. More specifically, the
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.7 | 14 | QEMU is a generic and open source machine & userspace emulator and virtualizer | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.0573 |
oraclelinux: CVE-2023-2680 was patched at 2023-11-11
almalinux: CVE-2023-2680 was patched at 2023-11-07
redhat: CVE-2023-2680 was patched at 2023-11-07
149. Spoofing - Chromium (CVE-2023-5850) - Medium [311]
Description: Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.4 | 15 | Spoofing | |
0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.5 | 10 | EPSS Probability is 0.00138, EPSS Percentile is 0.49339 |
debian: CVE-2023-5850 was patched at 2023-11-02, unknown date
150. Denial of Service - tiffcrop (CVE-2023-3576) - Medium [308]
Description: A memory leak flaw was found in Libtiff's
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.6 | 14 | Tiffcrop processes one or more files created according to the Tag Image File Format, Revision 6.0, specification into one or more TIFF file(s) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.08097 |
debian: CVE-2023-3576 was patched at 2023-11-27, unknown date
ubuntu: CVE-2023-3576 was patched at 2023-11-23
oraclelinux: CVE-2023-3576 was patched at 2023-11-11
almalinux: CVE-2023-3576 was patched at 2023-11-07
redhat: CVE-2023-3576 was patched at 2023-11-07
151. Information Disclosure - Redis (CVE-2023-45145) - Medium [307]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.6 | 14 | Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability | |
0.4 | 10 | CVSS Base Score is 3.6. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.08226 |
debian: CVE-2023-45145 was patched at 2023-10-23, unknown date
ubuntu: CVE-2023-45145 was patched at 2023-12-05
redos: CVE-2023-45145 was patched at 2023-10-30
152. Denial of Service - MySQL (CVE-2023-22059) - Medium [303]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22059 was patched at 2023-10-30
153. Denial of Service - MySQL (CVE-2023-22079) - Medium [303]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22079 was patched at 2023-10-30
154. Denial of Service - Open Virtual Network (CVE-2023-3153) - Medium [303]
Description: A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:ovn:open_virtual_network (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.0008, EPSS Percentile is 0.33408 |
debian: CVE-2023-3153 was patched at unknown date
redhat: CVE-2023-3153 was patched at 2023-10-31, 2023-11-08
155. Path Traversal - Create Agent (CVE-2023-43803) - Medium [303]
Description: Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can delete arbitrary files or folders belonging to the user that runs the Arduino Create Agent via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Path Traversal | |
0.5 | 14 | Product detected by a:arduino:create_agent (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0006, EPSS Percentile is 0.23513 |
debian: CVE-2023-43803 was patched at 2023-11-08
156. Information Disclosure - GLPI (CVE-2023-41321) - Medium [302]
Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user can enumerate sensitive fields values on resources on which he has read access. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:glpi-project:glpi (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00049, EPSS Percentile is 0.1497 |
redos: CVE-2023-41321 was patched at 2023-11-09
157. Denial of Service - GLPI (CVE-2023-41322) - Medium [291]
Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A user with write access to another user can make requests to change the latter's password and then take control of their account. Users are advised to upgrade to version 10.0.10. There are no known work around for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:glpi-project:glpi (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16274 |
redos: CVE-2023-41322 was patched at 2023-11-09
158. Denial of Service - MySQL (CVE-2023-22084) - Medium [291]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.43 and prior, 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.20347 |
debian: CVE-2023-22084 was patched at unknown date
ubuntu: CVE-2023-22084 was patched at 2023-10-30, 2024-01-15, 2024-01-25
159. Denial of Service - Xrdp (CVE-2023-42822) - Medium [291]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | xrdp is an open source remote desktop protocol server | |
0.5 | 10 | CVSS Base Score is 4.6. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00059, EPSS Percentile is 0.22959 |
debian: CVE-2023-42822 was patched at unknown date
ubuntu: CVE-2023-42822 was patched at 2023-11-08
redos: CVE-2023-42822 was patched at 2023-10-24
160. Incorrect Calculation - postgresql (CVE-2023-5868) - Medium [291]
Description: A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals without type designation can disclose bytes, potentially revealing notable and confidential information. This issue exists due to excessive data output in aggregate function calls, enabling remote users to read some portion of system memory.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:postgresql:postgresql (exists in CPE dict) | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.6 | 10 | EPSS Probability is 0.0018, EPSS Percentile is 0.55328 |
debian: CVE-2023-5868 was patched at 2023-11-13, 2023-11-14, unknown date
ubuntu: CVE-2023-5868 was patched at 2023-12-06, 2024-01-17
oraclelinux: CVE-2023-5868 was patched at 2023-11-30, 2023-12-13, 2023-12-15, 2023-12-18, 2023-12-20
almalinux: CVE-2023-5868 was patched at 2023-11-29, 2023-12-11, 2023-12-13, 2023-12-20
redhat: CVE-2023-5868 was patched at 2023-11-28, 2023-11-29, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-07, 2023-12-11, 2023-12-13, 2023-12-20
161. Incorrect Calculation - zchunk (CVE-2023-46228) - Medium [291]
Description: zchunk before 1.3.2 has multiple integer overflows via malformed zchunk files to lib/comp/comp.c, lib/comp/zstd/zstd.c, lib/dl/multipart.c, or lib/header.c.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | Product detected by a:zchunk:zchunk (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.16754 |
debian: CVE-2023-46228 was patched at unknown date
redos: CVE-2023-46228 was patched at 2023-10-30
162. Information Disclosure - urllib3 (CVE-2023-45803) - Medium [291]
Description: urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.83 | 15 | Information Disclosure | |
0.5 | 14 | Product detected by a:python:urllib3 (exists in CPE dict) | |
0.4 | 10 | CVSS Base Score is 4.2. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.07745 |
debian: CVE-2023-45803 was patched at unknown date
ubuntu: CVE-2023-45803 was patched at 2023-11-07, 2023-11-15
oraclelinux: CVE-2023-45803 was patched at 2024-01-10, 2024-01-25
almalinux: CVE-2023-45803 was patched at 2024-01-10, 2024-01-25
redhat: CVE-2023-45803 was patched at 2024-01-10, 2024-01-18, 2024-01-25
163. Denial of Service - MySQL (CVE-2023-22032) - Medium [279]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22032 was patched at 2023-10-30
164. Denial of Service - MySQL (CVE-2023-22064) - Medium [279]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22064 was patched at 2023-10-30
165. Denial of Service - MySQL (CVE-2023-22066) - Medium [279]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22066 was patched at 2023-10-30
166. Denial of Service - MySQL (CVE-2023-22068) - Medium [279]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22068 was patched at 2023-10-30
167. Denial of Service - MySQL (CVE-2023-22070) - Medium [279]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22070 was patched at 2023-10-30
168. Denial of Service - MySQL (CVE-2023-22078) - Medium [279]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22078 was patched at 2023-10-30
169. Denial of Service - MySQL (CVE-2023-22092) - Medium [279]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22092 was patched at 2023-10-30
170. Denial of Service - MySQL (CVE-2023-22097) - Medium [279]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22097 was patched at 2023-10-30
171. Denial of Service - MySQL (CVE-2023-22103) - Medium [279]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22103 was patched at 2023-10-30
172. Denial of Service - MySQL (CVE-2023-22112) - Medium [279]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22112 was patched at 2023-10-30
173. Denial of Service - MySQL (CVE-2023-22114) - Medium [279]
Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:oracle:mysql (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.9. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10871 |
ubuntu: CVE-2023-22114 was patched at 2023-10-30
174. Denial of Service - postgresql (CVE-2023-5870) - Medium [279]
Description: A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Denial of Service | |
0.5 | 14 | Product detected by a:postgresql:postgresql (exists in CPE dict) | |
0.2 | 10 | CVSS Base Score is 2.2. According to NVD data source | |
0.4 | 10 | EPSS Probability is 0.00115, EPSS Percentile is 0.44994 |
debian: CVE-2023-5870 was patched at 2023-11-13, 2023-11-14, unknown date
ubuntu: CVE-2023-5870 was patched at 2023-12-06, 2024-01-09, 2024-01-17
oraclelinux: CVE-2023-5870 was patched at 2023-11-30, 2023-12-13, 2023-12-15, 2023-12-18, 2023-12-20
almalinux: CVE-2023-5870 was patched at 2023-11-29, 2023-12-11, 2023-12-13, 2023-12-20
redhat: CVE-2023-5870 was patched at 2023-11-28, 2023-11-29, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-07, 2023-12-11, 2023-12-13, 2023-12-20
175. Memory Corruption - memcached (CVE-2023-46852) - Medium [279]
Description: In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:memcached:memcached (exists in CPE dict) | |
0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.1372 |
debian: CVE-2023-46852 was patched at unknown date
ubuntu: CVE-2023-46852 was patched at 2023-11-13
176. Path Traversal - GLPI (CVE-2023-41888) - Medium [279]
Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The lack of path filtering on the GLPI URL may allow an attacker to transmit a malicious URL of login page that can be used to attempt a phishing attack on user credentials. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.7 | 15 | Path Traversal | |
0.5 | 14 | Product detected by a:glpi-project:glpi (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00047, EPSS Percentile is 0.14194 |
redos: CVE-2023-41888 was patched at 2023-11-09
177. Spoofing - Mozilla Firefox (CVE-2023-5729) - Medium [276]
Description: A malicious web site can enter fullscreen mode while simultaneously triggering a WebAuthn prompt. This could have obscured the fullscreen notification and could have been leveraged in a
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.4 | 15 | Spoofing | |
0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.18 |
ubuntu: CVE-2023-5729 was patched at 2023-10-30
178. Memory Corruption - Ghostscript (CVE-2023-4042) - Medium [255]
Description: A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as it was claimed to be. This issue only affects the ghostscript package as shipped with Red Hat Enterprise Linux 8.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:artifex:ghostscript (exists in CPE dict) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.0802 |
oraclelinux: CVE-2023-4042 was patched at 2023-11-17
almalinux: CVE-2023-4042 was patched at 2023-11-14
redhat: CVE-2023-4042 was patched at 2023-11-14
179. Incorrect Calculation - Xrdp (CVE-2023-40184) - Medium [244]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Incorrect Calculation | |
0.5 | 14 | xrdp is an open source remote desktop protocol server | |
0.3 | 10 | CVSS Base Score is 2.6. According to NVD data source | |
0.3 | 10 | EPSS Probability is 0.00081, EPSS Percentile is 0.33691 |
debian: CVE-2023-40184 was patched at unknown date
ubuntu: CVE-2023-40184 was patched at 2023-11-08
180. Memory Corruption - X Server (CVE-2023-5380) - Medium [244]
Description: A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:x.org:x_server (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 4.7. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.12483 |
debian: CVE-2023-5380 was patched at 2023-10-25, unknown date
ubuntu: CVE-2023-5380 was patched at 2023-10-25, 2023-10-31
oraclelinux: CVE-2023-5380 was patched at 2023-11-22
redhat: CVE-2023-5380 was patched at 2023-11-21
redos: CVE-2023-5380 was patched at 2023-11-15
181. Memory Corruption - qt (CVE-2023-33285) - Medium [244]
Description: An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. QDnsLookup has a buffer over-read via a crafted reply from a DNS server.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:qt:qt (exists in CPE dict) | |
0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.1372 |
debian: CVE-2023-33285 was patched at unknown date
oraclelinux: CVE-2023-33285 was patched at 2023-11-12, 2023-11-17
almalinux: CVE-2023-33285 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-33285 was patched at 2023-11-07, 2023-11-14
182. Memory Corruption - GPAC (CVE-2023-46927) - Medium [239]
Description: GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in gf_isom_use_compact_size
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.4 | 14 | GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10354 |
debian: CVE-2023-46927 was patched at unknown date
redos: CVE-2023-46927 was patched at 2023-11-10
183. Memory Corruption - Procps (CVE-2023-4016) - Medium [208]
Description: Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0.5 | 15 | Memory Corruption | |
0.5 | 14 | Product detected by a:procps_project:procps (exists in CPE dict) | |
0.2 | 10 | CVSS Base Score is 2.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.06784 |
debian: CVE-2023-4016 was patched at unknown date
ubuntu: CVE-2023-4016 was patched at 2023-11-14
oraclelinux: CVE-2023-4016 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-4016 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-4016 was patched at 2023-11-07, 2023-11-14
redos: CVE-2023-4016 was patched at 2023-10-20
184. Unknown Vulnerability Type - GPAC (CVE-2023-46928) - Low [150]
Description: {'nvd_cve_data_all': 'GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.4 | 14 | GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10354 |
debian: CVE-2023-46928 was patched at unknown date
redos: CVE-2023-46928 was patched at 2023-11-10
185. Unknown Vulnerability Type - GPAC (CVE-2023-46930) - Low [150]
Description: {'nvd_cve_data_all': 'GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0.4 | 14 | GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity) | |
0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.10354 |
debian: CVE-2023-46930 was patched at unknown date
redos: CVE-2023-46930 was patched at 2023-11-10
186. Unknown Vulnerability Type - Unknown Product (CVE-2019-14560) - Low [0]
Description: {'nvd_cve_data_all': 'Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
oraclelinux: CVE-2019-14560 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2019-14560 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2019-14560 was patched at 2023-11-07, 2023-11-14, 2024-01-25
187. Unknown Vulnerability Type - Unknown Product (CVE-2023-40474) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-40474 was patched at 2023-10-24, 2023-10-28, unknown date
ubuntu: CVE-2023-40474 was patched at 2023-11-29
188. Unknown Vulnerability Type - Unknown Product (CVE-2023-40475) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-40475 was patched at 2023-10-24, 2023-10-28, unknown date
ubuntu: CVE-2023-40475 was patched at 2023-11-29
189. Unknown Vulnerability Type - Unknown Product (CVE-2023-40476) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-40476 was patched at 2023-10-24, 2023-10-28, unknown date
ubuntu: CVE-2023-40476 was patched at 2023-11-29
190. Unknown Vulnerability Type - Unknown Product (CVE-2023-4134) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-4134 was patched at unknown date
ubuntu: CVE-2023-4134 was patched at 2023-10-31, 2023-11-28
191. Unknown Vulnerability Type - Unknown Product (CVE-2023-42117) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-42117 was patched at unknown date
ubuntu: CVE-2023-42117 was patched at 2023-10-26
192. Unknown Vulnerability Type - Unknown Product (CVE-2023-42119) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The exploit's existence is NOT mentioned in available Data Sources | |
0 | 15 | Unknown Vulnerability Type | |
0 | 14 | Unknown Product | |
0.0 | 10 | CVSS Base Score is NA. No data. | |
0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2023-42119 was patched at unknown date
ubuntu: CVE-2023-42119 was patched at 2023-10-26
debian: CVE-2023-5631 was patched at 2023-10-23, 2023-10-25, unknown date
redos: CVE-2023-5631 was patched at 2023-10-26
debian: CVE-2023-39357 was patched at 2023-11-08, unknown date
debian: CVE-2023-39359 was patched at 2023-11-08, unknown date
debian: CVE-2023-39361 was patched at 2023-11-08, unknown date
debian: CVE-2023-39362 was patched at 2023-11-08, unknown date
ubuntu: CVE-2017-1000469 was patched at 2023-11-13
oraclelinux: CVE-2023-37460 was patched at 2023-11-13
redhat: CVE-2023-37460 was patched at 2023-11-13
debian: CVE-2023-22745 was patched at unknown date
oraclelinux: CVE-2023-22745 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-22745 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-22745 was patched at 2023-11-07, 2023-11-14
oraclelinux: CVE-2007-4559 was patched at 2023-11-11, 2023-11-17, 2023-11-18
almalinux: CVE-2007-4559 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2007-4559 was patched at 2023-11-07, 2023-11-08, 2023-11-14, 2024-01-23, 2024-01-25
debian: CVE-2023-23583 was patched at 2023-11-23, 2023-12-16, unknown date
ubuntu: CVE-2023-23583 was patched at 2023-11-17
oraclelinux: CVE-2023-23583 was patched at 2023-11-13, 2023-11-16
ubuntu: CVE-2022-0860 was patched at 2023-11-13
debian: CVE-2023-36478 was patched at 2023-10-30, unknown date
debian: CVE-2020-20898 was patched at unknown date
debian: CVE-2021-38090 was patched at unknown date
debian: CVE-2021-38091 was patched at unknown date
debian: CVE-2021-38092 was patched at unknown date
debian: CVE-2021-38093 was patched at unknown date
debian: CVE-2021-38094 was patched at unknown date
ubuntu: CVE-2020-20898 was patched at 2023-10-24
ubuntu: CVE-2021-38090 was patched at 2023-10-24
ubuntu: CVE-2021-38091 was patched at 2023-10-24
ubuntu: CVE-2021-38092 was patched at 2023-10-24
ubuntu: CVE-2021-38093 was patched at 2023-10-24
ubuntu: CVE-2021-38094 was patched at 2023-10-24
debian: CVE-2020-22038 was patched at unknown date
ubuntu: CVE-2020-22038 was patched at 2023-10-24
debian: CVE-2019-13147 was patched at 2023-11-13, unknown date
ubuntu: CVE-2019-13147 was patched at 2023-12-14
debian: CVE-2022-33065 was patched at unknown date
ubuntu: CVE-2022-33065 was patched at 2023-11-02
debian: CVE-2023-37788 was patched at unknown date
redhat: CVE-2023-37788 was patched at 2023-10-31
debian: CVE-2023-5349 was patched at 2023-10-22, unknown date
debian: CVE-2023-39365 was patched at 2023-11-08, unknown date
ubuntu: CVE-2021-45082 was patched at 2023-11-13
ubuntu: CVE-2014-3225 was patched at 2023-11-13
debian: CVE-2023-41105 was patched at unknown date
ubuntu: CVE-2023-41105 was patched at 2023-12-11
oraclelinux: CVE-2023-41105 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-41105 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-41105 was patched at 2023-11-07, 2023-11-14
debian: CVE-2023-46316 was patched at unknown date
ubuntu: CVE-2023-46316 was patched at 2023-11-14
redos: CVE-2023-46316 was patched at 2023-11-02
redos: CVE-2023-45150 was patched at 2023-10-20
debian: CVE-2023-4733 was patched at unknown date
debian: CVE-2023-4735 was patched at unknown date
debian: CVE-2023-47359 was patched at 2023-11-02, 2023-12-01, unknown date
debian: CVE-2023-4738 was patched at unknown date
debian: CVE-2023-4750 was patched at unknown date
debian: CVE-2023-4751 was patched at unknown date
debian: CVE-2023-5344 was patched at unknown date
debian: CVE-2023-5441 was patched at unknown date
debian: CVE-2023-5535 was patched at unknown date
ubuntu: CVE-2023-4733 was patched at 2023-10-25
ubuntu: CVE-2023-4735 was patched at 2023-10-25
ubuntu: CVE-2023-4738 was patched at 2023-10-25
ubuntu: CVE-2023-4750 was patched at 2023-10-25
ubuntu: CVE-2023-4751 was patched at 2023-10-25
ubuntu: CVE-2023-5344 was patched at 2023-10-25
ubuntu: CVE-2023-5441 was patched at 2023-10-25
ubuntu: CVE-2023-5535 was patched at 2023-10-25
redos: CVE-2023-47359 was patched at 2023-11-21
debian: CVE-2023-47359 was patched at 2023-11-02, 2023-12-01, unknown date
redos: CVE-2023-47359 was patched at 2023-11-21
debian: CVE-2022-24599 was patched at 2023-11-13, unknown date
ubuntu: CVE-2022-24599 was patched at 2023-12-14
debian: CVE-2023-42754 was patched at 2024-01-11, unknown date
ubuntu: CVE-2023-42754 was patched at 2023-10-31, 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
debian: CVE-2023-3896 was patched at unknown date
debian: CVE-2023-4734 was patched at unknown date
ubuntu: CVE-2023-3896 was patched at 2023-10-25
ubuntu: CVE-2023-4734 was patched at 2023-10-25
debian: CVE-2023-47360 was patched at 2023-11-02, 2023-12-01, unknown date
redos: CVE-2023-47360 was patched at 2023-11-21
debian: CVE-2023-39515 was patched at 2023-11-08, unknown date
debian: CVE-2023-39516 was patched at 2023-11-08, unknown date
debian: CVE-2023-1672 was patched at 2023-11-07, unknown date
ubuntu: CVE-2023-1672 was patched at 2023-11-20
oraclelinux: CVE-2023-1672 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-1672 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-1672 was patched at 2023-11-07, 2023-11-14
debian: CVE-2023-39364 was patched at 2023-11-08, unknown date
debian: CVE-2023-5857 was patched at 2023-11-02, unknown date
ubuntu: CVE-2021-40323 was patched at 2023-11-13
debian: CVE-2023-5869 was patched at 2023-11-13, 2023-11-14, unknown date
ubuntu: CVE-2023-5869 was patched at 2023-12-06, 2024-01-09, 2024-01-17
oraclelinux: CVE-2023-5869 was patched at 2023-11-30, 2023-12-13, 2023-12-15, 2023-12-18, 2023-12-19, 2023-12-20
almalinux: CVE-2023-5869 was patched at 2023-11-29, 2023-12-11, 2023-12-13, 2023-12-20
redhat: CVE-2023-5869 was patched at 2023-11-28, 2023-11-29, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-07, 2023-12-11, 2023-12-13, 2023-12-19, 2023-12-20
debian: CVE-2023-39191 was patched at unknown date
oraclelinux: CVE-2023-39191 was patched at 2023-11-12
redhat: CVE-2023-39191 was patched at 2024-01-23, 2024-01-25
debian: CVE-2023-39323 was patched at unknown date
ubuntu: CVE-2023-39323 was patched at 2024-01-11
redos: CVE-2023-39323 was patched at 2023-11-09
debian: CVE-2022-23613 was patched at unknown date
ubuntu: CVE-2022-23613 was patched at 2023-11-08
debian: CVE-2023-5480 was patched at 2023-11-02, unknown date
debian: CVE-2023-5482 was patched at 2023-11-02, unknown date
debian: CVE-2023-5851 was patched at 2023-11-02, unknown date
debian: CVE-2023-5853 was patched at 2023-11-02, unknown date
debian: CVE-2023-5858 was patched at 2023-11-02, unknown date
debian: CVE-2023-5859 was patched at 2023-11-02, unknown date
ubuntu: CVE-2018-1000226 was patched at 2023-11-13
ubuntu: CVE-2021-40324 was patched at 2023-11-13
debian: CVE-2022-29502 was patched at unknown date
ubuntu: CVE-2022-29502 was patched at 2023-10-30
debian: CVE-2023-44981 was patched at 2023-10-21, 2023-10-31, unknown date
ubuntu: CVE-2023-44981 was patched at 2024-01-16
debian: CVE-2023-28100 was patched at unknown date
oraclelinux: CVE-2023-28100 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-28100 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-28100 was patched at 2023-11-07, 2023-11-14
debian: CVE-2023-31486 was patched at unknown date
oraclelinux: CVE-2023-31486 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-31486 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-31486 was patched at 2023-11-07, 2023-11-14, 2024-01-25
debian: CVE-2023-34058 was patched at 2023-10-31, 2023-11-06, unknown date
ubuntu: CVE-2023-34058 was patched at 2023-10-31, 2023-12-06
oraclelinux: CVE-2023-34058 was patched at 2023-11-16, 2023-11-21
almalinux: CVE-2023-34058 was patched at 2023-11-15
redhat: CVE-2023-34058 was patched at 2023-11-15
ubuntu: CVE-2023-5723 was patched at 2023-10-30
oraclelinux: CVE-2022-31123 was patched at 2023-11-11
oraclelinux: CVE-2022-39306 was patched at 2023-11-11
almalinux: CVE-2022-31123 was patched at 2023-11-07
almalinux: CVE-2022-39306 was patched at 2023-11-07
redhat: CVE-2022-31123 was patched at 2023-11-07
redhat: CVE-2022-39306 was patched at 2023-11-07
debian: CVE-2023-37920 was patched at unknown date
oraclelinux: CVE-2023-37920 was patched at 2023-12-18, 2024-01-11
almalinux: CVE-2023-37920 was patched at 2023-12-12, 2024-01-10
redhat: CVE-2023-37920 was patched at 2023-11-08, 2023-11-21, 2023-11-28, 2023-12-12, 2024-01-10
redos: CVE-2023-42462 was patched at 2023-11-09
debian: CVE-2023-46234 was patched at 2023-10-29, 2023-10-30, unknown date
debian: CVE-2023-34059 was patched at 2023-10-31, 2023-11-06, unknown date
ubuntu: CVE-2023-34059 was patched at 2023-10-31, 2023-12-06
oraclelinux: CVE-2023-34059 was patched at 2023-11-16, 2023-11-21
almalinux: CVE-2023-34059 was patched at 2023-11-15
redhat: CVE-2023-34059 was patched at 2023-11-15
debian: CVE-2023-46846 was patched at 2024-01-09, unknown date
ubuntu: CVE-2023-46846 was patched at 2023-11-21
oraclelinux: CVE-2023-46846 was patched at 2023-11-03, 2023-11-07, 2023-11-16, 2023-11-22
almalinux: CVE-2023-46846 was patched at 2023-11-02, 2023-11-07, 2023-11-14
redhat: CVE-2023-46846 was patched at 2023-11-02, 2023-11-07, 2023-11-08, 2023-11-14
redos: CVE-2023-46846 was patched at 2023-11-21
debian: CVE-2023-31122 was patched at unknown date
ubuntu: CVE-2023-31122 was patched at 2023-11-22, 2023-11-23
redos: CVE-2023-31122 was patched at 2023-10-30
debian: CVE-2023-36054 was patched at 2023-10-22, unknown date
ubuntu: CVE-2023-36054 was patched at 2023-11-01, 2023-11-06
oraclelinux: CVE-2023-36054 was patched at 2023-11-11
oraclelinux: CVE-2023-39975 was patched at 2023-11-11
almalinux: CVE-2023-36054 was patched at 2023-11-07
almalinux: CVE-2023-39975 was patched at 2023-11-07
redhat: CVE-2023-36054 was patched at 2023-11-07
redhat: CVE-2023-39975 was patched at 2023-11-07
debian: CVE-2023-5472 was patched at 2023-10-26, unknown date
debian: CVE-2023-5852 was patched at 2023-11-02, unknown date
debian: CVE-2023-5854 was patched at 2023-11-02, unknown date
debian: CVE-2023-5855 was patched at 2023-11-02, unknown date
debian: CVE-2023-5856 was patched at 2023-11-02, unknown date
debian: CVE-2023-5996 was patched at 2023-11-09, unknown date
debian: CVE-2023-5730 was patched at 2023-10-25, 2023-10-27, unknown date
ubuntu: CVE-2023-5730 was patched at 2023-10-30, 2023-11-02
ubuntu: CVE-2023-5731 was patched at 2023-10-30
oraclelinux: CVE-2023-5730 was patched at 2023-10-30, 2023-10-31
almalinux: CVE-2023-5730 was patched at 2023-10-30
redhat: CVE-2023-5730 was patched at 2023-10-30
debian: CVE-2023-5363 was patched at 2023-10-24, unknown date
ubuntu: CVE-2023-5363 was patched at 2023-10-24
oraclelinux: CVE-2023-5363 was patched at 2024-01-22, 2024-01-25
almalinux: CVE-2023-5363 was patched at 2024-01-22
redhat: CVE-2023-5363 was patched at 2024-01-22, 2024-01-25
redos: CVE-2023-5363 was patched at 2023-11-09, 2023-11-10
debian: CVE-2022-3523 was patched at unknown date
debian: CVE-2023-1249 was patched at unknown date
debian: CVE-2023-3358 was patched at unknown date
oraclelinux: CVE-2022-3523 was patched at 2023-11-12
oraclelinux: CVE-2023-1249 was patched at 2023-11-12
oraclelinux: CVE-2023-3358 was patched at 2023-11-12
oraclelinux: CVE-2023-2680 was patched at 2023-11-11
almalinux: CVE-2023-2680 was patched at 2023-11-07
redhat: CVE-2023-2680 was patched at 2023-11-07
debian: CVE-2023-46852 was patched at unknown date
ubuntu: CVE-2023-46852 was patched at 2023-11-13
oraclelinux: CVE-2023-4042 was patched at 2023-11-17
almalinux: CVE-2023-4042 was patched at 2023-11-14
redhat: CVE-2023-4042 was patched at 2023-11-14
debian: CVE-2023-5380 was patched at 2023-10-25, unknown date
ubuntu: CVE-2023-5380 was patched at 2023-10-25, 2023-10-31
oraclelinux: CVE-2023-5380 was patched at 2023-11-22
redhat: CVE-2023-5380 was patched at 2023-11-21
redos: CVE-2023-5380 was patched at 2023-11-15
debian: CVE-2023-33285 was patched at unknown date
oraclelinux: CVE-2023-33285 was patched at 2023-11-12, 2023-11-17
almalinux: CVE-2023-33285 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-33285 was patched at 2023-11-07, 2023-11-14
debian: CVE-2023-46927 was patched at unknown date
redos: CVE-2023-46927 was patched at 2023-11-10
debian: CVE-2023-4016 was patched at unknown date
ubuntu: CVE-2023-4016 was patched at 2023-11-14
oraclelinux: CVE-2023-4016 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-4016 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-4016 was patched at 2023-11-07, 2023-11-14
redos: CVE-2023-4016 was patched at 2023-10-20
debian: CVE-2023-46847 was patched at 2024-01-09, unknown date
debian: CVE-2023-46848 was patched at unknown date
ubuntu: CVE-2023-46847 was patched at 2023-11-21, 2023-12-11
ubuntu: CVE-2023-46848 was patched at 2023-11-21
oraclelinux: CVE-2023-46847 was patched at 2023-11-03, 2023-11-07, 2023-11-08, 2023-11-16, 2023-11-22, 2024-01-12
oraclelinux: CVE-2023-46848 was patched at 2023-11-03, 2023-11-16
almalinux: CVE-2023-46847 was patched at 2023-11-02, 2023-11-07, 2023-11-14
almalinux: CVE-2023-46848 was patched at 2023-11-02, 2023-11-07
redhat: CVE-2023-46847 was patched at 2023-11-02, 2023-11-07, 2023-11-08, 2023-11-13, 2023-11-14, 2023-11-29
redhat: CVE-2023-46848 was patched at 2023-11-02, 2023-11-07
redos: CVE-2023-46847 was patched at 2023-11-21
redos: CVE-2023-46848 was patched at 2023-11-21
debian: CVE-2023-43622 was patched at unknown date
ubuntu: CVE-2023-43622 was patched at 2023-11-22
redos: CVE-2023-43622 was patched at 2023-10-30
debian: CVE-2023-5721 was patched at 2023-10-25, 2023-10-27, unknown date
debian: CVE-2023-5724 was patched at 2023-10-25, 2023-10-27, unknown date
debian: CVE-2023-5728 was patched at 2023-10-25, 2023-10-27, unknown date
ubuntu: CVE-2023-5721 was patched at 2023-10-30, 2023-11-02
ubuntu: CVE-2023-5724 was patched at 2023-10-30, 2023-11-02
ubuntu: CVE-2023-5728 was patched at 2023-10-30, 2023-11-02
oraclelinux: CVE-2023-5721 was patched at 2023-10-30, 2023-10-31
oraclelinux: CVE-2023-5724 was patched at 2023-10-30, 2023-10-31
oraclelinux: CVE-2023-5728 was patched at 2023-10-30, 2023-10-31
almalinux: CVE-2023-5721 was patched at 2023-10-30
almalinux: CVE-2023-5724 was patched at 2023-10-30
almalinux: CVE-2023-5728 was patched at 2023-10-30
redhat: CVE-2023-5721 was patched at 2023-10-30
redhat: CVE-2023-5724 was patched at 2023-10-30
redhat: CVE-2023-5728 was patched at 2023-10-30
debian: CVE-2022-38457 was patched at unknown date
debian: CVE-2022-40133 was patched at unknown date
debian: CVE-2023-34324 was patched at 2024-01-02, 2024-01-11, unknown date
debian: CVE-2023-4732 was patched at unknown date
ubuntu: CVE-2023-34324 was patched at 2023-10-31
oraclelinux: CVE-2022-38457 was patched at 2023-11-12, 2023-11-17
oraclelinux: CVE-2022-40133 was patched at 2023-11-12, 2023-11-17
oraclelinux: CVE-2023-4732 was patched at 2023-11-17
almalinux: CVE-2022-38457 was patched at 2023-11-14
almalinux: CVE-2022-40133 was patched at 2023-11-14
almalinux: CVE-2023-4732 was patched at 2023-11-14
redhat: CVE-2022-38457 was patched at 2023-11-14
redhat: CVE-2022-40133 was patched at 2023-11-14
redhat: CVE-2023-4732 was patched at 2023-11-14, 2023-11-28, 2024-01-25
oraclelinux: CVE-2023-39321 was patched at 2023-12-13, 2023-12-14, 2024-01-11
oraclelinux: CVE-2023-39322 was patched at 2023-12-13, 2023-12-14, 2024-01-11
almalinux: CVE-2023-39321 was patched at 2023-12-12, 2024-01-10
almalinux: CVE-2023-39322 was patched at 2023-12-12, 2024-01-10
redhat: CVE-2023-39321 was patched at 2023-10-31, 2023-11-15, 2023-12-12, 2024-01-10
redhat: CVE-2023-39322 was patched at 2023-10-31, 2023-11-15, 2023-12-12, 2024-01-10
redos: CVE-2023-41322 was patched at 2023-11-09
redos: CVE-2023-41324 was patched at 2023-11-09
redos: CVE-2023-41326 was patched at 2023-11-09
debian: CVE-2023-3576 was patched at 2023-11-27, unknown date
ubuntu: CVE-2023-3576 was patched at 2023-11-23
oraclelinux: CVE-2023-3576 was patched at 2023-11-11
almalinux: CVE-2023-3576 was patched at 2023-11-07
redhat: CVE-2023-3576 was patched at 2023-11-07
debian: CVE-2023-22084 was patched at unknown date
ubuntu: CVE-2023-22032 was patched at 2023-10-30
ubuntu: CVE-2023-22059 was patched at 2023-10-30
ubuntu: CVE-2023-22064 was patched at 2023-10-30
ubuntu: CVE-2023-22066 was patched at 2023-10-30
ubuntu: CVE-2023-22068 was patched at 2023-10-30
ubuntu: CVE-2023-22070 was patched at 2023-10-30
ubuntu: CVE-2023-22078 was patched at 2023-10-30
ubuntu: CVE-2023-22079 was patched at 2023-10-30
ubuntu: CVE-2023-22084 was patched at 2023-10-30, 2024-01-15, 2024-01-25
ubuntu: CVE-2023-22092 was patched at 2023-10-30
ubuntu: CVE-2023-22097 was patched at 2023-10-30
ubuntu: CVE-2023-22103 was patched at 2023-10-30
ubuntu: CVE-2023-22112 was patched at 2023-10-30
ubuntu: CVE-2023-22114 was patched at 2023-10-30
debian: CVE-2023-3153 was patched at unknown date
redhat: CVE-2023-3153 was patched at 2023-10-31, 2023-11-08
debian: CVE-2023-42822 was patched at unknown date
ubuntu: CVE-2023-42822 was patched at 2023-11-08
redos: CVE-2023-42822 was patched at 2023-10-24
debian: CVE-2023-5870 was patched at 2023-11-13, 2023-11-14, unknown date
ubuntu: CVE-2023-5870 was patched at 2023-12-06, 2024-01-09, 2024-01-17
oraclelinux: CVE-2023-5870 was patched at 2023-11-30, 2023-12-13, 2023-12-15, 2023-12-18, 2023-12-20
almalinux: CVE-2023-5870 was patched at 2023-11-29, 2023-12-11, 2023-12-13, 2023-12-20
redhat: CVE-2023-5870 was patched at 2023-11-28, 2023-11-29, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-07, 2023-12-11, 2023-12-13, 2023-12-20
debian: CVE-2023-1252 was patched at unknown date
debian: CVE-2023-33952 was patched at unknown date
debian: CVE-2023-5345 was patched at unknown date
ubuntu: CVE-2023-5345 was patched at 2023-10-31, 2023-11-21, 2023-11-27, 2023-11-28, 2023-11-30, 2023-12-06, 2024-01-09, 2024-01-25
oraclelinux: CVE-2023-1252 was patched at 2023-11-12, 2023-11-17
oraclelinux: CVE-2023-33952 was patched at 2023-11-12, 2023-11-17
oraclelinux: CVE-2023-5345 was patched at 2023-12-14, 2023-12-22
almalinux: CVE-2023-1252 was patched at 2023-11-14
almalinux: CVE-2023-33952 was patched at 2023-11-14
almalinux: CVE-2023-5345 was patched at 2023-12-12
redhat: CVE-2023-1252 was patched at 2023-11-14
redhat: CVE-2023-33952 was patched at 2023-11-14
redhat: CVE-2023-5345 was patched at 2023-12-12
debian: CVE-2023-5367 was patched at 2023-10-25, unknown date
ubuntu: CVE-2023-5367 was patched at 2023-10-25, 2023-10-31
oraclelinux: CVE-2023-5367 was patched at 2023-11-08, 2023-11-22, 2024-01-03
almalinux: CVE-2023-5367 was patched at 2024-01-02
redhat: CVE-2023-5367 was patched at 2023-11-08, 2023-11-21, 2023-11-28, 2024-01-02, 2024-01-10
redos: CVE-2023-5367 was patched at 2023-11-15
debian: CVE-2023-28101 was patched at unknown date
oraclelinux: CVE-2023-28101 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-28101 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-28101 was patched at 2023-11-07, 2023-11-14
oraclelinux: CVE-2022-23552 was patched at 2023-11-11
almalinux: CVE-2022-23552 was patched at 2023-11-07
redhat: CVE-2022-23552 was patched at 2023-11-07
redhat: CVE-2023-3972 was patched at 2023-11-02, 2023-11-08
debian: CVE-2023-5849 was patched at 2023-11-02, unknown date
debian: CVE-2023-45853 was patched at 2023-11-28, unknown date
redos: CVE-2023-45853 was patched at 2023-10-20
debian: CVE-2023-46853 was patched at unknown date
ubuntu: CVE-2023-46853 was patched at 2023-11-13
debian: CVE-2023-31085 was patched at unknown date
ubuntu: CVE-2023-31085 was patched at 2023-10-31, 2023-11-21, 2023-11-27, 2023-11-28, 2023-11-30, 2023-12-05, 2023-12-06, 2024-01-09
debian: CVE-2023-5868 was patched at 2023-11-13, 2023-11-14, unknown date
ubuntu: CVE-2023-5868 was patched at 2023-12-06, 2024-01-17
oraclelinux: CVE-2023-5868 was patched at 2023-11-30, 2023-12-13, 2023-12-15, 2023-12-18, 2023-12-20
almalinux: CVE-2023-5868 was patched at 2023-11-29, 2023-12-11, 2023-12-13, 2023-12-20
redhat: CVE-2023-5868 was patched at 2023-11-28, 2023-11-29, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-07, 2023-12-11, 2023-12-13, 2023-12-20
debian: CVE-2023-46228 was patched at unknown date
redos: CVE-2023-46228 was patched at 2023-10-30
debian: CVE-2023-40184 was patched at unknown date
ubuntu: CVE-2023-40184 was patched at 2023-11-08
oraclelinux: CVE-2023-39331 was patched at 2023-11-22
oraclelinux: CVE-2023-39332 was patched at 2023-11-22
almalinux: CVE-2023-39331 was patched at 2023-11-07, 2023-11-14, 2023-11-15
almalinux: CVE-2023-39332 was patched at 2023-11-14
redhat: CVE-2023-39331 was patched at 2023-11-07, 2023-11-14, 2023-11-15
redhat: CVE-2023-39332 was patched at 2023-11-14
debian: CVE-2023-43803 was patched at 2023-11-08
redos: CVE-2023-41888 was patched at 2023-11-09
debian: CVE-2023-33951 was patched at unknown date
debian: CVE-2023-39189 was patched at 2024-01-11, unknown date
ubuntu: CVE-2023-39189 was patched at 2023-10-31, 2023-11-21, 2023-11-30, 2023-12-05, 2023-12-06, 2023-12-11, 2023-12-12, 2023-12-13, 2024-01-05, 2024-01-09, 2024-01-10
oraclelinux: CVE-2023-33951 was patched at 2023-11-12, 2023-11-17
almalinux: CVE-2023-33951 was patched at 2023-11-14
redhat: CVE-2023-33951 was patched at 2023-11-14
redhat: CVE-2024-0443 was patched at 2023-11-14
debian: CVE-2023-41259 was patched at 2023-10-30, 2023-10-31, unknown date
debian: CVE-2023-41260 was patched at 2023-10-30, 2023-10-31, unknown date
debian: CVE-2023-45024 was patched at 2023-10-30, unknown date
ubuntu: CVE-2023-41259 was patched at 2023-12-04
ubuntu: CVE-2023-41260 was patched at 2023-12-04
debian: CVE-2023-41752 was patched at 2023-11-05, 2023-11-06, unknown date
debian: CVE-2023-5725 was patched at 2023-10-25, 2023-10-27, unknown date
ubuntu: CVE-2023-5722 was patched at 2023-10-30
ubuntu: CVE-2023-5725 was patched at 2023-10-30, 2023-11-02
oraclelinux: CVE-2023-5725 was patched at 2023-10-30, 2023-10-31
almalinux: CVE-2023-5725 was patched at 2023-10-30
redhat: CVE-2023-5725 was patched at 2023-10-30
oraclelinux: CVE-2022-39201 was patched at 2023-11-11
oraclelinux: CVE-2022-39307 was patched at 2023-11-11
almalinux: CVE-2022-39201 was patched at 2023-11-07
almalinux: CVE-2022-39307 was patched at 2023-11-07
redhat: CVE-2022-39201 was patched at 2023-11-07
redhat: CVE-2022-39307 was patched at 2023-11-07
redos: CVE-2023-45151 was patched at 2023-10-24
debian: CVE-2023-4421 was patched at 2023-10-28, unknown date
redos: CVE-2023-41321 was patched at 2023-11-09
redos: CVE-2023-41323 was patched at 2023-11-09
debian: CVE-2023-45145 was patched at 2023-10-23, unknown date
ubuntu: CVE-2023-45145 was patched at 2023-12-05
redos: CVE-2023-45145 was patched at 2023-10-30
debian: CVE-2023-45803 was patched at unknown date
ubuntu: CVE-2023-45803 was patched at 2023-11-07, 2023-11-15
oraclelinux: CVE-2023-45803 was patched at 2024-01-10, 2024-01-25
almalinux: CVE-2023-45803 was patched at 2024-01-10, 2024-01-25
redhat: CVE-2023-45803 was patched at 2024-01-10, 2024-01-18, 2024-01-25
redos: CVE-2023-41320 was patched at 2023-11-09
redos: CVE-2023-42461 was patched at 2023-11-09
ubuntu: CVE-2021-40325 was patched at 2023-11-13
ubuntu: CVE-2021-45083 was patched at 2023-11-13
oraclelinux: CVE-2022-31130 was patched at 2023-11-11
almalinux: CVE-2022-31130 was patched at 2023-11-07
redhat: CVE-2022-31130 was patched at 2023-11-07
redhat: CVE-2023-1633 was patched at 2023-11-08
redos: CVE-2023-45148 was patched at 2023-10-24
debian: CVE-2023-35789 was patched at unknown date
oraclelinux: CVE-2023-35789 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-35789 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-35789 was patched at 2023-11-07, 2023-11-14
debian: CVE-2023-4641 was patched at unknown date
oraclelinux: CVE-2023-4641 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2023-4641 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-4641 was patched at 2023-11-07, 2023-11-14, 2024-01-25
oraclelinux: CVE-2022-39324 was patched at 2023-11-11
almalinux: CVE-2022-39324 was patched at 2023-11-07
redhat: CVE-2022-39324 was patched at 2023-11-07
ubuntu: CVE-2018-1000225 was patched at 2023-11-13
debian: CVE-2023-39318 was patched at unknown date
debian: CVE-2023-39319 was patched at unknown date
ubuntu: CVE-2023-39318 was patched at 2024-01-11
ubuntu: CVE-2023-39319 was patched at 2024-01-11
oraclelinux: CVE-2023-39318 was patched at 2023-12-13, 2023-12-14, 2024-01-11
oraclelinux: CVE-2023-39319 was patched at 2023-12-13, 2023-12-14, 2024-01-11
almalinux: CVE-2023-39318 was patched at 2023-12-12, 2024-01-10
almalinux: CVE-2023-39319 was patched at 2023-12-12, 2024-01-10
redhat: CVE-2023-39318 was patched at 2023-10-31, 2023-11-15, 2023-12-12, 2024-01-10
redhat: CVE-2023-39319 was patched at 2023-10-31, 2023-11-15, 2023-12-12, 2024-01-10
debian: CVE-2023-36823 was patched at 2023-11-14, unknown date
debian: CVE-2023-3978 was patched at unknown date
oraclelinux: CVE-2023-3978 was patched at 2023-11-11, 2023-11-18
almalinux: CVE-2023-3978 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2023-3978 was patched at 2023-10-31, 2023-11-07, 2023-11-14
debian: CVE-2023-5732 was patched at 2023-10-25, 2023-10-27, unknown date
ubuntu: CVE-2023-5729 was patched at 2023-10-30
ubuntu: CVE-2023-5732 was patched at 2023-11-02
oraclelinux: CVE-2023-5732 was patched at 2023-10-30, 2023-10-31
almalinux: CVE-2023-5732 was patched at 2023-10-30
redhat: CVE-2023-5732 was patched at 2023-10-30
debian: CVE-2023-5850 was patched at 2023-11-02, unknown date
debian: CVE-2018-25091 was patched at unknown date
ubuntu: CVE-2018-25091 was patched at 2023-11-07, 2023-11-15
debian: CVE-2023-46928 was patched at unknown date
debian: CVE-2023-46930 was patched at unknown date
redos: CVE-2023-46928 was patched at 2023-11-10
redos: CVE-2023-46930 was patched at 2023-11-10
debian: CVE-2023-40474 was patched at 2023-10-24, 2023-10-28, unknown date
debian: CVE-2023-40475 was patched at 2023-10-24, 2023-10-28, unknown date
debian: CVE-2023-40476 was patched at 2023-10-24, 2023-10-28, unknown date
debian: CVE-2023-4134 was patched at unknown date
debian: CVE-2023-42117 was patched at unknown date
debian: CVE-2023-42119 was patched at unknown date
ubuntu: CVE-2023-40474 was patched at 2023-11-29
ubuntu: CVE-2023-40475 was patched at 2023-11-29
ubuntu: CVE-2023-40476 was patched at 2023-11-29
ubuntu: CVE-2023-4134 was patched at 2023-10-31, 2023-11-28
ubuntu: CVE-2023-42117 was patched at 2023-10-26
ubuntu: CVE-2023-42119 was patched at 2023-10-26
oraclelinux: CVE-2019-14560 was patched at 2023-11-11, 2023-11-17
almalinux: CVE-2019-14560 was patched at 2023-11-07, 2023-11-14
redhat: CVE-2019-14560 was patched at 2023-11-07, 2023-11-14, 2024-01-25