Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-42063 (GCVE-0-2024-42063)
Vulnerability from cvelistv5 – Published: 2024-07-29 15:52 – Updated: 2026-05-11 20:26| Vendor | Product | Version | |
|---|---|---|---|
| Linux | Linux |
Affected:
bd4cf0ed331a275e9bf5a49e6d0fd55dffc551b8 , < b30f3197a6cd080052d5d4973f9a6b479fd9fff5
(git)
Affected: bd4cf0ed331a275e9bf5a49e6d0fd55dffc551b8 , < d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf (git) Affected: bd4cf0ed331a275e9bf5a49e6d0fd55dffc551b8 , < 3189983c26108cf0990e5c46856dc9feb9470d12 (git) Affected: bd4cf0ed331a275e9bf5a49e6d0fd55dffc551b8 , < e8742081db7d01f980c6161ae1e8a1dbc1e30979 (git) |
|
| Linux | Linux |
Affected:
3.15
Unaffected: 0 , < 3.15 (semver) Unaffected: 6.1.97 , ≤ 6.1.* (semver) Unaffected: 6.6.37 , ≤ 6.6.* (semver) Unaffected: 6.9.8 , ≤ 6.9.* (semver) Unaffected: 6.10 , ≤ * (original_commit_for_fix) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-03T22:01:03.937Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42063",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-10T16:20:09.278781Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-11T17:33:08.514Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"kernel/bpf/core.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "b30f3197a6cd080052d5d4973f9a6b479fd9fff5",
"status": "affected",
"version": "bd4cf0ed331a275e9bf5a49e6d0fd55dffc551b8",
"versionType": "git"
},
{
"lessThan": "d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf",
"status": "affected",
"version": "bd4cf0ed331a275e9bf5a49e6d0fd55dffc551b8",
"versionType": "git"
},
{
"lessThan": "3189983c26108cf0990e5c46856dc9feb9470d12",
"status": "affected",
"version": "bd4cf0ed331a275e9bf5a49e6d0fd55dffc551b8",
"versionType": "git"
},
{
"lessThan": "e8742081db7d01f980c6161ae1e8a1dbc1e30979",
"status": "affected",
"version": "bd4cf0ed331a275e9bf5a49e6d0fd55dffc551b8",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"kernel/bpf/core.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "3.15"
},
{
"lessThan": "3.15",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.97",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.37",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.9.*",
"status": "unaffected",
"version": "6.9.8",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.10",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.97",
"versionStartIncluding": "3.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.37",
"versionStartIncluding": "3.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.8",
"versionStartIncluding": "3.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.10",
"versionStartIncluding": "3.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode\n\nsyzbot reported uninit memory usages during map_{lookup,delete}_elem.\n\n==========\nBUG: KMSAN: uninit-value in __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\nBUG: KMSAN: uninit-value in dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\n__dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\ndev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\n____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [inline]\nbpf_map_lookup_elem+0x5c/0x80 kernel/bpf/helpers.c:38\n___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997\n__bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237\n==========\n\nThe reproducer should be in the interpreter mode.\n\nThe C reproducer is trying to run the following bpf prog:\n\n 0: (18) r0 = 0x0\n 2: (18) r1 = map[id:49]\n 4: (b7) r8 = 16777216\n 5: (7b) *(u64 *)(r10 -8) = r8\n 6: (bf) r2 = r10\n 7: (07) r2 += -229\n ^^^^^^^^^^\n\n 8: (b7) r3 = 8\n 9: (b7) r4 = 0\n 10: (85) call dev_map_lookup_elem#1543472\n 11: (95) exit\n\nIt is due to the \"void *key\" (r2) passed to the helper. bpf allows uninit\nstack memory access for bpf prog with the right privileges. This patch\nuses kmsan_unpoison_memory() to mark the stack as initialized.\n\nThis should address different syzbot reports on the uninit \"void *key\"\nargument during map_{lookup,delete}_elem."
}
],
"providerMetadata": {
"dateUpdated": "2026-05-11T20:26:15.488Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5"
},
{
"url": "https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf"
},
{
"url": "https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12"
},
{
"url": "https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979"
}
],
"title": "bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2024-42063",
"datePublished": "2024-07-29T15:52:28.533Z",
"dateReserved": "2024-07-29T15:50:41.166Z",
"dateUpdated": "2026-05-11T20:26:15.488Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-42063",
"date": "2026-05-13",
"epss": "0.00031",
"percentile": "0.08933"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.1.97\", \"matchCriteriaId\": \"11DA4D7A-BB0A-4555-8D1D-ECCC5108F772\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.2\", \"versionEndExcluding\": \"6.6.37\", \"matchCriteriaId\": \"D72E033B-5323-4C4D-8818-36E1EBC3535F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.7\", \"versionEndExcluding\": \"6.9.8\", \"matchCriteriaId\": \"E95105F2-32E3-4C5F-9D18-7AEFD0E6275C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode\\n\\nsyzbot reported uninit memory usages during map_{lookup,delete}_elem.\\n\\n==========\\nBUG: KMSAN: uninit-value in __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\\nBUG: KMSAN: uninit-value in dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\\n__dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\\ndev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\\n____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [inline]\\nbpf_map_lookup_elem+0x5c/0x80 kernel/bpf/helpers.c:38\\n___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997\\n__bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237\\n==========\\n\\nThe reproducer should be in the interpreter mode.\\n\\nThe C reproducer is trying to run the following bpf prog:\\n\\n 0: (18) r0 = 0x0\\n 2: (18) r1 = map[id:49]\\n 4: (b7) r8 = 16777216\\n 5: (7b) *(u64 *)(r10 -8) = r8\\n 6: (bf) r2 = r10\\n 7: (07) r2 += -229\\n ^^^^^^^^^^\\n\\n 8: (b7) r3 = 8\\n 9: (b7) r4 = 0\\n 10: (85) call dev_map_lookup_elem#1543472\\n 11: (95) exit\\n\\nIt is due to the \\\"void *key\\\" (r2) passed to the helper. bpf allows uninit\\nstack memory access for bpf prog with the right privileges. This patch\\nuses kmsan_unpoison_memory() to mark the stack as initialized.\\n\\nThis should address different syzbot reports on the uninit \\\"void *key\\\"\\nargument during map_{lookup,delete}_elem.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: bpf: marcar la pila de programas bpf con kmsan_unposion_memory en modo int\\u00e9rprete syzbot inform\\u00f3 usos de memoria uninit durante map_{lookup,delete}_elem. ========== ERROR: KMSAN: valor uninit en __dev_map_lookup_elem kernel/bpf/devmap.c:441 [en l\\u00ednea] ERROR: KMSAN: valor uninit en dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap. c:796 __dev_map_lookup_elem kernel/bpf/devmap.c:441 [en l\\u00ednea] dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796 ____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [en l\\u00ednea] bpf_map_lookup_elem+0x5c/0x80 kernel / bpf/helpers.c:38 ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997 __bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237 ========== El reproductor debe estar en el modo int\\u00e9rprete. El reproductor de C est\\u00e1 intentando ejecutar el siguiente programa bpf: 0: (18) r0 = 0x0 2: (18) r1 = map[id:49] 4: (b7) r8 = 16777216 5: (7b) *(u64 * )(r10 -8) = r8 6: (bf) r2 = r10 7: (07) r2 += -229 ^^^^^^^^^^ 8: (b7) r3 = 8 9: (b7) r4 = 0 10: (85) llamar a dev_map_lookup_elem#1543472 11: (95) salir Se debe a la \\\"clave * vac\\u00eda\\\" (r2) pasada al ayudante. bpf permite el acceso a la memoria de pila uninit para el programa bpf con los privilegios correctos. Este parche usa kmsan_unpoison_memory() para marcar la pila como inicializada. Esto deber\\u00eda abordar diferentes informes de syzbot sobre el argumento uninit \\\"void *key\\\" durante map_{lookup,delete}_elem.\"}]",
"id": "CVE-2024-42063",
"lastModified": "2024-11-21T09:33:30.810",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2024-07-29T16:15:06.053",
"references": "[{\"url\": \"https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-908\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-42063\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-29T16:15:06.053\",\"lastModified\":\"2025-11-03T22:17:34.690\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode\\n\\nsyzbot reported uninit memory usages during map_{lookup,delete}_elem.\\n\\n==========\\nBUG: KMSAN: uninit-value in __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\\nBUG: KMSAN: uninit-value in dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\\n__dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\\ndev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\\n____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [inline]\\nbpf_map_lookup_elem+0x5c/0x80 kernel/bpf/helpers.c:38\\n___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997\\n__bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237\\n==========\\n\\nThe reproducer should be in the interpreter mode.\\n\\nThe C reproducer is trying to run the following bpf prog:\\n\\n 0: (18) r0 = 0x0\\n 2: (18) r1 = map[id:49]\\n 4: (b7) r8 = 16777216\\n 5: (7b) *(u64 *)(r10 -8) = r8\\n 6: (bf) r2 = r10\\n 7: (07) r2 += -229\\n ^^^^^^^^^^\\n\\n 8: (b7) r3 = 8\\n 9: (b7) r4 = 0\\n 10: (85) call dev_map_lookup_elem#1543472\\n 11: (95) exit\\n\\nIt is due to the \\\"void *key\\\" (r2) passed to the helper. bpf allows uninit\\nstack memory access for bpf prog with the right privileges. This patch\\nuses kmsan_unpoison_memory() to mark the stack as initialized.\\n\\nThis should address different syzbot reports on the uninit \\\"void *key\\\"\\nargument during map_{lookup,delete}_elem.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: marcar la pila de programas bpf con kmsan_unposion_memory en modo int\u00e9rprete syzbot inform\u00f3 usos de memoria uninit durante map_{lookup,delete}_elem. ========== ERROR: KMSAN: valor uninit en __dev_map_lookup_elem kernel/bpf/devmap.c:441 [en l\u00ednea] ERROR: KMSAN: valor uninit en dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap. c:796 __dev_map_lookup_elem kernel/bpf/devmap.c:441 [en l\u00ednea] dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796 ____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [en l\u00ednea] bpf_map_lookup_elem+0x5c/0x80 kernel / bpf/helpers.c:38 ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997 __bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237 ========== El reproductor debe estar en el modo int\u00e9rprete. El reproductor de C est\u00e1 intentando ejecutar el siguiente programa bpf: 0: (18) r0 = 0x0 2: (18) r1 = map[id:49] 4: (b7) r8 = 16777216 5: (7b) *(u64 * )(r10 -8) = r8 6: (bf) r2 = r10 7: (07) r2 += -229 ^^^^^^^^^^ 8: (b7) r3 = 8 9: (b7) r4 = 0 10: (85) llamar a dev_map_lookup_elem#1543472 11: (95) salir Se debe a la \\\"clave * vac\u00eda\\\" (r2) pasada al ayudante. bpf permite el acceso a la memoria de pila uninit para el programa bpf con los privilegios correctos. Este parche usa kmsan_unpoison_memory() para marcar la pila como inicializada. Esto deber\u00eda abordar diferentes informes de syzbot sobre el argumento uninit \\\"void *key\\\" durante map_{lookup,delete}_elem.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-908\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.1.97\",\"matchCriteriaId\":\"11DA4D7A-BB0A-4555-8D1D-ECCC5108F772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.37\",\"matchCriteriaId\":\"D72E033B-5323-4C4D-8818-36E1EBC3535F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.9.8\",\"matchCriteriaId\":\"E95105F2-32E3-4C5F-9D18-7AEFD0E6275C\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T22:01:03.937Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-42063\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:20:09.278781Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:14.736Z\"}}], \"cna\": {\"title\": \"bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"bd4cf0ed331a275e9bf5a49e6d0fd55dffc551b8\", \"lessThan\": \"b30f3197a6cd080052d5d4973f9a6b479fd9fff5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bd4cf0ed331a275e9bf5a49e6d0fd55dffc551b8\", \"lessThan\": \"d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bd4cf0ed331a275e9bf5a49e6d0fd55dffc551b8\", \"lessThan\": \"3189983c26108cf0990e5c46856dc9feb9470d12\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bd4cf0ed331a275e9bf5a49e6d0fd55dffc551b8\", \"lessThan\": \"e8742081db7d01f980c6161ae1e8a1dbc1e30979\", \"versionType\": \"git\"}], \"programFiles\": [\"kernel/bpf/core.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.15\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.15\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.1.97\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.37\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.9.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"kernel/bpf/core.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5\"}, {\"url\": \"https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf\"}, {\"url\": \"https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12\"}, {\"url\": \"https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode\\n\\nsyzbot reported uninit memory usages during map_{lookup,delete}_elem.\\n\\n==========\\nBUG: KMSAN: uninit-value in __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\\nBUG: KMSAN: uninit-value in dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\\n__dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\\ndev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\\n____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [inline]\\nbpf_map_lookup_elem+0x5c/0x80 kernel/bpf/helpers.c:38\\n___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997\\n__bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237\\n==========\\n\\nThe reproducer should be in the interpreter mode.\\n\\nThe C reproducer is trying to run the following bpf prog:\\n\\n 0: (18) r0 = 0x0\\n 2: (18) r1 = map[id:49]\\n 4: (b7) r8 = 16777216\\n 5: (7b) *(u64 *)(r10 -8) = r8\\n 6: (bf) r2 = r10\\n 7: (07) r2 += -229\\n ^^^^^^^^^^\\n\\n 8: (b7) r3 = 8\\n 9: (b7) r4 = 0\\n 10: (85) call dev_map_lookup_elem#1543472\\n 11: (95) exit\\n\\nIt is due to the \\\"void *key\\\" (r2) passed to the helper. bpf allows uninit\\nstack memory access for bpf prog with the right privileges. This patch\\nuses kmsan_unpoison_memory() to mark the stack as initialized.\\n\\nThis should address different syzbot reports on the uninit \\\"void *key\\\"\\nargument during map_{lookup,delete}_elem.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.97\", \"versionStartIncluding\": \"3.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.37\", \"versionStartIncluding\": \"3.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.9.8\", \"versionStartIncluding\": \"3.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10\", \"versionStartIncluding\": \"3.15\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2026-01-05T10:51:28.884Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-42063\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-05T10:51:28.884Z\", \"dateReserved\": \"2024-07-29T15:50:41.166Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-07-29T15:52:28.533Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
BDU:2025-03003
Vulnerability from fstec - Published: 28.03.2024{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "8 (Red Hat Enterprise Linux), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 9 (Red Hat Enterprise Linux), \u043e\u0442 6.7 \u0434\u043e 6.9.7 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), 1.8 (Astra Linux Special Edition), \u043e\u0442 6.2 \u0434\u043e 6.6.36 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 6.1 \u0434\u043e 6.1.96 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u0434\u043e 2.14 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://lore.kernel.org/linux-cve-announce/2024072950-CVE-2024-42063-d3a5@gregkh/\nhttps://git.kernel.org/linus/e8742081db7d01f980c6161ae1e8a1dbc1e30979\nhttps://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12\nhttps://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5\nhttps://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.97\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.37\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9.8\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2024-42063\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2024-42063\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n- \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 linux-6.1 \u0434\u043e 6.1.124-1.astra1+ci29 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0411SE18\n- \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 linux-6.6 \u0434\u043e 6.12.11-1.astra1+ci18 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0411SE18\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f linux \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 6.6.108-0.osnova2u1",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "28.03.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "24.10.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "21.03.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-03003",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-42063",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , Red Hat Inc. Red Hat Enterprise Linux 9 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.7 \u0434\u043e 6.9.7 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.8 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.2 \u0434\u043e 6.6.36 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.1 \u0434\u043e 6.1.96 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.14 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 PROG_NAME() \u043c\u043e\u0434\u0443\u043b\u044f kernel/bpf/core.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (\u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430) (CWE-120), \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0435\u0438\u043d\u0438\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (CWE-908)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 PROG_NAME() \u043c\u043e\u0434\u0443\u043b\u044f kernel/bpf/core.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043d\u0435\u0438\u043d\u0438\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445, \u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12\nhttps://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5\nhttps://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf\nhttps://git.linuxtesting.ru/pub/scm/linux/kernel/git/lvc/linux-stable.git/commit/?h=v6.1.106-lvc1\u0026id=b30f3197a6cd080052d5d4973f9a6b479fd9fff5\nhttps://www.cve.org/CVERecord?id=CVE-2024-42063\nhttps://lore.kernel.org/linux-cve-announce/2024072950-CVE-2024-42063-d3a5@gregkh/\nhttps://git.kernel.org/linus/e8742081db7d01f980c6161ae1e8a1dbc1e30979\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.97\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.37\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9.8\nhttps://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0411SE18\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.14/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-120, CWE-908",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
WID-SEC-W-2024-1722
Vulnerability from csaf_certbund - Published: 2024-07-29 22:00 - Updated: 2025-08-27 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
IBM QRadar SIEM <7.5.0 UP11
IBM / QRadar SIEM
|
<7.5.0 UP11 | ||
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
NetApp FAS
NetApp
|
cpe:/h:netapp:fas:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Dell integrated Dell Remote Access Controller <7.00.00.174
Dell / integrated Dell Remote Access Controller
|
<7.00.00.174 | ||
|
IBM QRadar SIEM <7.5.0 UP10 IF01
IBM / QRadar SIEM
|
<7.5.0 UP10 IF01 | ||
|
IBM Storage Scale <6.2.2.0
IBM / Storage Scale
|
<6.2.2.0 | ||
|
Dell integrated Dell Remote Access Controller <7.10.90.00
Dell / integrated Dell Remote Access Controller
|
<7.10.90.00 | ||
|
IBM Storage Scale <6.1.9.5
IBM / Storage Scale
|
<6.1.9.5 | ||
|
IBM Spectrum Protect Plus <10.1.6.4
IBM / Spectrum Protect Plus
|
<10.1.6.4 | ||
|
Juniper Junos Space <24.1R2
Juniper / Junos Space
|
<24.1R2 | ||
|
IBM Spectrum Protect Plus <10.1.17
IBM / Spectrum Protect Plus
|
<10.1.17 | ||
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerScale OneFS
Dell / PowerScale
|
cpe:/a:dell:powerscale_onefs:onefs
|
OneFS | |
|
Siemens SIMATIC S7 1500 TM MFP
Siemens / SIMATIC S7
|
cpe:/h:siemens:simatic_s7:1500_tm_mfp
|
1500 TM MFP | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell PowerProtect Data Domain Management Center
Dell
|
cpe:/a:dell:powerprotect_data_domain_management_center:-
|
— | |
|
IBM Storage Scale System <6.2.3.0
IBM / Storage Scale System
|
<6.2.3.0 | ||
|
Dell PowerProtect Data Domain
Dell
|
cpe:/a:dell:powerprotect_data_domain:-
|
— | |
|
IBM Storage Scale System <6.1.9.7
IBM / Storage Scale System
|
<6.1.9.7 | ||
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Dell PowerProtect Data Domain OS
Dell
|
cpe:/o:dell:powerprotect_data_domain_os:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Broadcom Brocade SANnav
Broadcom
|
cpe:/a:broadcom:brocade_sannav:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
IBM InfoSphere Guardium
IBM
|
cpe:/a:ibm:infosphere_guardium:-
|
— | |
|
Oracle VM 3
Oracle / VM
|
cpe:/a:oracle:vm:3
|
3 |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1722 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1722.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1722 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1722"
},
{
"category": "external",
"summary": "Linuc CVE Announce vom 2024-07-29",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6952-1 vom 2024-08-09",
"url": "https://ubuntu.com/security/notices/USN-6952-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6949-1 vom 2024-08-09",
"url": "https://ubuntu.com/security/notices/USN-6949-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6955-1 vom 2024-08-12",
"url": "https://ubuntu.com/security/notices/USN-6955-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5747 vom 2024-08-12",
"url": "https://security-tracker.debian.org/tracker/DSA-5747-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2892-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6949-2 vom 2024-08-13",
"url": "https://ubuntu.com/security/notices/USN-6949-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2894-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019182.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2895-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2893-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6952-2 vom 2024-08-13",
"url": "https://ubuntu.com/security/notices/USN-6952-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2902-1 vom 2024-08-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019193.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2923-1 vom 2024-08-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2929-1 vom 2024-08-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019209.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2947-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019220.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2948-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2940-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019212.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5673 vom 2024-08-21",
"url": "https://access.redhat.com/errata/RHSA-2024:5673"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2622 vom 2024-08-21",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2622.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5672 vom 2024-08-21",
"url": "https://access.redhat.com/errata/RHSA-2024:5672"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-081 vom 2024-08-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-081.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5928 vom 2024-08-28",
"url": "https://access.redhat.com/errata/RHSA-2024:5928"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5928 vom 2024-08-29",
"url": "https://linux.oracle.com/errata/ELSA-2024-5928.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6206 vom 2024-09-03",
"url": "https://access.redhat.com/errata/RHSA-2024:6206"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6267 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6267"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6268 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6268"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3189-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6567 vom 2024-09-11",
"url": "https://access.redhat.com/errata/RHSA-2024:6567"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6406 vom 2024-09-12",
"url": "https://access.redhat.com/errata/RHSA-2024:6406"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12612 vom 2024-09-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-12612.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12610 vom 2024-09-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-12610.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6999-1 vom 2024-09-11",
"url": "https://ubuntu.com/security/notices/USN-6999-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12618 vom 2024-09-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-12618.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-6567 vom 2024-09-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-6567.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7003-1 vom 2024-09-12",
"url": "https://ubuntu.com/security/notices/USN-7003-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7003-2 vom 2024-09-12",
"url": "https://ubuntu.com/security/notices/USN-7003-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7006-1 vom 2024-09-12",
"url": "https://ubuntu.com/security/notices/USN-7006-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3227-1 vom 2024-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019430.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3225-1 vom 2024-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019432.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7004-1 vom 2024-09-12",
"url": "https://ubuntu.com/security/notices/USN-7004-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7005-1 vom 2024-09-12",
"url": "https://ubuntu.com/security/notices/USN-7005-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7003-3 vom 2024-09-13",
"url": "https://ubuntu.com/security/notices/USN-7003-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7007-1 vom 2024-09-13",
"url": "https://ubuntu.com/security/notices/USN-7007-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7008-1 vom 2024-09-13",
"url": "https://ubuntu.com/security/notices/USN-7008-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7009-1 vom 2024-09-13",
"url": "https://ubuntu.com/security/notices/USN-7009-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7005-2 vom 2024-09-13",
"url": "https://ubuntu.com/security/notices/USN-7005-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3251-1 vom 2024-09-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019435.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:6567 vom 2024-09-17",
"url": "https://errata.build.resf.org/RLSA-2024:6567"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3249-1 vom 2024-09-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019438.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3252-1 vom 2024-09-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019436.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6745 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6745"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6744 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6744"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-085 vom 2024-09-18",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-085.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-052 vom 2024-09-18",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-052.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-053 vom 2024-09-18",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-053.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-084 vom 2024-09-18",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-084.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-190 vom 2024-09-18",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-190.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-191 vom 2024-09-18",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-191.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7020-1 vom 2024-09-18",
"url": "https://ubuntu.com/security/notices/USN-7020-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7021-1 vom 2024-09-18",
"url": "https://ubuntu.com/security/notices/USN-7021-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7022-1 vom 2024-09-18",
"url": "https://ubuntu.com/security/notices/USN-7022-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7007-2 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7007-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7020-2 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7020-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7028-1 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7028-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6991 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6991"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6997"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7004 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7004"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7007-3 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7007-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6993 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6994 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6994"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6995 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6995"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6999 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6999"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7029-1 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7029-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7005 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7005"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7002 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7002"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6992 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6992"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7021-2 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7021-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7003 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7003"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6990 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6990"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6999-2 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-6999-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6998 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6998"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3408-1 vom 2024-09-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TGC7PQ5QNGEZWYIHCKH2KPZMGYJ4VN6B/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7009-2 vom 2024-09-25",
"url": "https://ubuntu.com/security/notices/USN-7009-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26",
"url": "https://linux.oracle.com/errata/ELSA-2024-7000.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-6997 vom 2024-09-26",
"url": "https://linux.oracle.com/errata/ELSA-2024-6997.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7003-4 vom 2024-09-26",
"url": "https://ubuntu.com/security/notices/USN-7003-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7020-3 vom 2024-09-26",
"url": "https://ubuntu.com/security/notices/USN-7020-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7227 vom 2024-09-26",
"url": "https://access.redhat.com/errata/RHSA-2024:7227"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7039-1 vom 2024-09-26",
"url": "https://ubuntu.com/security/notices/USN-7039-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7021-3 vom 2024-09-26",
"url": "https://ubuntu.com/security/notices/USN-7021-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30",
"url": "https://errata.build.resf.org/RLSA-2024:7001"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3499-1 vom 2024-09-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019536.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7429 vom 2024-10-01",
"url": "https://access.redhat.com/errata/RHSA-2024:7429"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12682 vom 2024-09-30",
"url": "http://linux.oracle.com/errata/ELSA-2024-12682.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7428 vom 2024-10-01",
"url": "https://access.redhat.com/errata/RHSA-2024:7428"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7430 vom 2024-10-01",
"url": "https://access.redhat.com/errata/RHSA-2024:7430"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7431 vom 2024-10-01",
"url": "https://access.redhat.com/errata/RHSA-2024:7431"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7432 vom 2024-10-01",
"url": "https://access.redhat.com/errata/RHSA-2024:7432"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7433 vom 2024-10-01",
"url": "https://access.redhat.com/errata/RHSA-2024:7433"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7427 vom 2024-10-01",
"url": "https://access.redhat.com/errata/RHSA-2024:7427"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-6994 vom 2024-09-30",
"url": "https://linux.oracle.com/errata/ELSA-2024-6994.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7003-5 vom 2024-10-01",
"url": "https://ubuntu.com/security/notices/USN-7003-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7022-2 vom 2024-10-01",
"url": "https://ubuntu.com/security/notices/USN-7022-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7021-4 vom 2024-10-03",
"url": "https://ubuntu.com/security/notices/USN-7021-4"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5782 vom 2024-10-03",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3912 vom 2024-10-07",
"url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3547-1 vom 2024-10-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019566.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7022-3 vom 2024-10-10",
"url": "https://ubuntu.com/security/notices/USN-7022-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3565-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
"url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3587-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3585-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019586.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7020-4 vom 2024-10-11",
"url": "https://ubuntu.com/security/notices/USN-7020-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12782 vom 2024-10-14",
"url": "https://linux.oracle.com/errata/ELSA-2024-12782.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3617-1 vom 2024-10-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12780 vom 2024-10-14",
"url": "https://linux.oracle.com/errata/ELSA-2024-12780.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8107 vom 2024-10-15",
"url": "https://access.redhat.com/errata/RHSA-2024:8107"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12779 vom 2024-10-14",
"url": "https://linux.oracle.com/errata/ELSA-2024-12779.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3627-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EDC3MOOYJCFLEYCPOKSPUCADNYIO3EGI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3625-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XCWDJ4VQNWRMZU52FZIMVKO3ZX7QR3L7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3624-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/V4GVQWREKLT3NIX5GMPMO26GXLKRGTXJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3623-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TF6OKVTF5VSUGWWYIUXLV2YZK7NYELIN/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3640-1 vom 2024-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019609.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3636-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6PEVJU5FBJP53YMNJCB4SQC2P7VOWDEQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3639-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QREDIZHMC5MCDU7XHJHAPFFVPPIKTHWD/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3632-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMA2L435Y3DOAG6IL6IEIK2SUGPOUZXD/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8162 vom 2024-10-16",
"url": "https://access.redhat.com/errata/RHSA-2024:8162"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3638-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/G5I2ZVAM4BJDGCYJE64AKFTDGHVIU5SH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3635-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BL3RXEW5VDVX6HS5GR4KUH6GDRT5OFQF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3631-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBN5S6CN75ZWGV3ZNRLZRMQ5DF3HMBZE/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16",
"url": "https://ubuntu.com/security/notices/USN-7069-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8158 vom 2024-10-16",
"url": "https://access.redhat.com/errata/RHSA-2024:8158"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3642-1 vom 2024-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8157 vom 2024-10-16",
"url": "https://access.redhat.com/errata/RHSA-2024:8157"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3643-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VPMT5STAWY6BTO5OI2PZ7CG4AXOIQKZN/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3696-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YYPGEHXE3QJ5NBRD57VSRTM36AC5DISM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3670-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JVBPTC5SNYDIYERI2QA3SDI56HZRXTU4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3674-1 vom 2024-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019642.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3672-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MGSVPDAL2ET3FWE6YAGBX3UOQOVXTPXB/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3649-1 vom 2024-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019619.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3652-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XAOP5G7ENALTQ2BLIJROCRJ3STRXQOFY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3663-1 vom 2024-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3651-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VLAP2QXVEHLNNWBLHF53IAVX5KBCFJGW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3662-1 vom 2024-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3660-1 vom 2024-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019627.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3698-1 vom 2024-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019633.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3648-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCRSFR3VCO3HMO5RI5MPP5LW6AJRWVBW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3697-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/A6BRGXRVSUAODD2ZZSX5GJCV46W4N5YB/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3690-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TJEVBYA7IDQFKVP2IAJ5BZJLYZD7EOVP/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3701-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SVZDNTNDPAUIILRXFRA47BDSDZ3IUQTH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3702-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BPAXFMRC3YVPDHRGBWET3RB7YTYFYLZW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3687-1 vom 2024-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019637.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3685-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S7NJHO236TM7NPYYRIFT2WLSXRC4WECV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3694-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Y2P3R5HQ4Z7AYZLBXUGXBJMITFENT5NV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3679-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RDWWWR2VCADWSQCCZNNFB4VWOMZDOC63/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3676-1 vom 2024-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019641.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3661-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LI6Q2FNQZMLDTI4OK3SIOBF2CXJW5I56/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3655-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/P4LIA2SNUYEEYDFH7Q72CHUMA7X4NIY3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3695-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MOG44NUGCSJS6Q3AKMCV3X4IK2DN6CLL/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3700-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/G3EDKBVPHAPKDJ45CNEJLJ4KGJAHJ4R7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3706-1 vom 2024-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IUM757WJ43K7PF2K6A3UQHWG2QALK24F/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3710-1 vom 2024-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CLMHYECK5YKZDDXZ7XKEL3G5JXCF5QRM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3707-1 vom 2024-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7J6ZDLOHRJMVHJRG2ZXV377LZA73SWRG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3704-1 vom 2024-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5ESWDH77MSPQVMPKEX33DCOZ5ZWWTEUO/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17",
"url": "https://ubuntu.com/security/notices/USN-7069-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7028-2 vom 2024-10-17",
"url": "https://ubuntu.com/security/notices/USN-7028-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8318"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:8162 vom 2024-10-25",
"url": "https://errata.build.resf.org/RLSA-2024:8162"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3768-1 vom 2024-10-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019681.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8614 vom 2024-10-30",
"url": "https://access.redhat.com/errata/RHSA-2024:8614"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3774-1 vom 2024-10-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3780-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZRFC54YJNAIE647NXDXGDHFV6UDF5EPM/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8613 vom 2024-10-30",
"url": "https://access.redhat.com/errata/RHSA-2024:8613"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3780-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRFC54YJNAIE647NXDXGDHFV6UDF5EPM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3779-1 vom 2024-10-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DKYHT4QW67UZKMENITQO7T5OANUXGOIM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3800-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3798-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3796-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3820-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3821-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3822-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3833-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/46CHUG3NHK74I7NL4E3MYL6M7O72UAE6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3830-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5FIXDPPFE66BKRWS3X45YHODJJ57FQRT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3834-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3803-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3837-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VHXZ2BQRCVWQY2AVSULS6AN56SITZ273/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3829-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RMOWLUMWUZKBWNWZRVPCJY43YUOMCMJ7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3814-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QW54KPSGGX7Q3N4CIMSAGZRZY4WGZV2D/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3831-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QK6PZZGVJB6TX4W6LKJNJW74SGTITNGD/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3815-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JIUM76237NQIAK3CP7ENKHD5EOEBDHZH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3806-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/I22FOLEFZIBTJBTIPHH5GXPKMIXVDSDI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3836-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/766TFTKXVWJJPZQXXTFUC5YHPETQW3AH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3793-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3842-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VVJDY73ZQLYG6XTLPXQKV6DOXIBCWQNH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3840-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/O2CG2OGLBEZR2LX5UI6PTT5NVZOFNGQH/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7021-5 vom 2024-10-31",
"url": "https://ubuntu.com/security/notices/USN-7021-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3860-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/UFUASUPHAEZFWXKIMGZLIZD4LHGMJ5YW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3852-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CJCHUFTBOJTQRE24NTRP6WMCK5BGPZ3N/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3856-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2LSLV3QQQYIAV376IANSLYZETKMXDLVZ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31",
"url": "https://ubuntu.com/security/notices/USN-7088-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3854-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6DKQ4KINQ5TXHK6JA63O3YINMJXE2QVJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3849-1 vom 2024-10-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3851-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7YDAYBSAUUUZVVIKYWRRX5O6ZCOQ2K46/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3855-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HVT4PHTMBZOBVPW2CI26GVIVJNWCBTVN/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3857-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DM3QIZHKHG7AW6EAKKMMWCCUOYK4JU3R/"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7089-1 vom 2024-11-01",
"url": "https://ubuntu.com/security/notices/USN-7089-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7090-1 vom 2024-11-01",
"url": "https://ubuntu.com/security/notices/USN-7090-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3877-1 vom 2024-11-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019753.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3882-1 vom 2024-11-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GBH24SQSCU7UKVSH3JGQ4YLAU2LAG7KC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3880-1 vom 2024-11-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4FKA7N5AUZ6CDGAARMRU76MNKUZHMPAH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3881-1 vom 2024-11-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZOOTWA362J2SG2EX2CE3LPBWPJ7GVK2B/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04",
"url": "https://ubuntu.com/security/notices/USN-7088-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7089-2 vom 2024-11-04",
"url": "https://ubuntu.com/security/notices/USN-7089-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05",
"url": "https://access.redhat.com/errata/RHSA-2024:8870"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05",
"url": "https://access.redhat.com/errata/RHSA-2024:8856"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-8856.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06",
"url": "https://ubuntu.com/security/notices/USN-7088-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7095-1 vom 2024-11-07",
"url": "https://ubuntu.com/security/notices/USN-7095-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7089-3 vom 2024-11-07",
"url": "https://ubuntu.com/security/notices/USN-7089-3"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08",
"url": "https://errata.build.resf.org/RLSA-2024:8870"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11",
"url": "https://ubuntu.com/security/notices/USN-7100-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9497 vom 2024-11-13",
"url": "https://access.redhat.com/errata/RHSA-2024:9497"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9498 vom 2024-11-13",
"url": "https://access.redhat.com/errata/RHSA-2024:9498"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7100-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12814 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12814.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9315"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12813.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7089-4 vom 2024-11-13",
"url": "https://ubuntu.com/security/notices/USN-7089-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12815.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9546 vom 2024-11-13",
"url": "https://access.redhat.com/errata/RHSA-2024:9546"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7088-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7110-1 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7110-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7089-5 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7089-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7089-6 vom 2024-11-15",
"url": "https://ubuntu.com/security/notices/USN-7089-6"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2698 vom 2024-11-15",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2698.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7089-7 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7089-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7119-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4038-1 vom 2024-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7121-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7121-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7123-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5818 vom 2024-11-24",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00233.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25",
"url": "https://ubuntu.com/security/notices/USN-7121-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10262 vom 2024-11-26",
"url": "https://access.redhat.com/errata/RHSA-2024:10262"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4081-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4103-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4122-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4127-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4128-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4140-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4125-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4123-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4124-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10772 vom 2024-12-04",
"url": "https://access.redhat.com/errata/RHSA-2024:10772"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10773 vom 2024-12-04",
"url": "https://access.redhat.com/errata/RHSA-2024:10773"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10771 vom 2024-12-04",
"url": "https://access.redhat.com/errata/RHSA-2024:10771"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4161-1 vom 2024-12-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R6RFOLIFPTX44BLCDCF6HLSN7S4I4YXH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4180-1 vom 2024-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3ACAYSLQECATBMYSIXEOONW3SJQYVWGD/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4214-1 vom 2024-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/P4UZ4KLYIQHACIYR7LE2ANITUCPLWFYS/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12851 vom 2024-12-05",
"url": "http://linux.oracle.com/errata/ELSA-2024-12851.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4207-1 vom 2024-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KHOJJYPB3I2C5FKMLHD5WFCQI342KAXA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4209-1 vom 2024-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4216-1 vom 2024-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KZC5ZXKVE5JSNEKEAICAO52WN7SOJCTX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4208-1 vom 2024-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HJOOCIMJWVQXHEUVET7W2XBWXJY6XR6M/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4218-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4UVNDL3CU4NHVPE7QELR2N5HRCDSMYEV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4197-1 vom 2024-12-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4219-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019940.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4246-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3LFFLGXO55CBY4WD74GYLL6CL2HWJM2Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4236-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ODASOBSBN3UUGHNO44MK2K4MC35CPLXJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4256-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/34BVCDIDBQSXQ6Y3TVDGD4FSZ7N3D3LI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4234-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/B6RMLGICBLD3BNXSBS7J23W3GCEJMFJA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4243-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GDL3TRRFKGYVQIW7MMTUJS76GCW7B3JZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4242-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4248-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019954.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4249-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4250-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4226-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4231-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4235-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LIMMCWFWYJUMJTABZZ7ZEYXOOVE5BZY7/"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-460 vom 2024-12-09",
"url": "https://www.dell.com/support/kbdoc/de-de/000258350/dsa-2024-460-security-update-for-dell-idrac9-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4262-1 vom 2024-12-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AF5MYHVYCHCM3AIO34JSXWJNP2WUCOHS/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09",
"url": "https://linux.oracle.com/errata/ELSA-2024-12868.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4266-1 vom 2024-12-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RRJRAM3LFR4MNOHCFB2XIOS6OJUDNUPE/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09",
"url": "https://ubuntu.com/security/notices/USN-7144-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4263-1 vom 2024-12-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4264-1 vom 2024-12-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SZPUHL7SUZ57L3OJFO25IHYVDJ76ONGC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4275-1 vom 2024-12-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YTZ2WGLML4Q6E3IG32UCJ6NFIDUTWN22/"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2024-0016 vom 2024-12-10",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-December/001104.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-434 vom 2024-12-10",
"url": "https://www.dell.com/support/kbdoc/de-de/000242188/dsa-2024-434"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10942 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10942"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10",
"url": "https://ubuntu.com/security/notices/USN-7148-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4275-1 vom 2024-12-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTZ2WGLML4Q6E3IG32UCJ6NFIDUTWN22/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7159-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7156-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17",
"url": "https://linux.oracle.com/errata/ELSA-2024-12884.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7179045 vom 2024-12-16",
"url": "https://www.ibm.com/support/pages/node/7179045"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7159-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7159-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7166-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7166-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-059 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-059.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-074 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-074.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7166-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-4 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7159-4"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4008 vom 2025-01-03",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7183-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7183-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7186-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-5 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7159-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7184-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7184-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7180361 vom 2025-01-07",
"url": "https://www.ibm.com/support/pages/node/7180361"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0064 vom 2025-01-08",
"url": "https://access.redhat.com/errata/RHSA-2025:0064"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0063 vom 2025-01-08",
"url": "https://access.redhat.com/errata/RHSA-2025:0063"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA92874 vom 2024-01-09",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7195-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7194-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7185-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7185-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7186-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0089-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0103-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0107-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14",
"url": "https://ubuntu.com/security/notices/USN-7195-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0105-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0109-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0106-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0097-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0115-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VK2D63Q2FKHJWXOLVAS7HPIWURVL3MQQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0111-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2IXCN5JTEUUWORLKQVOQYQKMHTJ73CSG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0110-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PLWCG227VUGPKNXHW6FOCW727UUPVLLU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0114-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YC7MKFCHLBJHUQM2SLPOGVG4DUWP2J4E/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0124-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0131-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0138-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ET3TDUWYDTZV554NRC7LB5HGM4TCIIGZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0150-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/USHZQFRYGMLVCVQRQLPH4FARDBDAEC6G/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0137-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YHBMZ4MND2ONRG4N26VJNJGAZBXMYEDV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0146-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/C6ANXHEO54VUUFEWI6QYB2M3L2SS7OOW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0164-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0158-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0188-1 vom 2025-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0187-1 vom 2025-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0203-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MOWH4UGAPWTJ6YHNMWYKOS2OKUX53GLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0239-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBKJOKHJGUZRHPVCGSRZVBF6ZMI7KJY7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0241-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NOPV6Q627N4CUXB4FYZVYGKBQ3VTCX3P/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0240-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCBYAV5OJRXD362FDCZUSIHNHOURONCF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0238-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNU4IXTEAXCI7QNPC2AVXZICYTGC4XXI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0243-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0254-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020213.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0249-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0244-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0265-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0251-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0252-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0263-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0248-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0253-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0264-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0266-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0262-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0260-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0255-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0261-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0268-1 vom 2025-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020227.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0269-1 vom 2025-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7233-1 vom 2025-01-28",
"url": "https://ubuntu.com/security/notices/USN-7233-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7181933 vom 2025-01-29",
"url": "https://www.ibm.com/support/pages/node/7181933"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7233-2 vom 2025-01-30",
"url": "https://ubuntu.com/security/notices/USN-7233-2"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7182335 vom 2025-02-03",
"url": "https://www.ibm.com/support/pages/node/7182335"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7233-3 vom 2025-02-03",
"url": "https://ubuntu.com/security/notices/USN-7233-3"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20095 vom 2025-02-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20095.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7262-1 vom 2025-02-10",
"url": "https://ubuntu.com/security/notices/USN-7262-1"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-072 vom 2025-02-12",
"url": "https://www.dell.com/support/kbdoc/000283880"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2025-2889 vom 2025-02-13",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0556-1 vom 2025-02-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0577-1 vom 2025-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7288-1 vom 2025-02-24",
"url": "https://ubuntu.com/security/notices/USN-7288-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-1 vom 2025-02-24",
"url": "https://ubuntu.com/security/notices/USN-7289-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7262-2 vom 2025-02-24",
"url": "https://ubuntu.com/security/notices/USN-7262-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7291-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7291-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7293-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7293-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-2 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7289-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7288-2 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7288-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7294-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7295-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-3 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7289-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7294-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-4 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7289-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7308-1 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7308-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7294-3"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4075 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03",
"url": "https://ubuntu.com/security/notices/USN-7294-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7332-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7331-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7331-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0784-1 vom 2025-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1963 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/ALAS-2025-1963.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2778 vom 2025-03-07",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2778.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185244 vom 2025-03-10",
"url": "https://www.ibm.com/support/pages/node/7185244"
},
{
"category": "external",
"summary": "Siemens Security Advisory SSA-503939 vom 2025-03-11",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-503939.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7342-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7342-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0577-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7344-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7344-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-2 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7332-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0847-1 vom 2025-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-3 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7332-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7344-2 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7344-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0886-1 vom 2025-03-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020529.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0911-1 vom 2025-03-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OYWTACUZODLJ4QTEQCBEVWO6HSYPFPDZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0922-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020552.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0955-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0952-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020554.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1027-1 vom 2025-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7388-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1057-1 vom 2025-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020621.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7393-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7389-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7390-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1072-1 vom 2025-03-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020631.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4102 vom 2025-04-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1064-1 vom 2025-03-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020629.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1088-1 vom 2025-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020635.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7401-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1120-1 vom 2025-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2ZESLX5RYJUY6K7K44E5DESZTEN2AV77/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1104-1 vom 2025-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5XUTFA4L7FU7VC4TF7N2SCEQCLVF23JO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1119-1 vom 2025-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SBLYTUS3TCCWSW237VUH6AAY5NVYUZ3T/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1139-1 vom 2025-04-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MMCQJLNQTFQY3ASC2RY677DDWALMOJCQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1123-1 vom 2025-04-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RBJNUDBE6VPHIDCFIVWE7AFUQ2E2P436/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7413-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7420-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7420-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7421-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7230557 vom 2025-04-10",
"url": "https://www.ibm.com/support/pages/node/7230557"
},
{
"category": "external",
"summary": "Juniper Security Bulletin",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20270 vom 2025-04-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-20270.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7453-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7451-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7450-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7449-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7452-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7460-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7460-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7449-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7458-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4342 vom 2025-04-30",
"url": "https://access.redhat.com/errata/RHSA-2025:4342"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20320 vom 2025-05-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-20320.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:6966"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7523-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7524-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20047-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20044-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20240828-0010 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20240828-0010"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-3 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7592-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7592-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7593-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7598-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7598-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-4 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7597-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7597-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7597-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7597-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9584 vom 2025-06-25",
"url": "https://access.redhat.com/errata/RHSA-2025:9584"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7602-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7236419 vom 2025-06-30",
"url": "https://www.ibm.com/support/pages/node/7236419"
},
{
"category": "external",
"summary": "SEM 2025.2.1 release notes vom 2025-07-02",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-5 vom 2025-07-04",
"url": "https://ubuntu.com/security/notices/USN-7591-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7627-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08",
"url": "https://ubuntu.com/security/notices/USN-7627-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10701 vom 2025-07-09",
"url": "https://access.redhat.com/errata/RHSA-2025:10701"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-6 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7591-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7655-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11810 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11810"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02601-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022048.html"
},
{
"category": "external",
"summary": "Security Update for Dell PowerProtect Data Domain",
"url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02636-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CZW4BWHO76REHV7LNO6WHLF4JRL7WMEJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02627-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HNZG2UKJBSDT23RIH4WSPIP5XJJH7AQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02691-1 vom 2025-08-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HQYM2FGJQXM5CJJ3L6LDY723WGAYBFPL/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13946 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:13946"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2025-08-27T22:00:00.000+00:00",
"generator": {
"date": "2025-08-28T06:01:29.420+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1722",
"initial_release_date": "2024-07-29T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-29T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-08-08T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu und Debian aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-08-14T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-15T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-18T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-20T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat und Amazon aufgenommen"
},
{
"date": "2024-08-21T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-08-28T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-29T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2024-09-11T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat, Oracle Linux, Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-09-12T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-09-15T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-16T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-09-17T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-18T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2024-09-22T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-23T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat, SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-09-24T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-25T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-26T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-29T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-30T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, SUSE, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2024-10-01T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-03T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Ubuntu und Debian aufgenommen"
},
{
"date": "2024-10-07T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-10-08T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-10-10T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Oracle Linux, SUSE und Red Hat aufgenommen"
},
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE, Red Hat und Ubuntu aufgenommen"
},
{
"date": "2024-10-16T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-17T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-27T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-10-28T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-29T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-11-03T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-11-04T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-10T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Red Hat, Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2024-11-13T23:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-17T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-11-19T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-24T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-11-25T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-28T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-02T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-03T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2024-12-04T23:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-05T23:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-09T23:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Dell, SUSE, Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von SUSE, ORACLE, Dell, Red Hat und Ubuntu aufgenommen"
},
{
"date": "2024-12-12T23:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Oracle Linux und IBM aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-12-18T23:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2024-12-22T23:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-02T23:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-07T23:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Juniper und SUSE aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-01-15T23:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-16T23:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-19T23:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-20T23:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-27T23:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-28T23:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von SUSE und IBM aufgenommen"
},
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-03T23:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von IBM und Ubuntu aufgenommen"
},
{
"date": "2025-02-10T23:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-02-11T23:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-24T23:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-27T23:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-02T23:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-03T23:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-05T23:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-03-06T23:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-09T23:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-03-11T23:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-03-13T23:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-17T23:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-18T23:00:00.000+00:00",
"number": "109",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-19T23:00:00.000+00:00",
"number": "110",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-26T23:00:00.000+00:00",
"number": "111",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "112",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "113",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "114",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "115",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-04-02T22:00:00.000+00:00",
"number": "116",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "117",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-04-07T22:00:00.000+00:00",
"number": "118",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-08T22:00:00.000+00:00",
"number": "119",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "120",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "121",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "122",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-23T22:00:00.000+00:00",
"number": "123",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-24T22:00:00.000+00:00",
"number": "124",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "125",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "126",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "127",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "128",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "129",
"summary": "Neue Updates von Debian und Ubuntu aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "130",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "131",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "132",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "133",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "134",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "135",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "136",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-24T22:00:00.000+00:00",
"number": "137",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "138",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "139",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "140",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "141",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-07-06T22:00:00.000+00:00",
"number": "142",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "143",
"summary": "Neue Updates von Ubuntu, SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "144",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-14T22:00:00.000+00:00",
"number": "145",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "146",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "147",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "148",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "149",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-03T22:00:00.000+00:00",
"number": "150",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "151",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-08-17T22:00:00.000+00:00",
"number": "152",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "153",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "154",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "154"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T034392",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain",
"product": {
"name": "Dell PowerProtect Data Domain",
"product_id": "T045852",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain Management Center",
"product": {
"name": "Dell PowerProtect Data Domain Management Center",
"product_id": "T045853",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain OS",
"product": {
"name": "Dell PowerProtect Data Domain OS",
"product_id": "T045854",
"product_identification_helper": {
"cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "OneFS",
"product": {
"name": "Dell PowerScale OneFS",
"product_id": "T034610",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerscale_onefs:onefs"
}
}
}
],
"category": "product_name",
"name": "PowerScale"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.00.00.174",
"product": {
"name": "Dell integrated Dell Remote Access Controller \u003c7.00.00.174",
"product_id": "T039652"
}
},
{
"category": "product_version",
"name": "7.00.00.174",
"product": {
"name": "Dell integrated Dell Remote Access Controller 7.00.00.174",
"product_id": "T039652-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:dell:idrac:7.00.00.174"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.90.00",
"product": {
"name": "Dell integrated Dell Remote Access Controller \u003c7.10.90.00",
"product_id": "T039653"
}
},
{
"category": "product_version",
"name": "7.10.90.00",
"product": {
"name": "Dell integrated Dell Remote Access Controller 7.10.90.00",
"product_id": "T039653-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:dell:idrac:7.10.90.00"
}
}
}
],
"category": "product_name",
"name": "integrated Dell Remote Access Controller"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM InfoSphere Guardium",
"product": {
"name": "IBM InfoSphere Guardium",
"product_id": "T002366",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_guardium:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01",
"product_id": "T038741"
}
},
{
"category": "product_version",
"name": "7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP10 IF01",
"product_id": "T038741-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11",
"product_id": "T040749"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11",
"product_id": "T040749-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.6.4",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.6.4",
"product_id": "T040030"
}
},
{
"category": "product_version",
"name": "10.1.6.4",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.6.4",
"product_id": "T040030-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.1.17",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.17",
"product_id": "T042730"
}
},
{
"category": "product_version",
"name": "10.1.17",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.17",
"product_id": "T042730-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.17"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.9.5",
"product": {
"name": "IBM Storage Scale \u003c6.1.9.5",
"product_id": "T039851"
}
},
{
"category": "product_version",
"name": "6.1.9.5",
"product": {
"name": "IBM Storage Scale 6.1.9.5",
"product_id": "T039851-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_scale:6.1.9.5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.2.2.0",
"product": {
"name": "IBM Storage Scale \u003c6.2.2.0",
"product_id": "T039852"
}
},
{
"category": "product_version",
"name": "6.2.2.0",
"product": {
"name": "IBM Storage Scale 6.2.2.0",
"product_id": "T039852-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_scale:6.2.2.0"
}
}
}
],
"category": "product_name",
"name": "Storage Scale"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.9.7",
"product": {
"name": "IBM Storage Scale System \u003c6.1.9.7",
"product_id": "T044961"
}
},
{
"category": "product_version",
"name": "6.1.9.7",
"product": {
"name": "IBM Storage Scale System 6.1.9.7",
"product_id": "T044961-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.2.3.0",
"product": {
"name": "IBM Storage Scale System \u003c6.2.3.0",
"product_id": "T044962"
}
},
{
"category": "product_version",
"name": "6.2.3.0",
"product": {
"name": "IBM Storage Scale System 6.2.3.0",
"product_id": "T044962-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.2.3.0"
}
}
}
],
"category": "product_name",
"name": "Storage Scale System"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c24.1R2",
"product": {
"name": "Juniper Junos Space \u003c24.1R2",
"product_id": "T040074"
}
},
{
"category": "product_version",
"name": "24.1R2",
"product": {
"name": "Juniper Junos Space 24.1R2",
"product_id": "T040074-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:24.1r2"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "for VMware vSphere",
"product": {
"name": "NetApp ActiveIQ Unified Manager for VMware vSphere",
"product_id": "T025152",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere"
}
}
}
],
"category": "product_name",
"name": "ActiveIQ Unified Manager"
},
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T036489",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "3",
"product": {
"name": "Oracle VM 3",
"product_id": "T030927",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:3"
}
}
}
],
"category": "product_name",
"name": "VM"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1500 TM MFP",
"product": {
"name": "Siemens SIMATIC S7 1500 TM MFP",
"product_id": "T028071",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:simatic_s7:1500_tm_mfp"
}
}
}
],
"category": "product_name",
"name": "SIMATIC S7"
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager \u003c2025.2.1",
"product_id": "T044986"
}
},
{
"category": "product_version",
"name": "2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager 2025.2.1",
"product_id": "T044986-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-52887",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2023-52887"
},
{
"cve": "CVE-2024-41020",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41020"
},
{
"cve": "CVE-2024-41021",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41021"
},
{
"cve": "CVE-2024-41022",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41022"
},
{
"cve": "CVE-2024-41023",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41023"
},
{
"cve": "CVE-2024-41024",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41024"
},
{
"cve": "CVE-2024-41025",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41025"
},
{
"cve": "CVE-2024-41026",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41026"
},
{
"cve": "CVE-2024-41027",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41027"
},
{
"cve": "CVE-2024-41028",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41028"
},
{
"cve": "CVE-2024-41029",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41029"
},
{
"cve": "CVE-2024-41030",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41030"
},
{
"cve": "CVE-2024-41031",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41031"
},
{
"cve": "CVE-2024-41032",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41032"
},
{
"cve": "CVE-2024-41033",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41033"
},
{
"cve": "CVE-2024-41034",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41034"
},
{
"cve": "CVE-2024-41035",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41035"
},
{
"cve": "CVE-2024-41036",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41036"
},
{
"cve": "CVE-2024-41037",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41037"
},
{
"cve": "CVE-2024-41038",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41038"
},
{
"cve": "CVE-2024-41039",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41039"
},
{
"cve": "CVE-2024-41040",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41040"
},
{
"cve": "CVE-2024-41041",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41041"
},
{
"cve": "CVE-2024-41042",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41042"
},
{
"cve": "CVE-2024-41043",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41043"
},
{
"cve": "CVE-2024-41044",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41044"
},
{
"cve": "CVE-2024-41045",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41045"
},
{
"cve": "CVE-2024-41046",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41046"
},
{
"cve": "CVE-2024-41047",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41047"
},
{
"cve": "CVE-2024-41048",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41048"
},
{
"cve": "CVE-2024-41049",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41049"
},
{
"cve": "CVE-2024-41050",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41050"
},
{
"cve": "CVE-2024-41051",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41051"
},
{
"cve": "CVE-2024-41052",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41052"
},
{
"cve": "CVE-2024-41053",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41053"
},
{
"cve": "CVE-2024-41054",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41054"
},
{
"cve": "CVE-2024-41055",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41055"
},
{
"cve": "CVE-2024-41056",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41056"
},
{
"cve": "CVE-2024-41057",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41057"
},
{
"cve": "CVE-2024-41058",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41058"
},
{
"cve": "CVE-2024-41059",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41059"
},
{
"cve": "CVE-2024-41060",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41060"
},
{
"cve": "CVE-2024-41061",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41061"
},
{
"cve": "CVE-2024-41062",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41062"
},
{
"cve": "CVE-2024-41063",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41063"
},
{
"cve": "CVE-2024-41064",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41064"
},
{
"cve": "CVE-2024-41065",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41065"
},
{
"cve": "CVE-2024-41066",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41066"
},
{
"cve": "CVE-2024-41067",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41067"
},
{
"cve": "CVE-2024-41068",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41068"
},
{
"cve": "CVE-2024-41069",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41069"
},
{
"cve": "CVE-2024-41070",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41070"
},
{
"cve": "CVE-2024-41071",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41071"
},
{
"cve": "CVE-2024-41072",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41072"
},
{
"cve": "CVE-2024-41073",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41073"
},
{
"cve": "CVE-2024-41074",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41074"
},
{
"cve": "CVE-2024-41075",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41075"
},
{
"cve": "CVE-2024-41076",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41076"
},
{
"cve": "CVE-2024-41077",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41077"
},
{
"cve": "CVE-2024-41078",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41078"
},
{
"cve": "CVE-2024-41079",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41079"
},
{
"cve": "CVE-2024-41080",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41080"
},
{
"cve": "CVE-2024-41081",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41081"
},
{
"cve": "CVE-2024-41082",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41082"
},
{
"cve": "CVE-2024-41083",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41083"
},
{
"cve": "CVE-2024-41084",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41084"
},
{
"cve": "CVE-2024-41085",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41085"
},
{
"cve": "CVE-2024-41086",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41086"
},
{
"cve": "CVE-2024-41087",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41087"
},
{
"cve": "CVE-2024-41088",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41088"
},
{
"cve": "CVE-2024-41089",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41089"
},
{
"cve": "CVE-2024-41092",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41092"
},
{
"cve": "CVE-2024-41093",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41093"
},
{
"cve": "CVE-2024-41094",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41094"
},
{
"cve": "CVE-2024-41095",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41095"
},
{
"cve": "CVE-2024-41096",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41096"
},
{
"cve": "CVE-2024-41097",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41097"
},
{
"cve": "CVE-2024-41098",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-41098"
},
{
"cve": "CVE-2024-42063",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42063"
},
{
"cve": "CVE-2024-42064",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42064"
},
{
"cve": "CVE-2024-42065",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42065"
},
{
"cve": "CVE-2024-42066",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42066"
},
{
"cve": "CVE-2024-42067",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42067"
},
{
"cve": "CVE-2024-42068",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42068"
},
{
"cve": "CVE-2024-42069",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42069"
},
{
"cve": "CVE-2024-42070",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42070"
},
{
"cve": "CVE-2024-42071",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42071"
},
{
"cve": "CVE-2024-42072",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42072"
},
{
"cve": "CVE-2024-42073",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42073"
},
{
"cve": "CVE-2024-42074",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42074"
},
{
"cve": "CVE-2024-42075",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42075"
},
{
"cve": "CVE-2024-42076",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42076"
},
{
"cve": "CVE-2024-42077",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42077"
},
{
"cve": "CVE-2024-42078",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42078"
},
{
"cve": "CVE-2024-42079",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42079"
},
{
"cve": "CVE-2024-42080",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42080"
},
{
"cve": "CVE-2024-42081",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42081"
},
{
"cve": "CVE-2024-42082",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42082"
},
{
"cve": "CVE-2024-42083",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42083"
},
{
"cve": "CVE-2024-42084",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42084"
},
{
"cve": "CVE-2024-42085",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42085"
},
{
"cve": "CVE-2024-42086",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42086"
},
{
"cve": "CVE-2024-42087",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42087"
},
{
"cve": "CVE-2024-42088",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42088"
},
{
"cve": "CVE-2024-42089",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42089"
},
{
"cve": "CVE-2024-42090",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42090"
},
{
"cve": "CVE-2024-42091",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42091"
},
{
"cve": "CVE-2024-42092",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42092"
},
{
"cve": "CVE-2024-42093",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42093"
},
{
"cve": "CVE-2024-42094",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42094"
},
{
"cve": "CVE-2024-42095",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42095"
},
{
"cve": "CVE-2024-42096",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42096"
},
{
"cve": "CVE-2024-42097",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42097"
},
{
"cve": "CVE-2024-42098",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42098"
},
{
"cve": "CVE-2024-42099",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42099"
},
{
"cve": "CVE-2024-42100",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42100"
},
{
"cve": "CVE-2024-42101",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42101"
},
{
"cve": "CVE-2024-42102",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42102"
},
{
"cve": "CVE-2024-42103",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42103"
},
{
"cve": "CVE-2024-42104",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42104"
},
{
"cve": "CVE-2024-42105",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42105"
},
{
"cve": "CVE-2024-42106",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42106"
},
{
"cve": "CVE-2024-42107",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42107"
},
{
"cve": "CVE-2024-42108",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42108"
},
{
"cve": "CVE-2024-42109",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42109"
},
{
"cve": "CVE-2024-42110",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42110"
},
{
"cve": "CVE-2024-42111",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42111"
},
{
"cve": "CVE-2024-42112",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42112"
},
{
"cve": "CVE-2024-42113",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42113"
},
{
"cve": "CVE-2024-42114",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42114"
},
{
"cve": "CVE-2024-42115",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42115"
},
{
"cve": "CVE-2024-42116",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42116"
},
{
"cve": "CVE-2024-42117",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42117"
},
{
"cve": "CVE-2024-42118",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42118"
},
{
"cve": "CVE-2024-42119",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42119"
},
{
"cve": "CVE-2024-42120",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42120"
},
{
"cve": "CVE-2024-42121",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42121"
},
{
"cve": "CVE-2024-42122",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42122"
},
{
"cve": "CVE-2024-42123",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42123"
},
{
"cve": "CVE-2024-42124",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42124"
},
{
"cve": "CVE-2024-42125",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42125"
},
{
"cve": "CVE-2024-42126",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42126"
},
{
"cve": "CVE-2024-42127",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42127"
},
{
"cve": "CVE-2024-42128",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42128"
},
{
"cve": "CVE-2024-42129",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42129"
},
{
"cve": "CVE-2024-42130",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42130"
},
{
"cve": "CVE-2024-42131",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42131"
},
{
"cve": "CVE-2024-42132",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42132"
},
{
"cve": "CVE-2024-42133",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42133"
},
{
"cve": "CVE-2024-42134",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42134"
},
{
"cve": "CVE-2024-42135",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42135"
},
{
"cve": "CVE-2024-42136",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42136"
},
{
"cve": "CVE-2024-42137",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42137"
},
{
"cve": "CVE-2024-42138",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42138"
},
{
"cve": "CVE-2024-42139",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42139"
},
{
"cve": "CVE-2024-42140",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42140"
},
{
"cve": "CVE-2024-42141",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42141"
},
{
"cve": "CVE-2024-42142",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42142"
},
{
"cve": "CVE-2024-42143",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42143"
},
{
"cve": "CVE-2024-42144",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42144"
},
{
"cve": "CVE-2024-42145",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42145"
},
{
"cve": "CVE-2024-42146",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42146"
},
{
"cve": "CVE-2024-42147",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42147"
},
{
"cve": "CVE-2024-42148",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42148"
},
{
"cve": "CVE-2024-42149",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42149"
},
{
"cve": "CVE-2024-42150",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42150"
},
{
"cve": "CVE-2024-42151",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42151"
},
{
"cve": "CVE-2024-42152",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42152"
},
{
"cve": "CVE-2024-42153",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42153"
},
{
"cve": "CVE-2024-42154",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42154"
},
{
"cve": "CVE-2024-42155",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42155"
},
{
"cve": "CVE-2024-42156",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42156"
},
{
"cve": "CVE-2024-42157",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42157"
},
{
"cve": "CVE-2024-42158",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42158"
},
{
"cve": "CVE-2024-42159",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42159"
},
{
"cve": "CVE-2024-42160",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42160"
},
{
"cve": "CVE-2024-42161",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42161"
},
{
"cve": "CVE-2024-42162",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42162"
},
{
"cve": "CVE-2024-42223",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42223"
},
{
"cve": "CVE-2024-42224",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42224"
},
{
"cve": "CVE-2024-42225",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42225"
},
{
"cve": "CVE-2024-42226",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42226"
},
{
"cve": "CVE-2024-42227",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42227"
},
{
"cve": "CVE-2024-42228",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42228"
},
{
"cve": "CVE-2024-42229",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42229"
},
{
"cve": "CVE-2024-42230",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42230"
},
{
"cve": "CVE-2024-42231",
"product_status": {
"known_affected": [
"T025152",
"T040749",
"67646",
"T011540",
"T036489",
"T004914",
"T039652",
"T038741",
"T039852",
"T039653",
"T039851",
"T040030",
"T040074",
"T042730",
"T031092",
"398363",
"T034610",
"T028071",
"T032255",
"T045853",
"T044962",
"T045852",
"T044961",
"T044986",
"T045854",
"2951",
"T002207",
"T034392",
"T000126",
"T002366",
"T030927"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-42231"
}
]
}
CERTFR-2024-AVI-1013
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-52531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52531"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2023-52639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52639"
},
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26787"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2023-52578",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
},
{
"name": "CVE-2024-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
},
{
"name": "CVE-2024-27051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27051"
},
{
"name": "CVE-2024-26885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26885"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-26891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26891"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2021-47212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47212"
},
{
"name": "CVE-2024-26893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26893"
},
{
"name": "CVE-2021-47188",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47188"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2024-35877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35877"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38637"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2022-48733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48733"
},
{
"name": "CVE-2024-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38630"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2024-26677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26677"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2024-40915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40915"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2024-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38577"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2022-48791",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48791"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2022-48666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48666"
},
{
"name": "CVE-2024-36484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36484"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2024-42102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42102"
},
{
"name": "CVE-2024-42104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42104"
},
{
"name": "CVE-2024-42106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42106"
},
{
"name": "CVE-2024-42115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42115"
},
{
"name": "CVE-2024-42121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42121"
},
{
"name": "CVE-2024-42127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42127"
},
{
"name": "CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"name": "CVE-2024-42137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42137"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-42157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42157"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2024-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41073"
},
{
"name": "CVE-2024-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41096"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-41027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41027"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-42068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42068"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2024-42080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42080"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-42089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42089"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2024-42097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42097"
},
{
"name": "CVE-2024-42098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42098"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42130"
},
{
"name": "CVE-2024-42140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42140"
},
{
"name": "CVE-2024-42225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42225"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48943"
},
{
"name": "CVE-2023-52889",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52889"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41025"
},
{
"name": "CVE-2024-41028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41028"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2024-41051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41051"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41061"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2024-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41080"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-41098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41098"
},
{
"name": "CVE-2024-42064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42064"
},
{
"name": "CVE-2024-42069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42069"
},
{
"name": "CVE-2024-42073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42073"
},
{
"name": "CVE-2024-42074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42074"
},
{
"name": "CVE-2024-42113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42113"
},
{
"name": "CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2024-42126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42126"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42136"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42142"
},
{
"name": "CVE-2024-42144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42144"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2024-42156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42156"
},
{
"name": "CVE-2024-42158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42158"
},
{
"name": "CVE-2024-42227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42227"
},
{
"name": "CVE-2024-42228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42228"
},
{
"name": "CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"name": "CVE-2024-42250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42250"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-42269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42269"
},
{
"name": "CVE-2024-42271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42271"
},
{
"name": "CVE-2024-42274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42274"
},
{
"name": "CVE-2024-42276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42276"
},
{
"name": "CVE-2024-42277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42277"
},
{
"name": "CVE-2024-42280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42280"
},
{
"name": "CVE-2024-42281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42281"
},
{
"name": "CVE-2024-42283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42283"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-42285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42285"
},
{
"name": "CVE-2024-42286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42286"
},
{
"name": "CVE-2024-42287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42287"
},
{
"name": "CVE-2024-42288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42288"
},
{
"name": "CVE-2024-42289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42289"
},
{
"name": "CVE-2024-42290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42290"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-42295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42295"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-42302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42302"
},
{
"name": "CVE-2024-42309",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42309"
},
{
"name": "CVE-2024-42310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42310"
},
{
"name": "CVE-2024-42311",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42311"
},
{
"name": "CVE-2024-42312",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42312"
},
{
"name": "CVE-2024-42313",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42313"
},
{
"name": "CVE-2024-42318",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42318"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43829"
},
{
"name": "CVE-2024-43830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43830"
},
{
"name": "CVE-2024-43834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43834"
},
{
"name": "CVE-2024-43839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43839"
},
{
"name": "CVE-2024-43841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43841"
},
{
"name": "CVE-2024-43846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43846"
},
{
"name": "CVE-2024-43849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43849"
},
{
"name": "CVE-2024-43853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43853"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-43855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43855"
},
{
"name": "CVE-2024-43856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43856"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2024-43860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43860"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-43863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43863"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43875"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-43884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43884"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2024-43902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43902"
},
{
"name": "CVE-2024-43905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43905"
},
{
"name": "CVE-2024-43907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43907"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2024-43909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43909"
},
{
"name": "CVE-2024-44947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44947"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-42160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42160"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-43835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43835"
},
{
"name": "CVE-2024-44946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44946"
},
{
"name": "CVE-2024-44974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44974"
},
{
"name": "CVE-2024-44982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44982"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44985"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-45007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45007"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-45009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45009"
},
{
"name": "CVE-2024-45011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45011"
},
{
"name": "CVE-2024-45016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45016"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-45026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45026"
},
{
"name": "CVE-2024-45028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45028"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-46702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46702"
},
{
"name": "CVE-2024-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46707"
},
{
"name": "CVE-2024-46713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-46724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46724"
},
{
"name": "CVE-2024-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46725"
},
{
"name": "CVE-2024-46731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46731"
},
{
"name": "CVE-2024-46732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46732"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46746"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-46752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46752"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2024-46763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2024-46791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46791"
},
{
"name": "CVE-2024-46795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46795"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2024-46804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46804"
},
{
"name": "CVE-2024-46805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46805"
},
{
"name": "CVE-2024-46807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46807"
},
{
"name": "CVE-2024-46810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46810"
},
{
"name": "CVE-2024-46814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2024-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46819"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-46832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46832"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-42272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42272"
},
{
"name": "CVE-2024-42297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42297"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2024-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
},
{
"name": "CVE-2024-42265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42265"
},
{
"name": "CVE-2024-42304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42304"
},
{
"name": "CVE-2024-42305",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42305"
},
{
"name": "CVE-2024-42306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42306"
},
{
"name": "CVE-2024-43828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43828"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-44948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44948"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-44971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44971"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2023-52918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52918"
},
{
"name": "CVE-2024-41018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41018"
},
{
"name": "CVE-2024-41019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41019"
},
{
"name": "CVE-2024-41021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41021"
},
{
"name": "CVE-2024-41029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41029"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2024-41033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41033"
},
{
"name": "CVE-2024-41052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41052"
},
{
"name": "CVE-2024-41053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41053"
},
{
"name": "CVE-2024-41054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41054"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-41083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41083"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-41086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41086"
},
{
"name": "CVE-2024-42063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42063"
},
{
"name": "CVE-2024-42065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42065"
},
{
"name": "CVE-2024-42066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42066"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2024-42088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42088"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-42100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42100"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2024-42108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42108"
},
{
"name": "CVE-2024-42111",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42111"
},
{
"name": "CVE-2024-42112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42112"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2024-42135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42135"
},
{
"name": "CVE-2024-42146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42146"
},
{
"name": "CVE-2024-42149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42149"
},
{
"name": "CVE-2024-42150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42150"
},
{
"name": "CVE-2024-42151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42151"
},
{
"name": "CVE-2024-42231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42231"
},
{
"name": "CVE-2024-42234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42234"
},
{
"name": "CVE-2024-42235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42235"
},
{
"name": "CVE-2024-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42248"
},
{
"name": "CVE-2024-42251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
},
{
"name": "CVE-2024-42267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42267"
},
{
"name": "CVE-2024-42296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42296"
},
{
"name": "CVE-2024-42299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42299"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-44934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44934"
},
{
"name": "CVE-2024-44958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44958"
},
{
"name": "CVE-2024-44966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44966"
},
{
"name": "CVE-2024-47660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47660"
},
{
"name": "CVE-2024-47665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47665"
},
{
"name": "CVE-2024-44942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44942"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-1013",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2024-11-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7123-1",
"url": "https://ubuntu.com/security/notices/USN-7123-1"
},
{
"published_at": "2024-11-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7121-2",
"url": "https://ubuntu.com/security/notices/USN-7121-2"
},
{
"published_at": "2024-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7120-3",
"url": "https://ubuntu.com/security/notices/USN-7120-3"
},
{
"published_at": "2024-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7119-1",
"url": "https://ubuntu.com/security/notices/USN-7119-1"
},
{
"published_at": "2024-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-7",
"url": "https://ubuntu.com/security/notices/USN-7089-7"
},
{
"published_at": "2024-11-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7120-2",
"url": "https://ubuntu.com/security/notices/USN-7120-2"
},
{
"published_at": "2024-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7121-1",
"url": "https://ubuntu.com/security/notices/USN-7121-1"
},
{
"published_at": "2024-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7120-1",
"url": "https://ubuntu.com/security/notices/USN-7120-1"
},
{
"published_at": "2024-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7122-1",
"url": "https://ubuntu.com/security/notices/USN-7122-1"
}
]
}
CERTFR-2025-AVI-0002
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 6.1.119-1~deb11u1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2023-31083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31083"
},
{
"name": "CVE-2024-27072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27072"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-35966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35966"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2024-26952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26952"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2024-36923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36923"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-37078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37078"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38553"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2024-39469",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39469"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2023-52760",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52760"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-36973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36973"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39371"
},
{
"name": "CVE-2024-39474",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39474"
},
{
"name": "CVE-2024-39484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39484"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2024-39495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
},
{
"name": "CVE-2024-39496",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39496"
},
{
"name": "CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2024-39505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39505"
},
{
"name": "CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"name": "CVE-2024-39507",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39507"
},
{
"name": "CVE-2024-39509",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39509"
},
{
"name": "CVE-2024-39510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39510"
},
{
"name": "CVE-2024-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40899"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"name": "CVE-2024-40905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40905"
},
{
"name": "CVE-2024-40906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40906"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40910"
},
{
"name": "CVE-2024-40911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40911"
},
{
"name": "CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40914"
},
{
"name": "CVE-2024-40915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40915"
},
{
"name": "CVE-2024-40916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40916"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40920"
},
{
"name": "CVE-2024-40921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40921"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"name": "CVE-2024-40932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40932"
},
{
"name": "CVE-2024-40934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40934"
},
{
"name": "CVE-2024-40935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40935"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40938"
},
{
"name": "CVE-2024-40939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40939"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"name": "CVE-2024-40942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40942"
},
{
"name": "CVE-2024-40943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40943"
},
{
"name": "CVE-2024-40947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40947"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40953"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40957"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"name": "CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
},
{
"name": "CVE-2024-40963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40963"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-40967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40967"
},
{
"name": "CVE-2024-40968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40968"
},
{
"name": "CVE-2024-40970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40970"
},
{
"name": "CVE-2024-40971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40971"
},
{
"name": "CVE-2024-40974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
},
{
"name": "CVE-2024-40976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40976"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"name": "CVE-2024-40980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40980"
},
{
"name": "CVE-2024-40981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40981"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2024-40987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40987"
},
{
"name": "CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40990"
},
{
"name": "CVE-2024-40993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40993"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"name": "CVE-2024-40996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40996"
},
{
"name": "CVE-2024-41000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41000"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-41002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41002"
},
{
"name": "CVE-2024-41004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41004"
},
{
"name": "CVE-2024-41005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
},
{
"name": "CVE-2024-41006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41006"
},
{
"name": "CVE-2023-52812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52812"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-39497",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39497"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41016"
},
{
"name": "CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42224"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2024-42102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42102"
},
{
"name": "CVE-2024-42104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42104"
},
{
"name": "CVE-2024-42106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42106"
},
{
"name": "CVE-2024-42115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42115"
},
{
"name": "CVE-2024-42121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42121"
},
{
"name": "CVE-2024-42127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42127"
},
{
"name": "CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"name": "CVE-2024-42137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42137"
},
{
"name": "CVE-2024-42148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42148"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-42154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
},
{
"name": "CVE-2024-42157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42157"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2024-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41073"
},
{
"name": "CVE-2024-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41096"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-41027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41027"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-42068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42068"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2024-42080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42080"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-42089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42089"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2024-42097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42097"
},
{
"name": "CVE-2024-42098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42098"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42130"
},
{
"name": "CVE-2024-42140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42140"
},
{
"name": "CVE-2024-42225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42225"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2024-42270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42270"
},
{
"name": "CVE-2023-52889",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52889"
},
{
"name": "CVE-2024-41028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41028"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2024-41051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41051"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2024-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41080"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2024-41098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41098"
},
{
"name": "CVE-2024-42073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42073"
},
{
"name": "CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"name": "CVE-2024-42126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42126"
},
{
"name": "CVE-2024-42136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42136"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42142"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2024-42159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42159"
},
{
"name": "CVE-2024-42228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42228"
},
{
"name": "CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"name": "CVE-2024-42250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42250"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42269"
},
{
"name": "CVE-2024-42271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42271"
},
{
"name": "CVE-2024-42274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42274"
},
{
"name": "CVE-2024-42276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42276"
},
{
"name": "CVE-2024-42277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42277"
},
{
"name": "CVE-2024-42280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42280"
},
{
"name": "CVE-2024-42281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42281"
},
{
"name": "CVE-2024-42283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42283"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-42285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42285"
},
{
"name": "CVE-2024-42286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42286"
},
{
"name": "CVE-2024-42287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42287"
},
{
"name": "CVE-2024-42288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42288"
},
{
"name": "CVE-2024-42289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42289"
},
{
"name": "CVE-2024-42290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42290"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-42295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42295"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-42302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42302"
},
{
"name": "CVE-2024-42309",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42309"
},
{
"name": "CVE-2024-42310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42310"
},
{
"name": "CVE-2024-42311",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42311"
},
{
"name": "CVE-2024-42312",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42312"
},
{
"name": "CVE-2024-42313",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42313"
},
{
"name": "CVE-2024-42314",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42314"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-42318",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42318"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43818"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2024-43829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43829"
},
{
"name": "CVE-2024-43830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43830"
},
{
"name": "CVE-2024-43833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43833"
},
{
"name": "CVE-2024-43834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43834"
},
{
"name": "CVE-2024-43837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43837"
},
{
"name": "CVE-2024-43839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43839"
},
{
"name": "CVE-2024-43841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43841"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43846"
},
{
"name": "CVE-2024-43849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43849"
},
{
"name": "CVE-2024-43851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43851"
},
{
"name": "CVE-2024-43853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43853"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-43855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43855"
},
{
"name": "CVE-2024-43856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43856"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2024-43860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43860"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-43863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43863"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43875"
},
{
"name": "CVE-2024-43876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43876"
},
{
"name": "CVE-2024-43877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43877"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-43884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43884"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2024-43895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43895"
},
{
"name": "CVE-2024-43897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43897"
},
{
"name": "CVE-2024-43900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43900"
},
{
"name": "CVE-2024-43902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43902"
},
{
"name": "CVE-2024-43904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43904"
},
{
"name": "CVE-2024-43905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43905"
},
{
"name": "CVE-2024-43907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43907"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2024-43909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43909"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-44931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44931"
},
{
"name": "CVE-2024-44938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44938"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-44947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44947"
},
{
"name": "CVE-2024-42160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42160"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-43835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43835"
},
{
"name": "CVE-2024-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43859"
},
{
"name": "CVE-2024-44940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44940"
},
{
"name": "CVE-2024-44946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44946"
},
{
"name": "CVE-2024-44974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44974"
},
{
"name": "CVE-2024-44977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44977"
},
{
"name": "CVE-2024-44982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44982"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44985"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-44991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44991"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45002"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-45007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45007"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-45009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45009"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45011"
},
{
"name": "CVE-2024-45016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45016"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-45026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45026"
},
{
"name": "CVE-2024-45028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45028"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-46674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46674"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-46686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46686"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-46694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46694"
},
{
"name": "CVE-2024-46702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46702"
},
{
"name": "CVE-2024-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46707"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-46724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46724"
},
{
"name": "CVE-2024-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46725"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2024-46731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46731"
},
{
"name": "CVE-2024-46732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46732"
},
{
"name": "CVE-2024-46734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46734"
},
{
"name": "CVE-2024-46735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46735"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46746"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-46752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46752"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2024-46763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-46773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46773"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46791"
},
{
"name": "CVE-2024-46794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46794"
},
{
"name": "CVE-2024-46795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46795"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2024-46804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46804"
},
{
"name": "CVE-2024-46805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46805"
},
{
"name": "CVE-2024-46807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46807"
},
{
"name": "CVE-2024-46810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46810"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2024-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46819"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-46826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46826"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2024-46832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46832"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-46846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46846"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2024-46849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46849"
},
{
"name": "CVE-2024-46852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46852"
},
{
"name": "CVE-2024-46853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46853"
},
{
"name": "CVE-2024-46854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46854"
},
{
"name": "CVE-2024-46855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46855"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-46858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46858"
},
{
"name": "CVE-2024-46859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46859"
},
{
"name": "CVE-2024-46865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46865"
},
{
"name": "CVE-2024-42272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42272"
},
{
"name": "CVE-2024-42297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42297"
},
{
"name": "CVE-2024-44968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44968"
},
{
"name": "CVE-2024-42265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42265"
},
{
"name": "CVE-2024-42304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42304"
},
{
"name": "CVE-2024-42305",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42305"
},
{
"name": "CVE-2024-42306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42306"
},
{
"name": "CVE-2024-43828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43828"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-44948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44948"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2024-44971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44971"
},
{
"name": "CVE-2024-46695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46695"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2023-52918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52918"
},
{
"name": "CVE-2024-41019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41019"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2024-42063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42063"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2024-46871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46871"
},
{
"name": "CVE-2024-42267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42267"
},
{
"name": "CVE-2024-42296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42296"
},
{
"name": "CVE-2024-42299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42299"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-44934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44934"
},
{
"name": "CVE-2024-44958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44958"
},
{
"name": "CVE-2024-44966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44966"
},
{
"name": "CVE-2024-47660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47660"
},
{
"name": "CVE-2024-47665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47665"
},
{
"name": "CVE-2024-47670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47670"
},
{
"name": "CVE-2024-47671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47671"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47673"
},
{
"name": "CVE-2024-47674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47674"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47684"
},
{
"name": "CVE-2024-47685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47685"
},
{
"name": "CVE-2024-47686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47686"
},
{
"name": "CVE-2024-47692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47692"
},
{
"name": "CVE-2024-47693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47693"
},
{
"name": "CVE-2024-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47695"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47697"
},
{
"name": "CVE-2024-47698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47698"
},
{
"name": "CVE-2024-47699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47699"
},
{
"name": "CVE-2024-47705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47705"
},
{
"name": "CVE-2024-47706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47706"
},
{
"name": "CVE-2024-47707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47707"
},
{
"name": "CVE-2024-47709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47709"
},
{
"name": "CVE-2024-47710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47710"
},
{
"name": "CVE-2024-47712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47712"
},
{
"name": "CVE-2024-47713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47713"
},
{
"name": "CVE-2024-47718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47718"
},
{
"name": "CVE-2024-47720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47720"
},
{
"name": "CVE-2024-47723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47723"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2024-47730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47730"
},
{
"name": "CVE-2024-47731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47731"
},
{
"name": "CVE-2024-47735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47735"
},
{
"name": "CVE-2024-47737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47737"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2024-47739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47739"
},
{
"name": "CVE-2024-47742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47742"
},
{
"name": "CVE-2024-47743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47743"
},
{
"name": "CVE-2024-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47747"
},
{
"name": "CVE-2024-47748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47748"
},
{
"name": "CVE-2024-47749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47749"
},
{
"name": "CVE-2024-47750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47750"
},
{
"name": "CVE-2024-47751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47751"
},
{
"name": "CVE-2024-47756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47756"
},
{
"name": "CVE-2024-47757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47757"
},
{
"name": "CVE-2024-49850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49850"
},
{
"name": "CVE-2024-49851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49851"
},
{
"name": "CVE-2024-49852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49852"
},
{
"name": "CVE-2024-49853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49853"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49858"
},
{
"name": "CVE-2024-49860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49860"
},
{
"name": "CVE-2024-49863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49863"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49867"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49871"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2024-49877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49877"
},
{
"name": "CVE-2024-49878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49878"
},
{
"name": "CVE-2024-49879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49879"
},
{
"name": "CVE-2024-49881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49881"
},
{
"name": "CVE-2024-49882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49882"
},
{
"name": "CVE-2024-49883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49883"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49890"
},
{
"name": "CVE-2024-49892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49892"
},
{
"name": "CVE-2024-49894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49894"
},
{
"name": "CVE-2024-49895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49895"
},
{
"name": "CVE-2024-49896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49896"
},
{
"name": "CVE-2024-49900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49900"
},
{
"name": "CVE-2024-49902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49902"
},
{
"name": "CVE-2024-49903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49903"
},
{
"name": "CVE-2024-49907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49907"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-49913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49913"
},
{
"name": "CVE-2024-49930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49930"
},
{
"name": "CVE-2024-49933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49933"
},
{
"name": "CVE-2024-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49935"
},
{
"name": "CVE-2024-49936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49936"
},
{
"name": "CVE-2024-49937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49937"
},
{
"name": "CVE-2024-49938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49938"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2024-49950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49950"
},
{
"name": "CVE-2024-49954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49954"
},
{
"name": "CVE-2024-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49955"
},
{
"name": "CVE-2024-49957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49957"
},
{
"name": "CVE-2024-49958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49958"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49961"
},
{
"name": "CVE-2024-49962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49962"
},
{
"name": "CVE-2024-49963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49963"
},
{
"name": "CVE-2024-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49965"
},
{
"name": "CVE-2024-49966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49966"
},
{
"name": "CVE-2024-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49967"
},
{
"name": "CVE-2024-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49969"
},
{
"name": "CVE-2024-49973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49973"
},
{
"name": "CVE-2024-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49974"
},
{
"name": "CVE-2024-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49975"
},
{
"name": "CVE-2024-49981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49981"
},
{
"name": "CVE-2024-49982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49982"
},
{
"name": "CVE-2024-49985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49985"
},
{
"name": "CVE-2024-49986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49986"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2024-49995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49995"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50001"
},
{
"name": "CVE-2024-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50002"
},
{
"name": "CVE-2024-50006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50006"
},
{
"name": "CVE-2024-50007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50007"
},
{
"name": "CVE-2024-50008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50008"
},
{
"name": "CVE-2024-50013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50013"
},
{
"name": "CVE-2024-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50015"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50024"
},
{
"name": "CVE-2024-50031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50031"
},
{
"name": "CVE-2024-50033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50033"
},
{
"name": "CVE-2024-50035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50035"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50044"
},
{
"name": "CVE-2024-50045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50045"
},
{
"name": "CVE-2024-50046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50046"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2024-50049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50049"
},
{
"name": "CVE-2024-50058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50058"
},
{
"name": "CVE-2024-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50059"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50062"
},
{
"name": "CVE-2024-50069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50069"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-43868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43868"
},
{
"name": "CVE-2024-44949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44949"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2024-50036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50036"
},
{
"name": "CVE-2024-50067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50067"
},
{
"name": "CVE-2024-50072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50072"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50218"
},
{
"name": "CVE-2024-50229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50229"
},
{
"name": "CVE-2024-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50230"
},
{
"name": "CVE-2024-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50232"
},
{
"name": "CVE-2024-50233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50233"
},
{
"name": "CVE-2024-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50234"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50236"
},
{
"name": "CVE-2024-50237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50237"
},
{
"name": "CVE-2024-50242",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50242"
},
{
"name": "CVE-2024-50243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50243"
},
{
"name": "CVE-2024-50244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50244"
},
{
"name": "CVE-2024-50245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50245"
},
{
"name": "CVE-2024-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50247"
},
{
"name": "CVE-2024-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50249"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50251"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50256"
},
{
"name": "CVE-2024-50257",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50257"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50262"
},
{
"name": "CVE-2024-50264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50264"
},
{
"name": "CVE-2024-50265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50265"
},
{
"name": "CVE-2024-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50267"
},
{
"name": "CVE-2024-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50268"
},
{
"name": "CVE-2024-50269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50269"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50273"
},
{
"name": "CVE-2024-50276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50276"
},
{
"name": "CVE-2024-50278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50278"
},
{
"name": "CVE-2024-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50282"
},
{
"name": "CVE-2024-50283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50283"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2024-50287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50287"
},
{
"name": "CVE-2024-50290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
},
{
"name": "CVE-2024-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50292"
},
{
"name": "CVE-2024-50295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50295"
},
{
"name": "CVE-2024-50296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50296"
},
{
"name": "CVE-2024-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
},
{
"name": "CVE-2024-50301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50301"
},
{
"name": "CVE-2024-50302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53043"
},
{
"name": "CVE-2024-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53052"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53057"
},
{
"name": "CVE-2024-53058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53058"
},
{
"name": "CVE-2024-53059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53059"
},
{
"name": "CVE-2024-53060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53060"
},
{
"name": "CVE-2024-53061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53061"
},
{
"name": "CVE-2024-53063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
},
{
"name": "CVE-2024-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53066"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53081"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-53088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53088"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2024-50208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50208"
},
{
"name": "CVE-2024-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50082"
},
{
"name": "CVE-2024-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50099"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-50142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50142"
},
{
"name": "CVE-2024-50192",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50192"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2024-42307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42307"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2024-47679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47679"
},
{
"name": "CVE-2024-47690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47690"
},
{
"name": "CVE-2024-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47701"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-47740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47740"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49868"
},
{
"name": "CVE-2024-49884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49884"
},
{
"name": "CVE-2024-49889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49889"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2024-49924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
},
{
"name": "CVE-2024-49927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49927"
},
{
"name": "CVE-2024-49944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49944"
},
{
"name": "CVE-2024-49948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49948"
},
{
"name": "CVE-2024-49952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49952"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-49983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49983"
},
{
"name": "CVE-2024-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49997"
},
{
"name": "CVE-2024-50003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50003"
},
{
"name": "CVE-2024-50038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
},
{
"name": "CVE-2024-50039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50039"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50095"
},
{
"name": "CVE-2024-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50096"
},
{
"name": "CVE-2024-50179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50179"
},
{
"name": "CVE-2024-50180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50180"
},
{
"name": "CVE-2024-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50181"
},
{
"name": "CVE-2024-50184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50184"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50188",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50188"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2024-50191",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50191"
},
{
"name": "CVE-2024-50026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50026"
},
{
"name": "CVE-2024-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50087"
},
{
"name": "CVE-2024-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50088"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50103"
},
{
"name": "CVE-2024-50108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50108"
},
{
"name": "CVE-2024-50115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50115"
},
{
"name": "CVE-2024-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50116"
},
{
"name": "CVE-2024-50117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50117"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50127"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50131"
},
{
"name": "CVE-2024-50134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50134"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50148"
},
{
"name": "CVE-2024-50150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50150"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50154"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50156"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50167"
},
{
"name": "CVE-2024-50171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50171"
},
{
"name": "CVE-2024-50176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50176"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2024-50194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50194"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2024-50196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50196"
},
{
"name": "CVE-2024-50198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50198"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50201"
},
{
"name": "CVE-2024-50205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50205"
},
{
"name": "CVE-2024-50209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50209"
},
{
"name": "CVE-2024-50210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50210"
},
{
"name": "CVE-2024-53096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53096"
},
{
"name": "CVE-2024-53100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53100"
},
{
"name": "CVE-2024-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53101"
},
{
"name": "CVE-2024-53104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
},
{
"name": "CVE-2024-53106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53106"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-53112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53112"
},
{
"name": "CVE-2024-53121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53121"
},
{
"name": "CVE-2024-53138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53138"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2024-49854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49854"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2024-50010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50010"
},
{
"name": "CVE-2024-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
},
{
"name": "CVE-2024-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50085"
},
{
"name": "CVE-2024-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50086"
},
{
"name": "CVE-2024-50133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50133"
},
{
"name": "CVE-2024-50143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
},
{
"name": "CVE-2024-50151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50151"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-50168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50168"
},
{
"name": "CVE-2024-50185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50185"
},
{
"name": "CVE-2024-50193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50193"
},
{
"name": "CVE-2024-50199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50199"
},
{
"name": "CVE-2024-50202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50202"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53103"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53119"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53122"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53127"
},
{
"name": "CVE-2024-53129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53129"
},
{
"name": "CVE-2024-53130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53130"
},
{
"name": "CVE-2024-53131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53131"
},
{
"name": "CVE-2024-53135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53135"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0002",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-03T00:00:00.000000"
},
{
"description": "Changement r\u00e9f\u00e9rence ",
"revision_date": "2025-01-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2025-01-05",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4008-1",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
}
]
}
CERTFR-2024-AVI-0997
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-13765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13765"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2023-52531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52531"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26810"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26812"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2024-27051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27051"
},
{
"name": "CVE-2024-26885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26885"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-26891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26891"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2021-47212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47212"
},
{
"name": "CVE-2024-26893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26893"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-27436",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27436"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38630"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2024-40915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40915"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38577"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2022-48666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48666"
},
{
"name": "CVE-2024-36484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36484"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2024-42102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42102"
},
{
"name": "CVE-2024-42104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42104"
},
{
"name": "CVE-2024-42106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42106"
},
{
"name": "CVE-2024-42115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42115"
},
{
"name": "CVE-2024-42121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42121"
},
{
"name": "CVE-2024-42127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42127"
},
{
"name": "CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"name": "CVE-2024-42137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42137"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-42157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42157"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2024-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41073"
},
{
"name": "CVE-2024-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41096"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-41027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41027"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-42068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42068"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2024-42080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42080"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-42089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42089"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2024-42097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42097"
},
{
"name": "CVE-2024-42098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42098"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42130"
},
{
"name": "CVE-2024-42140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42140"
},
{
"name": "CVE-2024-42225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42225"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2024-42270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42270"
},
{
"name": "CVE-2023-52889",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52889"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41025"
},
{
"name": "CVE-2024-41028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41028"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2024-41051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41051"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41061"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2024-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41080"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-41098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41098"
},
{
"name": "CVE-2024-42064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42064"
},
{
"name": "CVE-2024-42069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42069"
},
{
"name": "CVE-2024-42073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42073"
},
{
"name": "CVE-2024-42074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42074"
},
{
"name": "CVE-2024-42113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42113"
},
{
"name": "CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2024-42126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42126"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42136"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42142"
},
{
"name": "CVE-2024-42144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42144"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2024-42156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42156"
},
{
"name": "CVE-2024-42158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42158"
},
{
"name": "CVE-2024-42227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42227"
},
{
"name": "CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"name": "CVE-2024-42250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42250"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-42269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42269"
},
{
"name": "CVE-2024-42271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42271"
},
{
"name": "CVE-2024-42274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42274"
},
{
"name": "CVE-2024-42276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42276"
},
{
"name": "CVE-2024-42277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42277"
},
{
"name": "CVE-2024-42280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42280"
},
{
"name": "CVE-2024-42281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42281"
},
{
"name": "CVE-2024-42283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42283"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-42285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42285"
},
{
"name": "CVE-2024-42286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42286"
},
{
"name": "CVE-2024-42287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42287"
},
{
"name": "CVE-2024-42288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42288"
},
{
"name": "CVE-2024-42289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42289"
},
{
"name": "CVE-2024-42290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42290"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-42295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42295"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-42302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42302"
},
{
"name": "CVE-2024-42309",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42309"
},
{
"name": "CVE-2024-42310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42310"
},
{
"name": "CVE-2024-42311",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42311"
},
{
"name": "CVE-2024-42312",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42312"
},
{
"name": "CVE-2024-42313",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42313"
},
{
"name": "CVE-2024-42318",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42318"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43829"
},
{
"name": "CVE-2024-43830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43830"
},
{
"name": "CVE-2024-43834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43834"
},
{
"name": "CVE-2024-43839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43839"
},
{
"name": "CVE-2024-43841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43841"
},
{
"name": "CVE-2024-43846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43846"
},
{
"name": "CVE-2024-43849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43849"
},
{
"name": "CVE-2024-43853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43853"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-43855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43855"
},
{
"name": "CVE-2024-43856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43856"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2024-43860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43860"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-43863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43863"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43875"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-43884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43884"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2024-43902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43902"
},
{
"name": "CVE-2024-43905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43905"
},
{
"name": "CVE-2024-43907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43907"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2024-43909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43909"
},
{
"name": "CVE-2024-44947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44947"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-43835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43835"
},
{
"name": "CVE-2024-44940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44940"
},
{
"name": "CVE-2024-44946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44946"
},
{
"name": "CVE-2024-44974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44974"
},
{
"name": "CVE-2024-44982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44982"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44985"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-45007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45007"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-45009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45009"
},
{
"name": "CVE-2024-45011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45011"
},
{
"name": "CVE-2024-45016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45016"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-45026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45026"
},
{
"name": "CVE-2024-45028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45028"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-46702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46702"
},
{
"name": "CVE-2024-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46707"
},
{
"name": "CVE-2024-46713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-46724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46724"
},
{
"name": "CVE-2024-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46725"
},
{
"name": "CVE-2024-46731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46731"
},
{
"name": "CVE-2024-46732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46732"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46746"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-46752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46752"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2024-46763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2024-46791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46791"
},
{
"name": "CVE-2024-46795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46795"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2024-46804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46804"
},
{
"name": "CVE-2024-46805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46805"
},
{
"name": "CVE-2024-46807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46807"
},
{
"name": "CVE-2024-46810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46810"
},
{
"name": "CVE-2024-46814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2024-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46819"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-46832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46832"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-42272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42272"
},
{
"name": "CVE-2024-42297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42297"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2024-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
},
{
"name": "CVE-2024-42265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42265"
},
{
"name": "CVE-2024-42304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42304"
},
{
"name": "CVE-2024-42305",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42305"
},
{
"name": "CVE-2024-42306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42306"
},
{
"name": "CVE-2024-43828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43828"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-44948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44948"
},
{
"name": "CVE-2024-44952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44952"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-44971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44971"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2023-52918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52918"
},
{
"name": "CVE-2024-41018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41018"
},
{
"name": "CVE-2024-41019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41019"
},
{
"name": "CVE-2024-41021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41021"
},
{
"name": "CVE-2024-41029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41029"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2024-41033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41033"
},
{
"name": "CVE-2024-41052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41052"
},
{
"name": "CVE-2024-41053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41053"
},
{
"name": "CVE-2024-41054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41054"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-41083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41083"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-41086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41086"
},
{
"name": "CVE-2024-42063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42063"
},
{
"name": "CVE-2024-42065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42065"
},
{
"name": "CVE-2024-42066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42066"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2024-42088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42088"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-42100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42100"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2024-42108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42108"
},
{
"name": "CVE-2024-42111",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42111"
},
{
"name": "CVE-2024-42112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42112"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2024-42135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42135"
},
{
"name": "CVE-2024-42146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42146"
},
{
"name": "CVE-2024-42149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42149"
},
{
"name": "CVE-2024-42150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42150"
},
{
"name": "CVE-2024-42151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42151"
},
{
"name": "CVE-2024-42231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42231"
},
{
"name": "CVE-2024-42234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42234"
},
{
"name": "CVE-2024-42235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42235"
},
{
"name": "CVE-2024-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42248"
},
{
"name": "CVE-2024-42251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
},
{
"name": "CVE-2020-8608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8608"
},
{
"name": "CVE-2021-3592",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3592"
},
{
"name": "CVE-2021-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3594"
},
{
"name": "CVE-2023-3019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3019"
},
{
"name": "CVE-2024-42267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42267"
},
{
"name": "CVE-2024-42296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42296"
},
{
"name": "CVE-2024-42299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42299"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-44934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44934"
},
{
"name": "CVE-2024-44958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44958"
},
{
"name": "CVE-2024-44966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44966"
},
{
"name": "CVE-2024-4693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4693"
},
{
"name": "CVE-2024-47660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47660"
},
{
"name": "CVE-2024-47665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47665"
},
{
"name": "CVE-2024-7730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7730"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0997",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-5",
"url": "https://ubuntu.com/security/notices/USN-7089-5"
},
{
"published_at": "2024-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7100-1",
"url": "https://ubuntu.com/security/notices/USN-7100-1"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7110-1",
"url": "https://ubuntu.com/security/notices/USN-7110-1"
},
{
"published_at": "2024-11-15",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-6",
"url": "https://ubuntu.com/security/notices/USN-7089-6"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7100-2",
"url": "https://ubuntu.com/security/notices/USN-7100-2"
},
{
"published_at": "2024-11-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-4",
"url": "https://ubuntu.com/security/notices/USN-7089-4"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7088-5",
"url": "https://ubuntu.com/security/notices/USN-7088-5"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7071-2",
"url": "https://ubuntu.com/security/notices/USN-7071-2"
},
{
"published_at": "2024-11-08",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7094-1",
"url": "https://ubuntu.com/security/notices/USN-7094-1"
}
]
}
CERTFR-2024-AVI-1080
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-24448",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24448"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2021-47076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47076"
},
{
"name": "CVE-2023-52531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52531"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2023-52639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52639"
},
{
"name": "CVE-2023-52497",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52497"
},
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2023-52488",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52488"
},
{
"name": "CVE-2021-47055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47055"
},
{
"name": "CVE-2023-52578",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
},
{
"name": "CVE-2023-52498",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52498"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-27022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27022"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2024-26893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26893"
},
{
"name": "CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"name": "CVE-2021-47501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47501"
},
{
"name": "CVE-2024-35877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35877"
},
{
"name": "CVE-2024-35904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35904"
},
{
"name": "CVE-2024-35951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35951"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2024-26947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26947"
},
{
"name": "CVE-2022-48733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48733"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-40915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40915"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-36968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36968"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2024-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38577"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42224"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2022-48666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48666"
},
{
"name": "CVE-2024-36484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36484"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2024-42102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42102"
},
{
"name": "CVE-2024-42104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42104"
},
{
"name": "CVE-2024-42106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42106"
},
{
"name": "CVE-2024-42115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42115"
},
{
"name": "CVE-2024-42121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42121"
},
{
"name": "CVE-2024-42127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42127"
},
{
"name": "CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"name": "CVE-2024-42137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42137"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-42154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
},
{
"name": "CVE-2024-42157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42157"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2024-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41073"
},
{
"name": "CVE-2024-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41096"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-41027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41027"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-42068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42068"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2024-42080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42080"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-42089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42089"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2024-42097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42097"
},
{
"name": "CVE-2024-42098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42098"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42130"
},
{
"name": "CVE-2024-42140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42140"
},
{
"name": "CVE-2024-42225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42225"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2024-42270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42270"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48943"
},
{
"name": "CVE-2023-52889",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52889"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41025"
},
{
"name": "CVE-2024-41028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41028"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2024-41051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41051"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41061"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2024-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41080"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-41098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41098"
},
{
"name": "CVE-2024-42064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42064"
},
{
"name": "CVE-2024-42069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42069"
},
{
"name": "CVE-2024-42073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42073"
},
{
"name": "CVE-2024-42074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42074"
},
{
"name": "CVE-2024-42113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42113"
},
{
"name": "CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2024-42126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42126"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42136"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42142"
},
{
"name": "CVE-2024-42144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42144"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2024-42156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42156"
},
{
"name": "CVE-2024-42158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42158"
},
{
"name": "CVE-2024-42159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42159"
},
{
"name": "CVE-2024-42227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42227"
},
{
"name": "CVE-2024-42228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42228"
},
{
"name": "CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"name": "CVE-2024-42250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42250"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42269"
},
{
"name": "CVE-2024-42271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42271"
},
{
"name": "CVE-2024-42274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42274"
},
{
"name": "CVE-2024-42276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42276"
},
{
"name": "CVE-2024-42277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42277"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42279"
},
{
"name": "CVE-2024-42280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42280"
},
{
"name": "CVE-2024-42281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42281"
},
{
"name": "CVE-2024-42283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42283"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-42285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42285"
},
{
"name": "CVE-2024-42286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42286"
},
{
"name": "CVE-2024-42287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42287"
},
{
"name": "CVE-2024-42288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42288"
},
{
"name": "CVE-2024-42289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42289"
},
{
"name": "CVE-2024-42290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42290"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-42295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42295"
},
{
"name": "CVE-2024-42298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42298"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-42302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42302"
},
{
"name": "CVE-2024-42303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42303"
},
{
"name": "CVE-2024-42309",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42309"
},
{
"name": "CVE-2024-42310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42310"
},
{
"name": "CVE-2024-42311",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42311"
},
{
"name": "CVE-2024-42312",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42312"
},
{
"name": "CVE-2024-42313",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42313"
},
{
"name": "CVE-2024-42314",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42314"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-42318",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42318"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43818"
},
{
"name": "CVE-2024-43819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43819"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2024-43825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43825"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43829"
},
{
"name": "CVE-2024-43830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43830"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2024-43833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43833"
},
{
"name": "CVE-2024-43834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43834"
},
{
"name": "CVE-2024-43837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43837"
},
{
"name": "CVE-2024-43839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43839"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43841"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43846"
},
{
"name": "CVE-2024-43847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43847"
},
{
"name": "CVE-2024-43849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43849"
},
{
"name": "CVE-2024-43850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43850"
},
{
"name": "CVE-2024-43853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43853"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-43855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43855"
},
{
"name": "CVE-2024-43856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43856"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2024-43860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43860"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-43863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43863"
},
{
"name": "CVE-2024-43864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43864"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43875"
},
{
"name": "CVE-2024-43876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43876"
},
{
"name": "CVE-2024-43877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43877"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-43881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43881"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-43884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43884"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2024-43895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43895"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2024-43900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43900"
},
{
"name": "CVE-2024-43902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43902"
},
{
"name": "CVE-2024-43904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43904"
},
{
"name": "CVE-2024-43905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43905"
},
{
"name": "CVE-2024-43906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43906"
},
{
"name": "CVE-2024-43907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43907"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2024-43909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43909"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-44931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44931"
},
{
"name": "CVE-2024-44938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44938"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-44947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44947"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-42160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42160"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-43835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43835"
},
{
"name": "CVE-2024-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43859"
},
{
"name": "CVE-2024-44940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44940"
},
{
"name": "CVE-2024-44946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44946"
},
{
"name": "CVE-2024-44974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44974"
},
{
"name": "CVE-2024-44977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44977"
},
{
"name": "CVE-2024-44982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44982"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44985"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-44991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44991"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45002"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-45007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45007"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-45009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45009"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45011"
},
{
"name": "CVE-2024-45016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45016"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-45026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45026"
},
{
"name": "CVE-2024-45028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45028"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-46686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46686"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-46694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46694"
},
{
"name": "CVE-2024-46702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46702"
},
{
"name": "CVE-2024-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46707"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-46724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46724"
},
{
"name": "CVE-2024-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46725"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2024-46731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46731"
},
{
"name": "CVE-2024-46732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46732"
},
{
"name": "CVE-2024-46735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46735"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46746"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-46752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46752"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2024-46763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-46773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46773"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46791"
},
{
"name": "CVE-2024-46794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46794"
},
{
"name": "CVE-2024-46795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46795"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2024-46804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46804"
},
{
"name": "CVE-2024-46805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46805"
},
{
"name": "CVE-2024-46807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46807"
},
{
"name": "CVE-2024-46810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46810"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2024-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46819"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-46826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46826"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2024-46832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46832"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-46846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46846"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2024-46849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46849"
},
{
"name": "CVE-2024-46852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46852"
},
{
"name": "CVE-2024-46853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46853"
},
{
"name": "CVE-2024-46854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46854"
},
{
"name": "CVE-2024-46855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46855"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-46858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46858"
},
{
"name": "CVE-2024-46859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46859"
},
{
"name": "CVE-2024-42272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42272"
},
{
"name": "CVE-2024-42297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42297"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2024-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
},
{
"name": "CVE-2024-42265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42265"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-42304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42304"
},
{
"name": "CVE-2024-42305",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42305"
},
{
"name": "CVE-2024-42306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42306"
},
{
"name": "CVE-2024-43828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43828"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2024-43845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43845"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-43886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43886"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-44948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44948"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2024-44971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44971"
},
{
"name": "CVE-2024-44972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44972"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-45030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45030"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-46687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46687"
},
{
"name": "CVE-2024-46691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46691"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46693"
},
{
"name": "CVE-2024-46695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46695"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2024-46741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46741"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46760"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46772"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2024-46776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46776"
},
{
"name": "CVE-2024-46778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46778"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2023-52918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52918"
},
{
"name": "CVE-2024-41018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41018"
},
{
"name": "CVE-2024-41019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41019"
},
{
"name": "CVE-2024-41021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41021"
},
{
"name": "CVE-2024-41029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41029"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2024-41033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41033"
},
{
"name": "CVE-2024-41052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41052"
},
{
"name": "CVE-2024-41053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41053"
},
{
"name": "CVE-2024-41054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41054"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-41083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41083"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-41086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41086"
},
{
"name": "CVE-2024-42063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42063"
},
{
"name": "CVE-2024-42065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42065"
},
{
"name": "CVE-2024-42066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42066"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2024-42088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42088"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-42100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42100"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2024-42108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42108"
},
{
"name": "CVE-2024-42111",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42111"
},
{
"name": "CVE-2024-42112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42112"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2024-42135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42135"
},
{
"name": "CVE-2024-42146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42146"
},
{
"name": "CVE-2024-42149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42149"
},
{
"name": "CVE-2024-42150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42150"
},
{
"name": "CVE-2024-42151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42151"
},
{
"name": "CVE-2024-42231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42231"
},
{
"name": "CVE-2024-42234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42234"
},
{
"name": "CVE-2024-42235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42235"
},
{
"name": "CVE-2024-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42248"
},
{
"name": "CVE-2024-42251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43857"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2024-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46809"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46827"
},
{
"name": "CVE-2024-46831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46831"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2024-46841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46841"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2024-46851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46851"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2024-46871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46871"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2024-42267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42267"
},
{
"name": "CVE-2024-42296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42296"
},
{
"name": "CVE-2024-42299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42299"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-44934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44934"
},
{
"name": "CVE-2024-44958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44958"
},
{
"name": "CVE-2024-44966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44966"
},
{
"name": "CVE-2024-47660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47660"
},
{
"name": "CVE-2024-47665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47665"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-47674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47674"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-44942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44942"
},
{
"name": "CVE-2024-43868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43868"
},
{
"name": "CVE-2024-42260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42260"
},
{
"name": "CVE-2024-42261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42261"
},
{
"name": "CVE-2024-42262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42262"
},
{
"name": "CVE-2024-42263",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42263"
},
{
"name": "CVE-2024-42264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42264"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2024-42307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42307"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43827"
},
{
"name": "CVE-2024-43843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43843"
},
{
"name": "CVE-2024-43852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43852"
},
{
"name": "CVE-2024-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43887"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43891"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-43913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43913"
},
{
"name": "CVE-2024-44937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44937"
},
{
"name": "CVE-2024-44941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44941"
},
{
"name": "CVE-2024-44943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44943"
},
{
"name": "CVE-2024-44953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44953"
},
{
"name": "CVE-2024-44956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44956"
},
{
"name": "CVE-2024-44957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44957"
},
{
"name": "CVE-2024-44959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44959"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2024-44973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44973"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44978"
},
{
"name": "CVE-2024-44979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44979"
},
{
"name": "CVE-2024-44980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44980"
},
{
"name": "CVE-2024-44993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44993"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46680",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46680"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-46683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46683"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46701"
},
{
"name": "CVE-2024-46703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46703"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2024-46708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46708"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2024-46768",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46768"
},
{
"name": "CVE-2024-46779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46779"
},
{
"name": "CVE-2024-46785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46785"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46792",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46792"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2024-46838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46838"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-46847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46847"
},
{
"name": "CVE-2024-46850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46850"
},
{
"name": "CVE-2024-46866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46866"
},
{
"name": "CVE-2024-46867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46867"
},
{
"name": "CVE-2024-46868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46868"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2024-49984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49984"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-1080",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2024-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7144-1",
"url": "https://ubuntu.com/security/notices/USN-7144-1"
},
{
"published_at": "2024-12-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7159-1",
"url": "https://ubuntu.com/security/notices/USN-7159-1"
},
{
"published_at": "2024-12-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7155-1",
"url": "https://ubuntu.com/security/notices/USN-7155-1"
},
{
"published_at": "2024-12-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7154-1",
"url": "https://ubuntu.com/security/notices/USN-7154-1"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7148-1",
"url": "https://ubuntu.com/security/notices/USN-7148-1"
},
{
"published_at": "2024-12-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7156-1",
"url": "https://ubuntu.com/security/notices/USN-7156-1"
}
]
}
CERTFR-2024-AVI-1080
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-24448",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24448"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2021-47076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47076"
},
{
"name": "CVE-2023-52531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52531"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2023-52639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52639"
},
{
"name": "CVE-2023-52497",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52497"
},
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2023-52488",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52488"
},
{
"name": "CVE-2021-47055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47055"
},
{
"name": "CVE-2023-52578",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
},
{
"name": "CVE-2023-52498",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52498"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-27022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27022"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2024-26893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26893"
},
{
"name": "CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"name": "CVE-2021-47501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47501"
},
{
"name": "CVE-2024-35877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35877"
},
{
"name": "CVE-2024-35904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35904"
},
{
"name": "CVE-2024-35951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35951"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2024-26947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26947"
},
{
"name": "CVE-2022-48733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48733"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-40915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40915"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-36968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36968"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2024-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38577"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42224"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2022-48666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48666"
},
{
"name": "CVE-2024-36484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36484"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2024-42102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42102"
},
{
"name": "CVE-2024-42104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42104"
},
{
"name": "CVE-2024-42106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42106"
},
{
"name": "CVE-2024-42115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42115"
},
{
"name": "CVE-2024-42121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42121"
},
{
"name": "CVE-2024-42127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42127"
},
{
"name": "CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"name": "CVE-2024-42137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42137"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-42154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
},
{
"name": "CVE-2024-42157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42157"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2024-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41073"
},
{
"name": "CVE-2024-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41096"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-41027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41027"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-42068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42068"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2024-42080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42080"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-42089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42089"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2024-42097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42097"
},
{
"name": "CVE-2024-42098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42098"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42130"
},
{
"name": "CVE-2024-42140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42140"
},
{
"name": "CVE-2024-42225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42225"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2024-42270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42270"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48943"
},
{
"name": "CVE-2023-52889",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52889"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41025"
},
{
"name": "CVE-2024-41028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41028"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2024-41051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41051"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41061"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2024-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41080"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-41098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41098"
},
{
"name": "CVE-2024-42064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42064"
},
{
"name": "CVE-2024-42069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42069"
},
{
"name": "CVE-2024-42073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42073"
},
{
"name": "CVE-2024-42074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42074"
},
{
"name": "CVE-2024-42113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42113"
},
{
"name": "CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2024-42126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42126"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42136"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42142"
},
{
"name": "CVE-2024-42144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42144"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2024-42156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42156"
},
{
"name": "CVE-2024-42158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42158"
},
{
"name": "CVE-2024-42159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42159"
},
{
"name": "CVE-2024-42227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42227"
},
{
"name": "CVE-2024-42228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42228"
},
{
"name": "CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"name": "CVE-2024-42250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42250"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42269"
},
{
"name": "CVE-2024-42271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42271"
},
{
"name": "CVE-2024-42274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42274"
},
{
"name": "CVE-2024-42276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42276"
},
{
"name": "CVE-2024-42277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42277"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42279"
},
{
"name": "CVE-2024-42280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42280"
},
{
"name": "CVE-2024-42281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42281"
},
{
"name": "CVE-2024-42283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42283"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-42285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42285"
},
{
"name": "CVE-2024-42286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42286"
},
{
"name": "CVE-2024-42287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42287"
},
{
"name": "CVE-2024-42288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42288"
},
{
"name": "CVE-2024-42289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42289"
},
{
"name": "CVE-2024-42290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42290"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-42295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42295"
},
{
"name": "CVE-2024-42298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42298"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-42302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42302"
},
{
"name": "CVE-2024-42303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42303"
},
{
"name": "CVE-2024-42309",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42309"
},
{
"name": "CVE-2024-42310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42310"
},
{
"name": "CVE-2024-42311",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42311"
},
{
"name": "CVE-2024-42312",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42312"
},
{
"name": "CVE-2024-42313",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42313"
},
{
"name": "CVE-2024-42314",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42314"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-42318",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42318"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43818"
},
{
"name": "CVE-2024-43819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43819"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2024-43825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43825"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43829"
},
{
"name": "CVE-2024-43830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43830"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2024-43833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43833"
},
{
"name": "CVE-2024-43834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43834"
},
{
"name": "CVE-2024-43837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43837"
},
{
"name": "CVE-2024-43839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43839"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43841"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43846"
},
{
"name": "CVE-2024-43847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43847"
},
{
"name": "CVE-2024-43849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43849"
},
{
"name": "CVE-2024-43850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43850"
},
{
"name": "CVE-2024-43853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43853"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-43855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43855"
},
{
"name": "CVE-2024-43856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43856"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2024-43860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43860"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-43863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43863"
},
{
"name": "CVE-2024-43864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43864"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43875"
},
{
"name": "CVE-2024-43876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43876"
},
{
"name": "CVE-2024-43877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43877"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-43881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43881"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-43884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43884"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2024-43895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43895"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2024-43900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43900"
},
{
"name": "CVE-2024-43902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43902"
},
{
"name": "CVE-2024-43904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43904"
},
{
"name": "CVE-2024-43905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43905"
},
{
"name": "CVE-2024-43906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43906"
},
{
"name": "CVE-2024-43907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43907"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2024-43909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43909"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-44931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44931"
},
{
"name": "CVE-2024-44938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44938"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-44947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44947"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-42160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42160"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-43835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43835"
},
{
"name": "CVE-2024-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43859"
},
{
"name": "CVE-2024-44940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44940"
},
{
"name": "CVE-2024-44946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44946"
},
{
"name": "CVE-2024-44974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44974"
},
{
"name": "CVE-2024-44977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44977"
},
{
"name": "CVE-2024-44982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44982"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44985"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-44991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44991"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45002"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-45007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45007"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-45009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45009"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45011"
},
{
"name": "CVE-2024-45016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45016"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-45026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45026"
},
{
"name": "CVE-2024-45028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45028"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-46686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46686"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-46694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46694"
},
{
"name": "CVE-2024-46702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46702"
},
{
"name": "CVE-2024-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46707"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-46724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46724"
},
{
"name": "CVE-2024-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46725"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2024-46731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46731"
},
{
"name": "CVE-2024-46732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46732"
},
{
"name": "CVE-2024-46735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46735"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46746"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-46752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46752"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2024-46763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-46773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46773"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46791"
},
{
"name": "CVE-2024-46794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46794"
},
{
"name": "CVE-2024-46795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46795"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2024-46804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46804"
},
{
"name": "CVE-2024-46805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46805"
},
{
"name": "CVE-2024-46807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46807"
},
{
"name": "CVE-2024-46810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46810"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2024-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46819"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-46826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46826"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2024-46832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46832"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-46846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46846"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2024-46849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46849"
},
{
"name": "CVE-2024-46852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46852"
},
{
"name": "CVE-2024-46853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46853"
},
{
"name": "CVE-2024-46854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46854"
},
{
"name": "CVE-2024-46855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46855"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-46858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46858"
},
{
"name": "CVE-2024-46859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46859"
},
{
"name": "CVE-2024-42272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42272"
},
{
"name": "CVE-2024-42297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42297"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2024-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
},
{
"name": "CVE-2024-42265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42265"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-42304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42304"
},
{
"name": "CVE-2024-42305",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42305"
},
{
"name": "CVE-2024-42306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42306"
},
{
"name": "CVE-2024-43828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43828"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2024-43845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43845"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-43886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43886"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-44948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44948"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2024-44971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44971"
},
{
"name": "CVE-2024-44972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44972"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-45030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45030"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-46687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46687"
},
{
"name": "CVE-2024-46691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46691"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46693"
},
{
"name": "CVE-2024-46695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46695"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2024-46741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46741"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46760"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46772"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2024-46776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46776"
},
{
"name": "CVE-2024-46778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46778"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2023-52918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52918"
},
{
"name": "CVE-2024-41018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41018"
},
{
"name": "CVE-2024-41019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41019"
},
{
"name": "CVE-2024-41021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41021"
},
{
"name": "CVE-2024-41029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41029"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2024-41033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41033"
},
{
"name": "CVE-2024-41052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41052"
},
{
"name": "CVE-2024-41053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41053"
},
{
"name": "CVE-2024-41054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41054"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-41083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41083"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-41086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41086"
},
{
"name": "CVE-2024-42063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42063"
},
{
"name": "CVE-2024-42065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42065"
},
{
"name": "CVE-2024-42066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42066"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2024-42088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42088"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-42100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42100"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2024-42108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42108"
},
{
"name": "CVE-2024-42111",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42111"
},
{
"name": "CVE-2024-42112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42112"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2024-42135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42135"
},
{
"name": "CVE-2024-42146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42146"
},
{
"name": "CVE-2024-42149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42149"
},
{
"name": "CVE-2024-42150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42150"
},
{
"name": "CVE-2024-42151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42151"
},
{
"name": "CVE-2024-42231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42231"
},
{
"name": "CVE-2024-42234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42234"
},
{
"name": "CVE-2024-42235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42235"
},
{
"name": "CVE-2024-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42248"
},
{
"name": "CVE-2024-42251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43857"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2024-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46809"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46827"
},
{
"name": "CVE-2024-46831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46831"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2024-46841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46841"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2024-46851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46851"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2024-46871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46871"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2024-42267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42267"
},
{
"name": "CVE-2024-42296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42296"
},
{
"name": "CVE-2024-42299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42299"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-44934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44934"
},
{
"name": "CVE-2024-44958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44958"
},
{
"name": "CVE-2024-44966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44966"
},
{
"name": "CVE-2024-47660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47660"
},
{
"name": "CVE-2024-47665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47665"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-47674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47674"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-44942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44942"
},
{
"name": "CVE-2024-43868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43868"
},
{
"name": "CVE-2024-42260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42260"
},
{
"name": "CVE-2024-42261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42261"
},
{
"name": "CVE-2024-42262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42262"
},
{
"name": "CVE-2024-42263",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42263"
},
{
"name": "CVE-2024-42264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42264"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2024-42307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42307"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43827"
},
{
"name": "CVE-2024-43843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43843"
},
{
"name": "CVE-2024-43852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43852"
},
{
"name": "CVE-2024-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43887"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43891"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-43913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43913"
},
{
"name": "CVE-2024-44937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44937"
},
{
"name": "CVE-2024-44941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44941"
},
{
"name": "CVE-2024-44943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44943"
},
{
"name": "CVE-2024-44953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44953"
},
{
"name": "CVE-2024-44956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44956"
},
{
"name": "CVE-2024-44957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44957"
},
{
"name": "CVE-2024-44959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44959"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2024-44973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44973"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44978"
},
{
"name": "CVE-2024-44979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44979"
},
{
"name": "CVE-2024-44980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44980"
},
{
"name": "CVE-2024-44993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44993"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46680",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46680"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-46683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46683"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46701"
},
{
"name": "CVE-2024-46703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46703"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2024-46708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46708"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2024-46768",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46768"
},
{
"name": "CVE-2024-46779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46779"
},
{
"name": "CVE-2024-46785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46785"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46792",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46792"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2024-46838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46838"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-46847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46847"
},
{
"name": "CVE-2024-46850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46850"
},
{
"name": "CVE-2024-46866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46866"
},
{
"name": "CVE-2024-46867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46867"
},
{
"name": "CVE-2024-46868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46868"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2024-49984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49984"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-1080",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2024-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7144-1",
"url": "https://ubuntu.com/security/notices/USN-7144-1"
},
{
"published_at": "2024-12-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7159-1",
"url": "https://ubuntu.com/security/notices/USN-7159-1"
},
{
"published_at": "2024-12-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7155-1",
"url": "https://ubuntu.com/security/notices/USN-7155-1"
},
{
"published_at": "2024-12-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7154-1",
"url": "https://ubuntu.com/security/notices/USN-7154-1"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7148-1",
"url": "https://ubuntu.com/security/notices/USN-7148-1"
},
{
"published_at": "2024-12-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7156-1",
"url": "https://ubuntu.com/security/notices/USN-7156-1"
}
]
}
CERTFR-2024-AVI-0997
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-13765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13765"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2023-52531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52531"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26810"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26812"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2024-27051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27051"
},
{
"name": "CVE-2024-26885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26885"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-26891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26891"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2021-47212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47212"
},
{
"name": "CVE-2024-26893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26893"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-27436",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27436"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38630"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2024-40915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40915"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38577"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2022-48666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48666"
},
{
"name": "CVE-2024-36484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36484"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2024-42102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42102"
},
{
"name": "CVE-2024-42104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42104"
},
{
"name": "CVE-2024-42106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42106"
},
{
"name": "CVE-2024-42115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42115"
},
{
"name": "CVE-2024-42121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42121"
},
{
"name": "CVE-2024-42127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42127"
},
{
"name": "CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"name": "CVE-2024-42137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42137"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-42157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42157"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2024-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41073"
},
{
"name": "CVE-2024-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41096"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-41027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41027"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-42068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42068"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2024-42080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42080"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-42089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42089"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2024-42097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42097"
},
{
"name": "CVE-2024-42098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42098"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42130"
},
{
"name": "CVE-2024-42140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42140"
},
{
"name": "CVE-2024-42225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42225"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2024-42270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42270"
},
{
"name": "CVE-2023-52889",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52889"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41025"
},
{
"name": "CVE-2024-41028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41028"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2024-41051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41051"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41061"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2024-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41080"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-41098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41098"
},
{
"name": "CVE-2024-42064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42064"
},
{
"name": "CVE-2024-42069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42069"
},
{
"name": "CVE-2024-42073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42073"
},
{
"name": "CVE-2024-42074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42074"
},
{
"name": "CVE-2024-42113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42113"
},
{
"name": "CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2024-42126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42126"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42136"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42142"
},
{
"name": "CVE-2024-42144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42144"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2024-42156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42156"
},
{
"name": "CVE-2024-42158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42158"
},
{
"name": "CVE-2024-42227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42227"
},
{
"name": "CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"name": "CVE-2024-42250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42250"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-42269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42269"
},
{
"name": "CVE-2024-42271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42271"
},
{
"name": "CVE-2024-42274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42274"
},
{
"name": "CVE-2024-42276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42276"
},
{
"name": "CVE-2024-42277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42277"
},
{
"name": "CVE-2024-42280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42280"
},
{
"name": "CVE-2024-42281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42281"
},
{
"name": "CVE-2024-42283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42283"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-42285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42285"
},
{
"name": "CVE-2024-42286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42286"
},
{
"name": "CVE-2024-42287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42287"
},
{
"name": "CVE-2024-42288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42288"
},
{
"name": "CVE-2024-42289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42289"
},
{
"name": "CVE-2024-42290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42290"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-42295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42295"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-42302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42302"
},
{
"name": "CVE-2024-42309",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42309"
},
{
"name": "CVE-2024-42310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42310"
},
{
"name": "CVE-2024-42311",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42311"
},
{
"name": "CVE-2024-42312",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42312"
},
{
"name": "CVE-2024-42313",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42313"
},
{
"name": "CVE-2024-42318",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42318"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43829"
},
{
"name": "CVE-2024-43830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43830"
},
{
"name": "CVE-2024-43834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43834"
},
{
"name": "CVE-2024-43839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43839"
},
{
"name": "CVE-2024-43841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43841"
},
{
"name": "CVE-2024-43846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43846"
},
{
"name": "CVE-2024-43849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43849"
},
{
"name": "CVE-2024-43853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43853"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-43855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43855"
},
{
"name": "CVE-2024-43856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43856"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2024-43860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43860"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-43863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43863"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43875"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-43884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43884"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2024-43902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43902"
},
{
"name": "CVE-2024-43905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43905"
},
{
"name": "CVE-2024-43907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43907"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2024-43909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43909"
},
{
"name": "CVE-2024-44947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44947"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-43835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43835"
},
{
"name": "CVE-2024-44940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44940"
},
{
"name": "CVE-2024-44946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44946"
},
{
"name": "CVE-2024-44974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44974"
},
{
"name": "CVE-2024-44982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44982"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44985"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-45007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45007"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-45009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45009"
},
{
"name": "CVE-2024-45011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45011"
},
{
"name": "CVE-2024-45016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45016"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-45026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45026"
},
{
"name": "CVE-2024-45028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45028"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-46702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46702"
},
{
"name": "CVE-2024-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46707"
},
{
"name": "CVE-2024-46713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-46724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46724"
},
{
"name": "CVE-2024-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46725"
},
{
"name": "CVE-2024-46731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46731"
},
{
"name": "CVE-2024-46732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46732"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46746"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-46752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46752"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2024-46763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2024-46791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46791"
},
{
"name": "CVE-2024-46795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46795"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2024-46804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46804"
},
{
"name": "CVE-2024-46805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46805"
},
{
"name": "CVE-2024-46807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46807"
},
{
"name": "CVE-2024-46810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46810"
},
{
"name": "CVE-2024-46814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2024-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46819"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-46832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46832"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-42272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42272"
},
{
"name": "CVE-2024-42297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42297"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2024-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
},
{
"name": "CVE-2024-42265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42265"
},
{
"name": "CVE-2024-42304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42304"
},
{
"name": "CVE-2024-42305",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42305"
},
{
"name": "CVE-2024-42306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42306"
},
{
"name": "CVE-2024-43828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43828"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-44948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44948"
},
{
"name": "CVE-2024-44952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44952"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-44971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44971"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2023-52918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52918"
},
{
"name": "CVE-2024-41018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41018"
},
{
"name": "CVE-2024-41019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41019"
},
{
"name": "CVE-2024-41021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41021"
},
{
"name": "CVE-2024-41029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41029"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2024-41033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41033"
},
{
"name": "CVE-2024-41052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41052"
},
{
"name": "CVE-2024-41053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41053"
},
{
"name": "CVE-2024-41054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41054"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-41083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41083"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-41086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41086"
},
{
"name": "CVE-2024-42063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42063"
},
{
"name": "CVE-2024-42065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42065"
},
{
"name": "CVE-2024-42066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42066"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2024-42088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42088"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-42100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42100"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2024-42108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42108"
},
{
"name": "CVE-2024-42111",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42111"
},
{
"name": "CVE-2024-42112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42112"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2024-42135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42135"
},
{
"name": "CVE-2024-42146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42146"
},
{
"name": "CVE-2024-42149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42149"
},
{
"name": "CVE-2024-42150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42150"
},
{
"name": "CVE-2024-42151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42151"
},
{
"name": "CVE-2024-42231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42231"
},
{
"name": "CVE-2024-42234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42234"
},
{
"name": "CVE-2024-42235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42235"
},
{
"name": "CVE-2024-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42248"
},
{
"name": "CVE-2024-42251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
},
{
"name": "CVE-2020-8608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8608"
},
{
"name": "CVE-2021-3592",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3592"
},
{
"name": "CVE-2021-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3594"
},
{
"name": "CVE-2023-3019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3019"
},
{
"name": "CVE-2024-42267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42267"
},
{
"name": "CVE-2024-42296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42296"
},
{
"name": "CVE-2024-42299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42299"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-44934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44934"
},
{
"name": "CVE-2024-44958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44958"
},
{
"name": "CVE-2024-44966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44966"
},
{
"name": "CVE-2024-4693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4693"
},
{
"name": "CVE-2024-47660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47660"
},
{
"name": "CVE-2024-47665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47665"
},
{
"name": "CVE-2024-7730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7730"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0997",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-5",
"url": "https://ubuntu.com/security/notices/USN-7089-5"
},
{
"published_at": "2024-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7100-1",
"url": "https://ubuntu.com/security/notices/USN-7100-1"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7110-1",
"url": "https://ubuntu.com/security/notices/USN-7110-1"
},
{
"published_at": "2024-11-15",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-6",
"url": "https://ubuntu.com/security/notices/USN-7089-6"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7100-2",
"url": "https://ubuntu.com/security/notices/USN-7100-2"
},
{
"published_at": "2024-11-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-4",
"url": "https://ubuntu.com/security/notices/USN-7089-4"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7088-5",
"url": "https://ubuntu.com/security/notices/USN-7088-5"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7071-2",
"url": "https://ubuntu.com/security/notices/USN-7071-2"
},
{
"published_at": "2024-11-08",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7094-1",
"url": "https://ubuntu.com/security/notices/USN-7094-1"
}
]
}
CERTFR-2024-AVI-0957
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-52531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52531"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2024-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
},
{
"name": "CVE-2024-27051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27051"
},
{
"name": "CVE-2024-26885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26885"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-26891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26891"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2021-47212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47212"
},
{
"name": "CVE-2024-27398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27398"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-26921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26921"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2024-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38630"
},
{
"name": "CVE-2024-26677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26677"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2024-39496",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39496"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-36484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36484"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2024-42102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42102"
},
{
"name": "CVE-2024-42104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42104"
},
{
"name": "CVE-2024-42106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42106"
},
{
"name": "CVE-2024-42115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42115"
},
{
"name": "CVE-2024-42121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42121"
},
{
"name": "CVE-2024-42127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42127"
},
{
"name": "CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"name": "CVE-2024-42137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42137"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-42157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42157"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2024-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41073"
},
{
"name": "CVE-2024-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41096"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-41027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41027"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-42068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42068"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2024-42080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42080"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-42089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42089"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2024-42097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42097"
},
{
"name": "CVE-2024-42098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42098"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42130"
},
{
"name": "CVE-2024-42140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42140"
},
{
"name": "CVE-2024-42225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42225"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41025"
},
{
"name": "CVE-2024-41028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41028"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2024-41051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41051"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41061"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2024-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41080"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-41098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41098"
},
{
"name": "CVE-2024-42064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42064"
},
{
"name": "CVE-2024-42069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42069"
},
{
"name": "CVE-2024-42073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42073"
},
{
"name": "CVE-2024-42074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42074"
},
{
"name": "CVE-2024-42113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42113"
},
{
"name": "CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2024-42126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42126"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42136"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42142"
},
{
"name": "CVE-2024-42144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42144"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2024-42156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42156"
},
{
"name": "CVE-2024-42158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42158"
},
{
"name": "CVE-2024-42227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42227"
},
{
"name": "CVE-2024-42228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42228"
},
{
"name": "CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"name": "CVE-2024-42250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42250"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-42271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42271"
},
{
"name": "CVE-2024-42276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42276"
},
{
"name": "CVE-2024-42280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42280"
},
{
"name": "CVE-2024-42281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42281"
},
{
"name": "CVE-2024-42283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42283"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-42285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42285"
},
{
"name": "CVE-2024-42286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42286"
},
{
"name": "CVE-2024-42287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42287"
},
{
"name": "CVE-2024-42288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42288"
},
{
"name": "CVE-2024-42289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42289"
},
{
"name": "CVE-2024-42290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42290"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-42295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42295"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-42309",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42309"
},
{
"name": "CVE-2024-42310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42310"
},
{
"name": "CVE-2024-42311",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42311"
},
{
"name": "CVE-2024-42313",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42313"
},
{
"name": "CVE-2024-43829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43829"
},
{
"name": "CVE-2024-43830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43830"
},
{
"name": "CVE-2024-43839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43839"
},
{
"name": "CVE-2024-43841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43841"
},
{
"name": "CVE-2024-43846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43846"
},
{
"name": "CVE-2024-43853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43853"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-43855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43855"
},
{
"name": "CVE-2024-43856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43856"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2024-43860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43860"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-43884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43884"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2024-44947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44947"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-42160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42160"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-43835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43835"
},
{
"name": "CVE-2024-44946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44946"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-45016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45016"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-45026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45026"
},
{
"name": "CVE-2024-45028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45028"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-42297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42297"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2024-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
},
{
"name": "CVE-2024-42265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42265"
},
{
"name": "CVE-2024-42304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42304"
},
{
"name": "CVE-2024-42305",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42305"
},
{
"name": "CVE-2024-42306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42306"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-44948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44948"
},
{
"name": "CVE-2024-44952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44952"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2023-52918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52918"
},
{
"name": "CVE-2024-41018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41018"
},
{
"name": "CVE-2024-41019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41019"
},
{
"name": "CVE-2024-41021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41021"
},
{
"name": "CVE-2024-41029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41029"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2024-41033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41033"
},
{
"name": "CVE-2024-41052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41052"
},
{
"name": "CVE-2024-41053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41053"
},
{
"name": "CVE-2024-41054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41054"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-41083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41083"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-41086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41086"
},
{
"name": "CVE-2024-42063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42063"
},
{
"name": "CVE-2024-42065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42065"
},
{
"name": "CVE-2024-42066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42066"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2024-42088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42088"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-42100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42100"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2024-42108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42108"
},
{
"name": "CVE-2024-42111",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42111"
},
{
"name": "CVE-2024-42112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42112"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2024-42135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42135"
},
{
"name": "CVE-2024-42146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42146"
},
{
"name": "CVE-2024-42149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42149"
},
{
"name": "CVE-2024-42150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42150"
},
{
"name": "CVE-2024-42151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42151"
},
{
"name": "CVE-2024-42231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42231"
},
{
"name": "CVE-2024-42234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42234"
},
{
"name": "CVE-2024-42235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42235"
},
{
"name": "CVE-2024-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42248"
},
{
"name": "CVE-2024-42251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0957",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2024-11-04",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-2",
"url": "https://ubuntu.com/security/notices/USN-7089-2"
},
{
"published_at": "2024-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7088-1",
"url": "https://ubuntu.com/security/notices/USN-7088-1"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7095-1",
"url": "https://ubuntu.com/security/notices/USN-7095-1"
},
{
"published_at": "2024-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7076-2",
"url": "https://ubuntu.com/security/notices/USN-7076-2"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7088-4",
"url": "https://ubuntu.com/security/notices/USN-7088-4"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0107-1",
"url": "https://ubuntu.com/security/notices/LSN-0107-1"
},
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7090-1",
"url": "https://ubuntu.com/security/notices/USN-7090-1"
},
{
"published_at": "2024-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7021-5",
"url": "https://ubuntu.com/security/notices/USN-7021-5"
},
{
"published_at": "2024-11-04",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7088-2",
"url": "https://ubuntu.com/security/notices/USN-7088-2"
},
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-1",
"url": "https://ubuntu.com/security/notices/USN-7089-1"
},
{
"published_at": "2024-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7088-3",
"url": "https://ubuntu.com/security/notices/USN-7088-3"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-3",
"url": "https://ubuntu.com/security/notices/USN-7089-3"
}
]
}
CERTFR-2025-AVI-0002
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 6.1.119-1~deb11u1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2023-31083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31083"
},
{
"name": "CVE-2024-27072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27072"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-35966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35966"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2024-26952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26952"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2024-36923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36923"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-37078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37078"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38553"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2024-39469",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39469"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2023-52760",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52760"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-36973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36973"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39371"
},
{
"name": "CVE-2024-39474",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39474"
},
{
"name": "CVE-2024-39484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39484"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2024-39495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
},
{
"name": "CVE-2024-39496",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39496"
},
{
"name": "CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2024-39505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39505"
},
{
"name": "CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"name": "CVE-2024-39507",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39507"
},
{
"name": "CVE-2024-39509",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39509"
},
{
"name": "CVE-2024-39510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39510"
},
{
"name": "CVE-2024-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40899"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"name": "CVE-2024-40905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40905"
},
{
"name": "CVE-2024-40906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40906"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40910"
},
{
"name": "CVE-2024-40911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40911"
},
{
"name": "CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40914"
},
{
"name": "CVE-2024-40915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40915"
},
{
"name": "CVE-2024-40916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40916"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40920"
},
{
"name": "CVE-2024-40921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40921"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"name": "CVE-2024-40932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40932"
},
{
"name": "CVE-2024-40934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40934"
},
{
"name": "CVE-2024-40935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40935"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40938"
},
{
"name": "CVE-2024-40939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40939"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"name": "CVE-2024-40942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40942"
},
{
"name": "CVE-2024-40943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40943"
},
{
"name": "CVE-2024-40947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40947"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40953"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40957"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"name": "CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
},
{
"name": "CVE-2024-40963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40963"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-40967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40967"
},
{
"name": "CVE-2024-40968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40968"
},
{
"name": "CVE-2024-40970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40970"
},
{
"name": "CVE-2024-40971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40971"
},
{
"name": "CVE-2024-40974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
},
{
"name": "CVE-2024-40976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40976"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"name": "CVE-2024-40980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40980"
},
{
"name": "CVE-2024-40981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40981"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2024-40987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40987"
},
{
"name": "CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40990"
},
{
"name": "CVE-2024-40993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40993"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"name": "CVE-2024-40996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40996"
},
{
"name": "CVE-2024-41000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41000"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-41002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41002"
},
{
"name": "CVE-2024-41004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41004"
},
{
"name": "CVE-2024-41005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
},
{
"name": "CVE-2024-41006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41006"
},
{
"name": "CVE-2023-52812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52812"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-39497",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39497"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41016"
},
{
"name": "CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42224"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2024-42102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42102"
},
{
"name": "CVE-2024-42104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42104"
},
{
"name": "CVE-2024-42106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42106"
},
{
"name": "CVE-2024-42115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42115"
},
{
"name": "CVE-2024-42121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42121"
},
{
"name": "CVE-2024-42127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42127"
},
{
"name": "CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"name": "CVE-2024-42137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42137"
},
{
"name": "CVE-2024-42148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42148"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-42154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
},
{
"name": "CVE-2024-42157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42157"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2024-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41073"
},
{
"name": "CVE-2024-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41096"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-41027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41027"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-42068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42068"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2024-42080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42080"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-42089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42089"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2024-42097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42097"
},
{
"name": "CVE-2024-42098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42098"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42130"
},
{
"name": "CVE-2024-42140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42140"
},
{
"name": "CVE-2024-42225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42225"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2024-42270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42270"
},
{
"name": "CVE-2023-52889",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52889"
},
{
"name": "CVE-2024-41028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41028"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2024-41051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41051"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2024-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41080"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2024-41098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41098"
},
{
"name": "CVE-2024-42073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42073"
},
{
"name": "CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"name": "CVE-2024-42126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42126"
},
{
"name": "CVE-2024-42136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42136"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42142"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2024-42159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42159"
},
{
"name": "CVE-2024-42228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42228"
},
{
"name": "CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"name": "CVE-2024-42250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42250"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42269"
},
{
"name": "CVE-2024-42271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42271"
},
{
"name": "CVE-2024-42274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42274"
},
{
"name": "CVE-2024-42276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42276"
},
{
"name": "CVE-2024-42277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42277"
},
{
"name": "CVE-2024-42280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42280"
},
{
"name": "CVE-2024-42281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42281"
},
{
"name": "CVE-2024-42283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42283"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-42285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42285"
},
{
"name": "CVE-2024-42286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42286"
},
{
"name": "CVE-2024-42287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42287"
},
{
"name": "CVE-2024-42288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42288"
},
{
"name": "CVE-2024-42289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42289"
},
{
"name": "CVE-2024-42290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42290"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-42295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42295"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-42302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42302"
},
{
"name": "CVE-2024-42309",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42309"
},
{
"name": "CVE-2024-42310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42310"
},
{
"name": "CVE-2024-42311",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42311"
},
{
"name": "CVE-2024-42312",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42312"
},
{
"name": "CVE-2024-42313",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42313"
},
{
"name": "CVE-2024-42314",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42314"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-42318",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42318"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43818"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2024-43829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43829"
},
{
"name": "CVE-2024-43830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43830"
},
{
"name": "CVE-2024-43833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43833"
},
{
"name": "CVE-2024-43834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43834"
},
{
"name": "CVE-2024-43837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43837"
},
{
"name": "CVE-2024-43839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43839"
},
{
"name": "CVE-2024-43841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43841"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43846"
},
{
"name": "CVE-2024-43849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43849"
},
{
"name": "CVE-2024-43851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43851"
},
{
"name": "CVE-2024-43853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43853"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-43855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43855"
},
{
"name": "CVE-2024-43856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43856"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2024-43860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43860"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-43863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43863"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43875"
},
{
"name": "CVE-2024-43876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43876"
},
{
"name": "CVE-2024-43877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43877"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-43884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43884"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2024-43895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43895"
},
{
"name": "CVE-2024-43897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43897"
},
{
"name": "CVE-2024-43900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43900"
},
{
"name": "CVE-2024-43902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43902"
},
{
"name": "CVE-2024-43904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43904"
},
{
"name": "CVE-2024-43905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43905"
},
{
"name": "CVE-2024-43907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43907"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2024-43909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43909"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-44931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44931"
},
{
"name": "CVE-2024-44938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44938"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-44947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44947"
},
{
"name": "CVE-2024-42160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42160"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-43835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43835"
},
{
"name": "CVE-2024-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43859"
},
{
"name": "CVE-2024-44940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44940"
},
{
"name": "CVE-2024-44946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44946"
},
{
"name": "CVE-2024-44974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44974"
},
{
"name": "CVE-2024-44977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44977"
},
{
"name": "CVE-2024-44982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44982"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44985"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-44991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44991"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45002"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-45007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45007"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-45009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45009"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45011"
},
{
"name": "CVE-2024-45016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45016"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-45026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45026"
},
{
"name": "CVE-2024-45028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45028"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-46674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46674"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-46686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46686"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-46694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46694"
},
{
"name": "CVE-2024-46702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46702"
},
{
"name": "CVE-2024-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46707"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-46724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46724"
},
{
"name": "CVE-2024-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46725"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2024-46731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46731"
},
{
"name": "CVE-2024-46732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46732"
},
{
"name": "CVE-2024-46734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46734"
},
{
"name": "CVE-2024-46735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46735"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46746"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-46752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46752"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2024-46763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-46773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46773"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46791"
},
{
"name": "CVE-2024-46794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46794"
},
{
"name": "CVE-2024-46795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46795"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2024-46804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46804"
},
{
"name": "CVE-2024-46805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46805"
},
{
"name": "CVE-2024-46807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46807"
},
{
"name": "CVE-2024-46810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46810"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2024-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46819"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-46826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46826"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2024-46832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46832"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-46846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46846"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2024-46849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46849"
},
{
"name": "CVE-2024-46852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46852"
},
{
"name": "CVE-2024-46853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46853"
},
{
"name": "CVE-2024-46854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46854"
},
{
"name": "CVE-2024-46855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46855"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-46858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46858"
},
{
"name": "CVE-2024-46859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46859"
},
{
"name": "CVE-2024-46865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46865"
},
{
"name": "CVE-2024-42272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42272"
},
{
"name": "CVE-2024-42297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42297"
},
{
"name": "CVE-2024-44968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44968"
},
{
"name": "CVE-2024-42265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42265"
},
{
"name": "CVE-2024-42304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42304"
},
{
"name": "CVE-2024-42305",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42305"
},
{
"name": "CVE-2024-42306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42306"
},
{
"name": "CVE-2024-43828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43828"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-44948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44948"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2024-44971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44971"
},
{
"name": "CVE-2024-46695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46695"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2023-52918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52918"
},
{
"name": "CVE-2024-41019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41019"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2024-42063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42063"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2024-46871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46871"
},
{
"name": "CVE-2024-42267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42267"
},
{
"name": "CVE-2024-42296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42296"
},
{
"name": "CVE-2024-42299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42299"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-44934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44934"
},
{
"name": "CVE-2024-44958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44958"
},
{
"name": "CVE-2024-44966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44966"
},
{
"name": "CVE-2024-47660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47660"
},
{
"name": "CVE-2024-47665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47665"
},
{
"name": "CVE-2024-47670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47670"
},
{
"name": "CVE-2024-47671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47671"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47673"
},
{
"name": "CVE-2024-47674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47674"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47684"
},
{
"name": "CVE-2024-47685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47685"
},
{
"name": "CVE-2024-47686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47686"
},
{
"name": "CVE-2024-47692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47692"
},
{
"name": "CVE-2024-47693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47693"
},
{
"name": "CVE-2024-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47695"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47697"
},
{
"name": "CVE-2024-47698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47698"
},
{
"name": "CVE-2024-47699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47699"
},
{
"name": "CVE-2024-47705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47705"
},
{
"name": "CVE-2024-47706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47706"
},
{
"name": "CVE-2024-47707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47707"
},
{
"name": "CVE-2024-47709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47709"
},
{
"name": "CVE-2024-47710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47710"
},
{
"name": "CVE-2024-47712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47712"
},
{
"name": "CVE-2024-47713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47713"
},
{
"name": "CVE-2024-47718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47718"
},
{
"name": "CVE-2024-47720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47720"
},
{
"name": "CVE-2024-47723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47723"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2024-47730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47730"
},
{
"name": "CVE-2024-47731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47731"
},
{
"name": "CVE-2024-47735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47735"
},
{
"name": "CVE-2024-47737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47737"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2024-47739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47739"
},
{
"name": "CVE-2024-47742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47742"
},
{
"name": "CVE-2024-47743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47743"
},
{
"name": "CVE-2024-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47747"
},
{
"name": "CVE-2024-47748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47748"
},
{
"name": "CVE-2024-47749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47749"
},
{
"name": "CVE-2024-47750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47750"
},
{
"name": "CVE-2024-47751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47751"
},
{
"name": "CVE-2024-47756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47756"
},
{
"name": "CVE-2024-47757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47757"
},
{
"name": "CVE-2024-49850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49850"
},
{
"name": "CVE-2024-49851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49851"
},
{
"name": "CVE-2024-49852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49852"
},
{
"name": "CVE-2024-49853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49853"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49858"
},
{
"name": "CVE-2024-49860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49860"
},
{
"name": "CVE-2024-49863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49863"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49867"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49871"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2024-49877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49877"
},
{
"name": "CVE-2024-49878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49878"
},
{
"name": "CVE-2024-49879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49879"
},
{
"name": "CVE-2024-49881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49881"
},
{
"name": "CVE-2024-49882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49882"
},
{
"name": "CVE-2024-49883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49883"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49890"
},
{
"name": "CVE-2024-49892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49892"
},
{
"name": "CVE-2024-49894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49894"
},
{
"name": "CVE-2024-49895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49895"
},
{
"name": "CVE-2024-49896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49896"
},
{
"name": "CVE-2024-49900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49900"
},
{
"name": "CVE-2024-49902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49902"
},
{
"name": "CVE-2024-49903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49903"
},
{
"name": "CVE-2024-49907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49907"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-49913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49913"
},
{
"name": "CVE-2024-49930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49930"
},
{
"name": "CVE-2024-49933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49933"
},
{
"name": "CVE-2024-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49935"
},
{
"name": "CVE-2024-49936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49936"
},
{
"name": "CVE-2024-49937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49937"
},
{
"name": "CVE-2024-49938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49938"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2024-49950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49950"
},
{
"name": "CVE-2024-49954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49954"
},
{
"name": "CVE-2024-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49955"
},
{
"name": "CVE-2024-49957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49957"
},
{
"name": "CVE-2024-49958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49958"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49961"
},
{
"name": "CVE-2024-49962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49962"
},
{
"name": "CVE-2024-49963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49963"
},
{
"name": "CVE-2024-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49965"
},
{
"name": "CVE-2024-49966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49966"
},
{
"name": "CVE-2024-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49967"
},
{
"name": "CVE-2024-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49969"
},
{
"name": "CVE-2024-49973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49973"
},
{
"name": "CVE-2024-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49974"
},
{
"name": "CVE-2024-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49975"
},
{
"name": "CVE-2024-49981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49981"
},
{
"name": "CVE-2024-49982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49982"
},
{
"name": "CVE-2024-49985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49985"
},
{
"name": "CVE-2024-49986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49986"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2024-49995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49995"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50001"
},
{
"name": "CVE-2024-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50002"
},
{
"name": "CVE-2024-50006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50006"
},
{
"name": "CVE-2024-50007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50007"
},
{
"name": "CVE-2024-50008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50008"
},
{
"name": "CVE-2024-50013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50013"
},
{
"name": "CVE-2024-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50015"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50024"
},
{
"name": "CVE-2024-50031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50031"
},
{
"name": "CVE-2024-50033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50033"
},
{
"name": "CVE-2024-50035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50035"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50044"
},
{
"name": "CVE-2024-50045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50045"
},
{
"name": "CVE-2024-50046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50046"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2024-50049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50049"
},
{
"name": "CVE-2024-50058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50058"
},
{
"name": "CVE-2024-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50059"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50062"
},
{
"name": "CVE-2024-50069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50069"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-43868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43868"
},
{
"name": "CVE-2024-44949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44949"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2024-50036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50036"
},
{
"name": "CVE-2024-50067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50067"
},
{
"name": "CVE-2024-50072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50072"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50218"
},
{
"name": "CVE-2024-50229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50229"
},
{
"name": "CVE-2024-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50230"
},
{
"name": "CVE-2024-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50232"
},
{
"name": "CVE-2024-50233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50233"
},
{
"name": "CVE-2024-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50234"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50236"
},
{
"name": "CVE-2024-50237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50237"
},
{
"name": "CVE-2024-50242",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50242"
},
{
"name": "CVE-2024-50243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50243"
},
{
"name": "CVE-2024-50244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50244"
},
{
"name": "CVE-2024-50245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50245"
},
{
"name": "CVE-2024-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50247"
},
{
"name": "CVE-2024-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50249"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50251"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50256"
},
{
"name": "CVE-2024-50257",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50257"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50262"
},
{
"name": "CVE-2024-50264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50264"
},
{
"name": "CVE-2024-50265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50265"
},
{
"name": "CVE-2024-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50267"
},
{
"name": "CVE-2024-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50268"
},
{
"name": "CVE-2024-50269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50269"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50273"
},
{
"name": "CVE-2024-50276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50276"
},
{
"name": "CVE-2024-50278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50278"
},
{
"name": "CVE-2024-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50282"
},
{
"name": "CVE-2024-50283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50283"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2024-50287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50287"
},
{
"name": "CVE-2024-50290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
},
{
"name": "CVE-2024-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50292"
},
{
"name": "CVE-2024-50295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50295"
},
{
"name": "CVE-2024-50296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50296"
},
{
"name": "CVE-2024-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
},
{
"name": "CVE-2024-50301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50301"
},
{
"name": "CVE-2024-50302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53043"
},
{
"name": "CVE-2024-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53052"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53057"
},
{
"name": "CVE-2024-53058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53058"
},
{
"name": "CVE-2024-53059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53059"
},
{
"name": "CVE-2024-53060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53060"
},
{
"name": "CVE-2024-53061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53061"
},
{
"name": "CVE-2024-53063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
},
{
"name": "CVE-2024-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53066"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53081"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-53088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53088"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2024-50208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50208"
},
{
"name": "CVE-2024-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50082"
},
{
"name": "CVE-2024-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50099"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-50142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50142"
},
{
"name": "CVE-2024-50192",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50192"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2024-42307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42307"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2024-47679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47679"
},
{
"name": "CVE-2024-47690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47690"
},
{
"name": "CVE-2024-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47701"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-47740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47740"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49868"
},
{
"name": "CVE-2024-49884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49884"
},
{
"name": "CVE-2024-49889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49889"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2024-49924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
},
{
"name": "CVE-2024-49927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49927"
},
{
"name": "CVE-2024-49944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49944"
},
{
"name": "CVE-2024-49948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49948"
},
{
"name": "CVE-2024-49952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49952"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-49983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49983"
},
{
"name": "CVE-2024-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49997"
},
{
"name": "CVE-2024-50003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50003"
},
{
"name": "CVE-2024-50038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
},
{
"name": "CVE-2024-50039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50039"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50095"
},
{
"name": "CVE-2024-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50096"
},
{
"name": "CVE-2024-50179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50179"
},
{
"name": "CVE-2024-50180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50180"
},
{
"name": "CVE-2024-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50181"
},
{
"name": "CVE-2024-50184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50184"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50188",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50188"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2024-50191",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50191"
},
{
"name": "CVE-2024-50026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50026"
},
{
"name": "CVE-2024-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50087"
},
{
"name": "CVE-2024-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50088"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50103"
},
{
"name": "CVE-2024-50108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50108"
},
{
"name": "CVE-2024-50115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50115"
},
{
"name": "CVE-2024-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50116"
},
{
"name": "CVE-2024-50117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50117"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50127"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50131"
},
{
"name": "CVE-2024-50134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50134"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50148"
},
{
"name": "CVE-2024-50150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50150"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50154"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50156"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50167"
},
{
"name": "CVE-2024-50171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50171"
},
{
"name": "CVE-2024-50176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50176"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2024-50194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50194"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2024-50196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50196"
},
{
"name": "CVE-2024-50198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50198"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50201"
},
{
"name": "CVE-2024-50205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50205"
},
{
"name": "CVE-2024-50209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50209"
},
{
"name": "CVE-2024-50210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50210"
},
{
"name": "CVE-2024-53096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53096"
},
{
"name": "CVE-2024-53100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53100"
},
{
"name": "CVE-2024-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53101"
},
{
"name": "CVE-2024-53104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
},
{
"name": "CVE-2024-53106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53106"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-53112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53112"
},
{
"name": "CVE-2024-53121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53121"
},
{
"name": "CVE-2024-53138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53138"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2024-49854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49854"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2024-50010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50010"
},
{
"name": "CVE-2024-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
},
{
"name": "CVE-2024-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50085"
},
{
"name": "CVE-2024-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50086"
},
{
"name": "CVE-2024-50133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50133"
},
{
"name": "CVE-2024-50143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
},
{
"name": "CVE-2024-50151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50151"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-50168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50168"
},
{
"name": "CVE-2024-50185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50185"
},
{
"name": "CVE-2024-50193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50193"
},
{
"name": "CVE-2024-50199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50199"
},
{
"name": "CVE-2024-50202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50202"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53103"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53119"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53122"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53127"
},
{
"name": "CVE-2024-53129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53129"
},
{
"name": "CVE-2024-53130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53130"
},
{
"name": "CVE-2024-53131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53131"
},
{
"name": "CVE-2024-53135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53135"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0002",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-03T00:00:00.000000"
},
{
"description": "Changement r\u00e9f\u00e9rence ",
"revision_date": "2025-01-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2025-01-05",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4008-1",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
}
]
}
CERTFR-2024-AVI-1013
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-52531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52531"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2023-52639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52639"
},
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26787"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2023-52578",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
},
{
"name": "CVE-2024-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
},
{
"name": "CVE-2024-27051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27051"
},
{
"name": "CVE-2024-26885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26885"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-26891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26891"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2021-47212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47212"
},
{
"name": "CVE-2024-26893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26893"
},
{
"name": "CVE-2021-47188",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47188"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2024-35877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35877"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38637"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2022-48733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48733"
},
{
"name": "CVE-2024-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38630"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2024-26677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26677"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2024-40915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40915"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2024-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38577"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2022-48791",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48791"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2022-48666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48666"
},
{
"name": "CVE-2024-36484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36484"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2024-42102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42102"
},
{
"name": "CVE-2024-42104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42104"
},
{
"name": "CVE-2024-42106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42106"
},
{
"name": "CVE-2024-42115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42115"
},
{
"name": "CVE-2024-42121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42121"
},
{
"name": "CVE-2024-42127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42127"
},
{
"name": "CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"name": "CVE-2024-42137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42137"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-42157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42157"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2024-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41073"
},
{
"name": "CVE-2024-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41096"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-41027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41027"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-42068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42068"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2024-42080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42080"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-42089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42089"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2024-42097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42097"
},
{
"name": "CVE-2024-42098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42098"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42130"
},
{
"name": "CVE-2024-42140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42140"
},
{
"name": "CVE-2024-42225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42225"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48943"
},
{
"name": "CVE-2023-52889",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52889"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41025"
},
{
"name": "CVE-2024-41028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41028"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2024-41051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41051"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41061"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2024-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41080"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-41098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41098"
},
{
"name": "CVE-2024-42064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42064"
},
{
"name": "CVE-2024-42069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42069"
},
{
"name": "CVE-2024-42073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42073"
},
{
"name": "CVE-2024-42074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42074"
},
{
"name": "CVE-2024-42113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42113"
},
{
"name": "CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2024-42126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42126"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42136"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42142"
},
{
"name": "CVE-2024-42144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42144"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2024-42156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42156"
},
{
"name": "CVE-2024-42158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42158"
},
{
"name": "CVE-2024-42227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42227"
},
{
"name": "CVE-2024-42228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42228"
},
{
"name": "CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"name": "CVE-2024-42250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42250"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-42269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42269"
},
{
"name": "CVE-2024-42271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42271"
},
{
"name": "CVE-2024-42274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42274"
},
{
"name": "CVE-2024-42276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42276"
},
{
"name": "CVE-2024-42277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42277"
},
{
"name": "CVE-2024-42280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42280"
},
{
"name": "CVE-2024-42281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42281"
},
{
"name": "CVE-2024-42283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42283"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-42285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42285"
},
{
"name": "CVE-2024-42286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42286"
},
{
"name": "CVE-2024-42287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42287"
},
{
"name": "CVE-2024-42288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42288"
},
{
"name": "CVE-2024-42289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42289"
},
{
"name": "CVE-2024-42290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42290"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-42295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42295"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-42302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42302"
},
{
"name": "CVE-2024-42309",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42309"
},
{
"name": "CVE-2024-42310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42310"
},
{
"name": "CVE-2024-42311",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42311"
},
{
"name": "CVE-2024-42312",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42312"
},
{
"name": "CVE-2024-42313",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42313"
},
{
"name": "CVE-2024-42318",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42318"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43829"
},
{
"name": "CVE-2024-43830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43830"
},
{
"name": "CVE-2024-43834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43834"
},
{
"name": "CVE-2024-43839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43839"
},
{
"name": "CVE-2024-43841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43841"
},
{
"name": "CVE-2024-43846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43846"
},
{
"name": "CVE-2024-43849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43849"
},
{
"name": "CVE-2024-43853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43853"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-43855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43855"
},
{
"name": "CVE-2024-43856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43856"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2024-43860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43860"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-43863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43863"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43875"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-43884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43884"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2024-43902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43902"
},
{
"name": "CVE-2024-43905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43905"
},
{
"name": "CVE-2024-43907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43907"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2024-43909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43909"
},
{
"name": "CVE-2024-44947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44947"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-42160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42160"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-43835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43835"
},
{
"name": "CVE-2024-44946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44946"
},
{
"name": "CVE-2024-44974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44974"
},
{
"name": "CVE-2024-44982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44982"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44985"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-45007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45007"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-45009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45009"
},
{
"name": "CVE-2024-45011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45011"
},
{
"name": "CVE-2024-45016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45016"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-45026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45026"
},
{
"name": "CVE-2024-45028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45028"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-46702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46702"
},
{
"name": "CVE-2024-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46707"
},
{
"name": "CVE-2024-46713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-46724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46724"
},
{
"name": "CVE-2024-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46725"
},
{
"name": "CVE-2024-46731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46731"
},
{
"name": "CVE-2024-46732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46732"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46746"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-46752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46752"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2024-46763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2024-46791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46791"
},
{
"name": "CVE-2024-46795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46795"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2024-46804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46804"
},
{
"name": "CVE-2024-46805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46805"
},
{
"name": "CVE-2024-46807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46807"
},
{
"name": "CVE-2024-46810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46810"
},
{
"name": "CVE-2024-46814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2024-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46819"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-46832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46832"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-42272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42272"
},
{
"name": "CVE-2024-42297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42297"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2024-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
},
{
"name": "CVE-2024-42265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42265"
},
{
"name": "CVE-2024-42304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42304"
},
{
"name": "CVE-2024-42305",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42305"
},
{
"name": "CVE-2024-42306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42306"
},
{
"name": "CVE-2024-43828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43828"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-44948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44948"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-44971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44971"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2023-52918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52918"
},
{
"name": "CVE-2024-41018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41018"
},
{
"name": "CVE-2024-41019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41019"
},
{
"name": "CVE-2024-41021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41021"
},
{
"name": "CVE-2024-41029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41029"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2024-41033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41033"
},
{
"name": "CVE-2024-41052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41052"
},
{
"name": "CVE-2024-41053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41053"
},
{
"name": "CVE-2024-41054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41054"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-41083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41083"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-41086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41086"
},
{
"name": "CVE-2024-42063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42063"
},
{
"name": "CVE-2024-42065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42065"
},
{
"name": "CVE-2024-42066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42066"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2024-42088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42088"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-42100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42100"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2024-42108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42108"
},
{
"name": "CVE-2024-42111",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42111"
},
{
"name": "CVE-2024-42112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42112"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2024-42135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42135"
},
{
"name": "CVE-2024-42146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42146"
},
{
"name": "CVE-2024-42149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42149"
},
{
"name": "CVE-2024-42150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42150"
},
{
"name": "CVE-2024-42151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42151"
},
{
"name": "CVE-2024-42231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42231"
},
{
"name": "CVE-2024-42234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42234"
},
{
"name": "CVE-2024-42235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42235"
},
{
"name": "CVE-2024-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42248"
},
{
"name": "CVE-2024-42251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
},
{
"name": "CVE-2024-42267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42267"
},
{
"name": "CVE-2024-42296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42296"
},
{
"name": "CVE-2024-42299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42299"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-44934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44934"
},
{
"name": "CVE-2024-44958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44958"
},
{
"name": "CVE-2024-44966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44966"
},
{
"name": "CVE-2024-47660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47660"
},
{
"name": "CVE-2024-47665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47665"
},
{
"name": "CVE-2024-44942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44942"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-1013",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2024-11-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7123-1",
"url": "https://ubuntu.com/security/notices/USN-7123-1"
},
{
"published_at": "2024-11-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7121-2",
"url": "https://ubuntu.com/security/notices/USN-7121-2"
},
{
"published_at": "2024-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7120-3",
"url": "https://ubuntu.com/security/notices/USN-7120-3"
},
{
"published_at": "2024-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7119-1",
"url": "https://ubuntu.com/security/notices/USN-7119-1"
},
{
"published_at": "2024-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-7",
"url": "https://ubuntu.com/security/notices/USN-7089-7"
},
{
"published_at": "2024-11-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7120-2",
"url": "https://ubuntu.com/security/notices/USN-7120-2"
},
{
"published_at": "2024-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7121-1",
"url": "https://ubuntu.com/security/notices/USN-7121-1"
},
{
"published_at": "2024-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7120-1",
"url": "https://ubuntu.com/security/notices/USN-7120-1"
},
{
"published_at": "2024-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7122-1",
"url": "https://ubuntu.com/security/notices/USN-7122-1"
}
]
}
CERTFR-2024-AVI-0957
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-52531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52531"
},
{
"name": "CVE-2024-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26607"
},
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2024-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
},
{
"name": "CVE-2024-27051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27051"
},
{
"name": "CVE-2024-26885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26885"
},
{
"name": "CVE-2023-52614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52614"
},
{
"name": "CVE-2024-26891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26891"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2021-47212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47212"
},
{
"name": "CVE-2024-27398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27398"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-26921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26921"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2024-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38630"
},
{
"name": "CVE-2024-26677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26677"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2024-39496",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39496"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-36484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36484"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2024-42102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42102"
},
{
"name": "CVE-2024-42104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42104"
},
{
"name": "CVE-2024-42106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42106"
},
{
"name": "CVE-2024-42115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42115"
},
{
"name": "CVE-2024-42121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42121"
},
{
"name": "CVE-2024-42127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42127"
},
{
"name": "CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"name": "CVE-2024-42137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42137"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-42157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42157"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2024-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41073"
},
{
"name": "CVE-2024-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41096"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-41027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41027"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-42068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42068"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2024-42080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42080"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-42089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42089"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2024-42097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42097"
},
{
"name": "CVE-2024-42098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42098"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42130"
},
{
"name": "CVE-2024-42140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42140"
},
{
"name": "CVE-2024-42225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42225"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41025"
},
{
"name": "CVE-2024-41028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41028"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2024-41051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41051"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41061"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2024-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41080"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-41098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41098"
},
{
"name": "CVE-2024-42064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42064"
},
{
"name": "CVE-2024-42069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42069"
},
{
"name": "CVE-2024-42073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42073"
},
{
"name": "CVE-2024-42074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42074"
},
{
"name": "CVE-2024-42113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42113"
},
{
"name": "CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2024-42126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42126"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42136"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42142"
},
{
"name": "CVE-2024-42144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42144"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2024-42156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42156"
},
{
"name": "CVE-2024-42158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42158"
},
{
"name": "CVE-2024-42227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42227"
},
{
"name": "CVE-2024-42228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42228"
},
{
"name": "CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"name": "CVE-2024-42250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42250"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-42271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42271"
},
{
"name": "CVE-2024-42276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42276"
},
{
"name": "CVE-2024-42280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42280"
},
{
"name": "CVE-2024-42281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42281"
},
{
"name": "CVE-2024-42283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42283"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-42285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42285"
},
{
"name": "CVE-2024-42286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42286"
},
{
"name": "CVE-2024-42287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42287"
},
{
"name": "CVE-2024-42288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42288"
},
{
"name": "CVE-2024-42289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42289"
},
{
"name": "CVE-2024-42290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42290"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-42295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42295"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-42309",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42309"
},
{
"name": "CVE-2024-42310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42310"
},
{
"name": "CVE-2024-42311",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42311"
},
{
"name": "CVE-2024-42313",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42313"
},
{
"name": "CVE-2024-43829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43829"
},
{
"name": "CVE-2024-43830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43830"
},
{
"name": "CVE-2024-43839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43839"
},
{
"name": "CVE-2024-43841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43841"
},
{
"name": "CVE-2024-43846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43846"
},
{
"name": "CVE-2024-43853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43853"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-43855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43855"
},
{
"name": "CVE-2024-43856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43856"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2024-43860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43860"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-43884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43884"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2024-44947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44947"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-42160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42160"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-43835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43835"
},
{
"name": "CVE-2024-44946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44946"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-45016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45016"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-45026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45026"
},
{
"name": "CVE-2024-45028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45028"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-42297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42297"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2024-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
},
{
"name": "CVE-2024-42265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42265"
},
{
"name": "CVE-2024-42304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42304"
},
{
"name": "CVE-2024-42305",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42305"
},
{
"name": "CVE-2024-42306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42306"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-44948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44948"
},
{
"name": "CVE-2024-44952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44952"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2023-52918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52918"
},
{
"name": "CVE-2024-41018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41018"
},
{
"name": "CVE-2024-41019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41019"
},
{
"name": "CVE-2024-41021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41021"
},
{
"name": "CVE-2024-41029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41029"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2024-41033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41033"
},
{
"name": "CVE-2024-41052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41052"
},
{
"name": "CVE-2024-41053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41053"
},
{
"name": "CVE-2024-41054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41054"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-41083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41083"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-41086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41086"
},
{
"name": "CVE-2024-42063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42063"
},
{
"name": "CVE-2024-42065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42065"
},
{
"name": "CVE-2024-42066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42066"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2024-42088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42088"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-42100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42100"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2024-42108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42108"
},
{
"name": "CVE-2024-42111",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42111"
},
{
"name": "CVE-2024-42112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42112"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2024-42135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42135"
},
{
"name": "CVE-2024-42146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42146"
},
{
"name": "CVE-2024-42149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42149"
},
{
"name": "CVE-2024-42150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42150"
},
{
"name": "CVE-2024-42151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42151"
},
{
"name": "CVE-2024-42231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42231"
},
{
"name": "CVE-2024-42234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42234"
},
{
"name": "CVE-2024-42235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42235"
},
{
"name": "CVE-2024-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42248"
},
{
"name": "CVE-2024-42251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0957",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2024-11-04",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-2",
"url": "https://ubuntu.com/security/notices/USN-7089-2"
},
{
"published_at": "2024-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7088-1",
"url": "https://ubuntu.com/security/notices/USN-7088-1"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7095-1",
"url": "https://ubuntu.com/security/notices/USN-7095-1"
},
{
"published_at": "2024-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7076-2",
"url": "https://ubuntu.com/security/notices/USN-7076-2"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7088-4",
"url": "https://ubuntu.com/security/notices/USN-7088-4"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0107-1",
"url": "https://ubuntu.com/security/notices/LSN-0107-1"
},
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7090-1",
"url": "https://ubuntu.com/security/notices/USN-7090-1"
},
{
"published_at": "2024-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7021-5",
"url": "https://ubuntu.com/security/notices/USN-7021-5"
},
{
"published_at": "2024-11-04",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7088-2",
"url": "https://ubuntu.com/security/notices/USN-7088-2"
},
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-1",
"url": "https://ubuntu.com/security/notices/USN-7089-1"
},
{
"published_at": "2024-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7088-3",
"url": "https://ubuntu.com/security/notices/USN-7088-3"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7089-3",
"url": "https://ubuntu.com/security/notices/USN-7089-3"
}
]
}
FKIE_CVE-2024-42063
Vulnerability from fkie_nvd - Published: 2024-07-29 16:15 - Updated: 2025-11-03 22:17| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11DA4D7A-BB0A-4555-8D1D-ECCC5108F772",
"versionEndExcluding": "6.1.97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F",
"versionEndExcluding": "6.6.37",
"versionStartIncluding": "6.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C",
"versionEndExcluding": "6.9.8",
"versionStartIncluding": "6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode\n\nsyzbot reported uninit memory usages during map_{lookup,delete}_elem.\n\n==========\nBUG: KMSAN: uninit-value in __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\nBUG: KMSAN: uninit-value in dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\n__dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\ndev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\n____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [inline]\nbpf_map_lookup_elem+0x5c/0x80 kernel/bpf/helpers.c:38\n___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997\n__bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237\n==========\n\nThe reproducer should be in the interpreter mode.\n\nThe C reproducer is trying to run the following bpf prog:\n\n 0: (18) r0 = 0x0\n 2: (18) r1 = map[id:49]\n 4: (b7) r8 = 16777216\n 5: (7b) *(u64 *)(r10 -8) = r8\n 6: (bf) r2 = r10\n 7: (07) r2 += -229\n ^^^^^^^^^^\n\n 8: (b7) r3 = 8\n 9: (b7) r4 = 0\n 10: (85) call dev_map_lookup_elem#1543472\n 11: (95) exit\n\nIt is due to the \"void *key\" (r2) passed to the helper. bpf allows uninit\nstack memory access for bpf prog with the right privileges. This patch\nuses kmsan_unpoison_memory() to mark the stack as initialized.\n\nThis should address different syzbot reports on the uninit \"void *key\"\nargument during map_{lookup,delete}_elem."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: marcar la pila de programas bpf con kmsan_unposion_memory en modo int\u00e9rprete syzbot inform\u00f3 usos de memoria uninit durante map_{lookup,delete}_elem. ========== ERROR: KMSAN: valor uninit en __dev_map_lookup_elem kernel/bpf/devmap.c:441 [en l\u00ednea] ERROR: KMSAN: valor uninit en dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap. c:796 __dev_map_lookup_elem kernel/bpf/devmap.c:441 [en l\u00ednea] dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796 ____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [en l\u00ednea] bpf_map_lookup_elem+0x5c/0x80 kernel / bpf/helpers.c:38 ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997 __bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237 ========== El reproductor debe estar en el modo int\u00e9rprete. El reproductor de C est\u00e1 intentando ejecutar el siguiente programa bpf: 0: (18) r0 = 0x0 2: (18) r1 = map[id:49] 4: (b7) r8 = 16777216 5: (7b) *(u64 * )(r10 -8) = r8 6: (bf) r2 = r10 7: (07) r2 += -229 ^^^^^^^^^^ 8: (b7) r3 = 8 9: (b7) r4 = 0 10: (85) llamar a dev_map_lookup_elem#1543472 11: (95) salir Se debe a la \"clave * vac\u00eda\" (r2) pasada al ayudante. bpf permite el acceso a la memoria de pila uninit para el programa bpf con los privilegios correctos. Este parche usa kmsan_unpoison_memory() para marcar la pila como inicializada. Esto deber\u00eda abordar diferentes informes de syzbot sobre el argumento uninit \"void *key\" durante map_{lookup,delete}_elem."
}
],
"id": "CVE-2024-42063",
"lastModified": "2025-11-03T22:17:34.690",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-07-29T16:15:06.053",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-908"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-8GHR-4WGH-3JQ8
Vulnerability from github – Published: 2024-07-29 18:30 – Updated: 2025-11-04 00:31In the Linux kernel, the following vulnerability has been resolved:
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
syzbot reported uninit memory usages during map_{lookup,delete}_elem.
========== BUG: KMSAN: uninit-value in __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline] BUG: KMSAN: uninit-value in dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796 __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline] dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796 _bpfmap_lookup_elem kernel/bpf/helpers.c:42 [inline] bpf_map_lookup_elem+0x5c/0x80 kernel/bpf/helpers.c:38 _bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997 __bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237 ==========
The reproducer should be in the interpreter mode.
The C reproducer is trying to run the following bpf prog:
0: (18) r0 = 0x0
2: (18) r1 = map[id:49]
4: (b7) r8 = 16777216
5: (7b) *(u64 *)(r10 -8) = r8
6: (bf) r2 = r10
7: (07) r2 += -229
^^^^^^^^^^
8: (b7) r3 = 8
9: (b7) r4 = 0
10: (85) call dev_map_lookup_elem#1543472 11: (95) exit
It is due to the "void *key" (r2) passed to the helper. bpf allows uninit stack memory access for bpf prog with the right privileges. This patch uses kmsan_unpoison_memory() to mark the stack as initialized.
This should address different syzbot reports on the uninit "void *key" argument during map_{lookup,delete}_elem.
{
"affected": [],
"aliases": [
"CVE-2024-42063"
],
"database_specific": {
"cwe_ids": [
"CWE-908"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-29T16:15:06Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode\n\nsyzbot reported uninit memory usages during map_{lookup,delete}_elem.\n\n==========\nBUG: KMSAN: uninit-value in __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\nBUG: KMSAN: uninit-value in dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\n__dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\ndev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\n____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [inline]\nbpf_map_lookup_elem+0x5c/0x80 kernel/bpf/helpers.c:38\n___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997\n__bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237\n==========\n\nThe reproducer should be in the interpreter mode.\n\nThe C reproducer is trying to run the following bpf prog:\n\n 0: (18) r0 = 0x0\n 2: (18) r1 = map[id:49]\n 4: (b7) r8 = 16777216\n 5: (7b) *(u64 *)(r10 -8) = r8\n 6: (bf) r2 = r10\n 7: (07) r2 += -229\n ^^^^^^^^^^\n\n 8: (b7) r3 = 8\n 9: (b7) r4 = 0\n 10: (85) call dev_map_lookup_elem#1543472\n 11: (95) exit\n\nIt is due to the \"void *key\" (r2) passed to the helper. bpf allows uninit\nstack memory access for bpf prog with the right privileges. This patch\nuses kmsan_unpoison_memory() to mark the stack as initialized.\n\nThis should address different syzbot reports on the uninit \"void *key\"\nargument during map_{lookup,delete}_elem.",
"id": "GHSA-8ghr-4wgh-3jq8",
"modified": "2025-11-04T00:31:05Z",
"published": "2024-07-29T18:30:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42063"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.