Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-16544 (GCVE-0-2017-16544)
Vulnerability from cvelistv5 – Published: 2017-11-20 15:00 – Updated: 2025-06-09 15:35- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T20:27:04.005Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/"
},
{
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8"
},
{
"name": "USN-3935-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3935-1/"
},
{
"name": "20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2019/Jun/18"
},
{
"name": "20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2019/Jun/14"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html"
},
{
"name": "20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router \u0026 TC Cloud Client",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2020/Mar/15"
},
{
"name": "20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2020/Aug/20"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01"
},
{
"name": "20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2020/Sep/6"
},
{
"name": "20210113 SEC Consult SA-20210113-0 :: Multiple vulnerabilities in Pepperl+Fuchs IO-Link Master Series",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2021/Jan/39"
},
{
"name": "[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html"
},
{
"name": "20210819 SEC Consult SA-20210819-0 :: Multiple critical vulnerabilities in Altus Nexto and Hadron series",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2021/Aug/21"
},
{
"name": "20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2022/Jun/36"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2017-16544",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T15:34:08.917753Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T15:35:03.132Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-11-20T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-06-20T18:06:31.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/"
},
{
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8"
},
{
"name": "USN-3935-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3935-1/"
},
{
"name": "20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2019/Jun/18"
},
{
"name": "20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2019/Jun/14"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html"
},
{
"name": "20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router \u0026 TC Cloud Client",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2020/Mar/15"
},
{
"name": "20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2020/Aug/20"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01"
},
{
"name": "20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2020/Sep/6"
},
{
"name": "20210113 SEC Consult SA-20210113-0 :: Multiple vulnerabilities in Pepperl+Fuchs IO-Link Master Series",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2021/Jan/39"
},
{
"name": "[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html"
},
{
"name": "20210819 SEC Consult SA-20210819-0 :: Multiple critical vulnerabilities in Altus Nexto and Hadron series",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2021/Aug/21"
},
{
"name": "20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2022/Jun/36"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-16544",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/",
"refsource": "MISC",
"url": "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/"
},
{
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html"
},
{
"name": "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8",
"refsource": "MISC",
"url": "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8"
},
{
"name": "USN-3935-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3935-1/"
},
{
"name": "20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2019/Jun/18"
},
{
"name": "20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Jun/14"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"name": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
},
{
"name": "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html"
},
{
"name": "20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router \u0026 TC Cloud Client",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2020/Mar/15"
},
{
"name": "20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2020/Aug/20"
},
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01"
},
{
"name": "20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2020/Sep/6"
},
{
"name": "20210113 SEC Consult SA-20210113-0 :: Multiple vulnerabilities in Pepperl+Fuchs IO-Link Master Series",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2021/Jan/39"
},
{
"name": "[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html"
},
{
"name": "20210819 SEC Consult SA-20210819-0 :: Multiple critical vulnerabilities in Altus Nexto and Hadron series",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2021/Aug/21"
},
{
"name": "20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2022/Jun/36"
},
{
"name": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-16544",
"datePublished": "2017-11-20T15:00:00.000Z",
"dateReserved": "2017-11-05T00:00:00.000Z",
"dateUpdated": "2025-06-09T15:35:03.132Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2017-16544",
"date": "2026-05-20",
"epss": "0.03313",
"percentile": "0.87406"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.27.2\", \"matchCriteriaId\": \"37287FA9-D061-4C33-AA55-BFF45D880108\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC77ADEA-F0B8-4E5D-B965-39397F823075\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E8861F4-D390-4738-BBF0-9EE4684E9667\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*\", \"matchCriteriaId\": \"52403C80-3022-4E5B-B16A-24B116D1E6B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBECED2E-05FD-492E-8B57-9BB8ADA82444\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*\", \"matchCriteriaId\": \"A63E3C72-3145-4661-BBCD-8A67EC0CDDF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9159F6E1-6A36-4D3C-85B1-2205B90CD244\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2C08C24-FBAC-49B8-AABF-4FF8BADA3412\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B9D5E67-78C9-495E-91F0-AF94871E5FA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADC13026-3B5A-4BF0-BDEC-B77338E427E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CBA70BA-FFCD-4D2D-AD26-95CC62748937\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C92DD8B-8AB8-40D4-8E86-12FEB055D37A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*\", \"matchCriteriaId\": \"C58D77F5-CDB2-47DA-A879-BABEBE2E1E04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0C324FB-3989-4A4A-BF5B-C40CA698DDB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E7AC58E-D1F8-4FDF-9A28-61CF6158330A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*\", \"matchCriteriaId\": \"489EE0F6-5510-470E-8711-DC08B4AFB4F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*\", \"matchCriteriaId\": \"6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDAA48A9-9319-4104-B151-D529E5EBF0F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*\", \"matchCriteriaId\": \"D16CD918-5075-4975-8B1E-21D8AD35A28E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A38CD8E-494D-4E0E-A300-8550FC81FAE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F40ABE8-8DED-4633-A34C-00DF5D510E71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*\", \"matchCriteriaId\": \"1736B975-089B-413C-8CA0-5524B957EF9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E4DCBF6-7189-497A-B923-08574443172C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*\", \"matchCriteriaId\": \"16FBA646-0B5E-44A7-BB12-29D5C611AEC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*\", \"matchCriteriaId\": \"29F57497-7B48-4D0C-B8F5-8D33062BECEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADDE96C7-C489-4D14-990B-8524627A23D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD82C093-FD98-45DE-9EE6-A05E81A1FEC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*\", \"matchCriteriaId\": \"08789F9E-CDC7-4F89-B925-92C9E3AE5234\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*\", \"matchCriteriaId\": \"26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*\", \"matchCriteriaId\": \"621C203B-4B66-49CC-A35D-D7703109BF14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*\", \"matchCriteriaId\": \"3261BDEF-D89C-41D9-A360-EC36EAB17490\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*\", \"matchCriteriaId\": \"5170A4F6-02B7-4225-B944-73DB5A4D332C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*\", \"matchCriteriaId\": \"62A97DBA-A56B-4F0B-B9C4-44B5166681AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*\", \"matchCriteriaId\": \"806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBA6211E-134A-484E-8444-FBB5070B395D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E7B05B3-4076-4A44-B9A6-A44419F175C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A1636B4-6E79-42D7-AA62-5EE43412B43A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F0377D0-BBED-41BF-80C5-58414ED413EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*\", \"matchCriteriaId\": \"6495283C-D18A-4DDA-852E-46F2273D6DAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*\", \"matchCriteriaId\": \"09DEFEE5-5E9E-4F3A-A245-3E8E2B291339\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*\", \"matchCriteriaId\": \"17A84E0A-1429-467F-9EE1-FCA062392DC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*\", \"matchCriteriaId\": \"C591163D-64BC-403B-A460-5B2258EC2F8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED932B89-D34D-4398-8F79-AF98987CAFD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABD365A0-0B09-4EC2-9973-691144C99507\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E198AE4-A6A3-4875-A7DA-44BE9E1B280F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FDD5BA0-8180-484D-8308-B0862B6E9DC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*\", \"matchCriteriaId\": \"96A6EB9A-A908-42D1-A6BC-E38E861BBECE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*\", \"matchCriteriaId\": \"651EDCAA-D785-464D-AE41-425A69F6FFB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B3C704C-9D60-4F72-B482-07F209985E68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1CFE956-4391-4B71-BD0B-96A008A624B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*\", \"matchCriteriaId\": \"409778CD-9AB3-4793-A5F5-8D8657F81442\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DC45A8B-6DE0-465F-9644-B75A09394F25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A265671-BCB0-401A-A1E8-500F9D41492E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*\", \"matchCriteriaId\": \"83168067-1E43-4186-9B15-3FC702C6583C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C122DB4-8410-4C4E-87BE-EB3175CE182B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*\", \"matchCriteriaId\": \"C76ED78D-0778-4269-938E-BB7586C1E44E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A1F78C5-E995-4E37-83C5-5B6A1D39E549\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A2E842D-AF37-4641-AD05-B91F250E7487\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*\", \"matchCriteriaId\": \"A07EAC87-32FD-4553-B71D-181F2C66AE68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*\", \"matchCriteriaId\": \"865D3042-68ED-44B9-A036-9433F7463D6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*\", \"matchCriteriaId\": \"11AE3F61-9655-4B20-96E1-92112BE2BEDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECE35166-3019-450B-9C69-484E4EDE5A6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*\", \"matchCriteriaId\": \"D892B066-381B-4F46-8363-7BA1647BBCD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*\", \"matchCriteriaId\": \"710DB381-5504-4493-8D0A-17AB8E5A903B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*\", \"matchCriteriaId\": \"42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*\", \"matchCriteriaId\": \"33CBCA55-010E-4E84-B2F8-F9B53D5A3340\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*\", \"matchCriteriaId\": \"95A73B4B-F9B3-4D66-9668-902902C73CB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D14D51D-E2EA-4826-8C6E-AF1C15F12384\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*\", \"matchCriteriaId\": \"BED100A1-9D59-48BE-91D4-0C8F2D678E6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*\", \"matchCriteriaId\": \"660B51F2-DFE0-49F6-AD2A-6E94B20F4019\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BF80536-348A-468E-AC1C-DA53632FCC83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFABF302-AC32-4507-BDD9-314854DE55BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EDE020F-4FB1-4F1D-B434-6745045702D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA1538B9-E860-46CE-A4CA-1393ECA20D30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*\", \"matchCriteriaId\": \"386A6805-6167-47BA-A02F-073DC7E0FE36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*\", \"matchCriteriaId\": \"03BA15D8-F7A2-428C-8104-BCEBDE7C1EC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CFCFE7B-37E5-4C64-9B43-4F693F227231\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*\", \"matchCriteriaId\": \"02CFAE22-37DB-4787-96FB-9E0F8EF671E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BC70488-A435-43BE-AEF4-30CBA36CBC03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201811401:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B37DC7D-A1C6-468F-A42E-160CE226FF7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201903001:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B0A3263-193B-4725-BF20-08A2B2F3BB82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201905001:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6C6287E-C24E-4291-8DE7-4413993577F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.0:600-201909001:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA74FDE2-4656-446D-9215-77326C7EC62C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBA15143-734D-4889-8B5A-2445A2DDDD4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*\", \"matchCriteriaId\": \"04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D2ED442-3F6D-472A-AA98-51D05A65B2E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A71EC72-3389-4EC7-8104-2A78F7B8C0DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*\", \"matchCriteriaId\": \"F948E806-0F73-4145-A723-7A43BA45842B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*\", \"matchCriteriaId\": \"75FAFF86-C65F-4723-8A63-BACE2F797937\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBC31DE3-ACFE-422F-B253-2FE4AAFE3954\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*\", \"matchCriteriaId\": \"B30B3EA4-495F-4915-B6E3-5FB9277C2DE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FA9E337-B4F3-4895-BA58-962F8CDEE73E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*\", \"matchCriteriaId\": \"830B0BC1-A368-49AC-B6C9-B000972EF92A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*\", \"matchCriteriaId\": \"614394F3-3BEE-4E12-AABF-436D54A04313\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*\", \"matchCriteriaId\": \"350FD3CE-8B64-4FCF-82DE-BE941156F4F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9EAE177-6C7E-4C1B-ADEE-2C036F731272\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFFEEC31-8462-4DF9-A1DA-D7057C209CBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*\", \"matchCriteriaId\": \"942DAD67-9455-4D02-BD3B-BFD2DE7A7E52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ACC1A72-F6B6-430A-AB89-AB0A11587F58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*\", \"matchCriteriaId\": \"45111C74-BF6F-4C05-A0D3-CE325AD0C02B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1CE5849-01B1-4E36-83E8-496A3F328C9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*\", \"matchCriteriaId\": \"A879BA05-3A80-4EBC-AA9D-9B53695425B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D65A0E8-A1E0-42F3-B77D-2F32979278BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*\", \"matchCriteriaId\": \"80C10150-39BA-4818-B48F-8645D4A0D316\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*\", \"matchCriteriaId\": \"9792B986-86EF-40E0-9427-A45F858717E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*\", \"matchCriteriaId\": \"37EDD688-C91A-4A35-913A-82E156ADD242\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*\", \"matchCriteriaId\": \"47DA50DA-7CA4-4B76-8B3B-A5732509F71D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*\", \"matchCriteriaId\": \"76EB1A04-0645-4909-AEF9-33D6FADA4793\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1A35723-D968-42D6-89EB-86CA550516E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3AC8A19-F98E-48F1-A1EA-EAA1C7208335\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D6A3952-8429-4762-8701-47D7C1F05A5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B007609-C312-469B-BACF-04D6D80DADF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*\", \"matchCriteriaId\": \"514F2ECD-FC55-42A5-BEE4-DA7641CC93A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*\", \"matchCriteriaId\": \"3594E391-19CD-4803-8285-FA11BE63AB05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CEC248D-502E-4A8D-8786-CD72A2E3AB1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F08529C-B14C-45FB-AEA1-77D12C88CB30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*\", \"matchCriteriaId\": \"617835F5-49DA-4B42-8C7B-C122D7363A00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE1372AD-2853-4BED-BB71-6BACB28B95C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0E684DF-9E45-459E-AB75-6B4653E5C7CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3DDD3E9-186F-472C-BA76-C2A363206792\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*\", \"matchCriteriaId\": \"A09E9914-DB27-41EF-B55D-5B79ECD1DA69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2792D06-A73E-4A56-A152-82E1AD4E707D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CE9D758-2170-4ACD-965C-C76BDA693466\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD4A373B-2AC6-4193-9C34-1E4EEB552A9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*\", \"matchCriteriaId\": \"E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B75B45F-E25A-4362-856D-465A9F8B70DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDA4AE4C-3BA8-472D-950A-3C8684565CD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AA3617D-B911-4BC5-B544-B31D4F43D2B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDC6E0F6-83DF-4670-8D04-A41C7DC1B881\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*\", \"matchCriteriaId\": \"047A71B3-CDFB-41F3-B2DE-11360DAE5744\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*\", \"matchCriteriaId\": \"F88691FD-F263-4B75-BF21-481BC1623C3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2A47CDA-D3DD-4E0F-8268-32A188EA1D94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*\", \"matchCriteriaId\": \"36A67476-2E8E-4104-9F10-7AE42F82508F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2283675-582F-44A8-833B-B5B439CBFA1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*\", \"matchCriteriaId\": \"94C4A188-6B00-48C4-B7E2-9F70811BF618\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*\", \"matchCriteriaId\": \"F82943E9-E2D0-49F4-BD32-40E84BA1957E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*\", \"matchCriteriaId\": \"B854BA24-11FD-4D0C-9EFD-A88E64FED4E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*\", \"matchCriteriaId\": \"554434AB-763F-4E95-B616-F7594041D511\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE56E7AC-F63D-4A4B-9B45-0E623973B14B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*\", \"matchCriteriaId\": \"36664142-0111-42F5-A371-AD2C0DF211EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*\", \"matchCriteriaId\": \"49EA78B6-8208-4351-88F9-103CA01EF3A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*\", \"matchCriteriaId\": \"27AC575F-9AC4-4AA1-A71C-BF9F752295F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C0F47F3-0509-45AC-8EA9-37246E4E6095\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE103301-6AEF-4348-8F36-833021739AEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D92B2FF-8962-41F9-B019-D83AAAD188FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E6D5227-3421-412F-9BE0-583AA768446D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*\", \"matchCriteriaId\": \"82BA9EB1-4EFB-4649-92C7-2C307966956E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*\", \"matchCriteriaId\": \"2133378D-8DFD-48B9-83A1-9FA7DDC68902\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*\", \"matchCriteriaId\": \"57BF8703-0C83-4BA5-B0F7-FB6E45229685\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAADDD62-2F6E-4D12-A49F-3D38ACF488E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*\", \"matchCriteriaId\": \"27FA0C0E-B5A2-4619-998B-CFB45496D895\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*\", \"matchCriteriaId\": \"B98EDBA4-0BA4-4894-B6F6-681117A5C5C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E756914-2C2A-4999-AAEA-2F6835A29C49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AC0C89B-26A3-40F7-855F-5F6B36B77F5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BF2FE18-A90E-429A-98D1-9A97DD0464B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*\", \"matchCriteriaId\": \"92289D85-0652-41D1-A6BA-D4B8C7EE1F45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF41887D-B145-4D01-9AEF-2E36479B2FA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FEAF0ED-BD20-4BA6-BB23-1C978B823A11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*\", \"matchCriteriaId\": \"36234CE1-FA7E-4534-9720-410435E2BAEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABE65721-57C0-4748-B159-F6D97CE8CAB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD1889D7-3313-4004-AA42-7879E8551413\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*\", \"matchCriteriaId\": \"494E0B07-CE16-46D4-A89B-4F12A6CECDF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD046237-16D7-4A57-9F09-2A6A649368C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*\", \"matchCriteriaId\": \"8343E8DB-1D54-4B82-9254-2E2AFC548609\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*\", \"matchCriteriaId\": \"F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*\", \"matchCriteriaId\": \"0169E032-F47A-45E0-BC33-B7DF54EC11BF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redlion:n-tron_702-w_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E7E2A2E-13BA-46CF-A98D-CC855C381834\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:redlion:n-tron_702-w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30885167-CD8F-4026-ADCB-2E07E772ECD5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redlion:n-tron_702m12-w_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6633FE15-2CF0-4F83-91AB-6B090684C284\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:redlion:n-tron_702m12-w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94F253CC-A9DC-463A-93F0-71DD4FC190FF\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.\"}, {\"lang\": \"es\", \"value\": \"En la funci\\u00f3n add_match en libbb/lineedit.c en BusyBox hasta la versi\\u00f3n 1.27.2, la caracter\\u00edstica de autocompletar pesta\\u00f1as del shell, empleada para obtener una lista de nombres de archivo en un directorio, no inmuniza los nombres de archivo. Esto conduce a la ejecuci\\u00f3n de cualquier secuencia de escape en el terminal. Esto podr\\u00eda resultar en la ejecuci\\u00f3n de c\\u00f3digo, escrituras arbitrarias de archivos u otros ataques.\"}]",
"id": "CVE-2017-16544",
"lastModified": "2024-11-21T03:16:33.000",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2017-11-20T15:29:00.387",
"references": "[{\"url\": \"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/18\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Sep/7\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Aug/20\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Mar/15\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Sep/6\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Aug/21\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Jan/39\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Jun/36\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2019-0013.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/14\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/7\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://usn.ubuntu.com/3935-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/18\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Sep/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Aug/20\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Mar/15\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Sep/6\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Aug/21\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Jan/39\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Jun/36\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2019-0013.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/14\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://usn.ubuntu.com/3935-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-94\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-16544\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-11-20T15:29:00.387\",\"lastModified\":\"2026-05-13T00:24:29.033\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.\"},{\"lang\":\"es\",\"value\":\"En la funci\u00f3n add_match en libbb/lineedit.c en BusyBox hasta la versi\u00f3n 1.27.2, la caracter\u00edstica de autocompletar pesta\u00f1as del shell, empleada para obtener una lista de nombres de archivo en un directorio, no inmuniza los nombres de archivo. Esto conduce a la ejecuci\u00f3n de cualquier secuencia de escape en el terminal. Esto podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo, escrituras arbitrarias de archivos u otros ataques.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.27.2\",\"matchCriteriaId\":\"37287FA9-D061-4C33-AA55-BFF45D880108\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC77ADEA-F0B8-4E5D-B965-39397F823075\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8861F4-D390-4738-BBF0-9EE4684E9667\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*\",\"matchCriteriaId\":\"52403C80-3022-4E5B-B16A-24B116D1E6B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBECED2E-05FD-492E-8B57-9BB8ADA82444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A63E3C72-3145-4661-BBCD-8A67EC0CDDF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9159F6E1-6A36-4D3C-85B1-2205B90CD244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2C08C24-FBAC-49B8-AABF-4FF8BADA3412\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B9D5E67-78C9-495E-91F0-AF94871E5FA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADC13026-3B5A-4BF0-BDEC-B77338E427E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CBA70BA-FFCD-4D2D-AD26-95CC62748937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C92DD8B-8AB8-40D4-8E86-12FEB055D37A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*\",\"matchCriteriaId\":\"C58D77F5-CDB2-47DA-A879-BABEBE2E1E04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0C324FB-3989-4A4A-BF5B-C40CA698DDB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E7AC58E-D1F8-4FDF-9A28-61CF6158330A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*\",\"matchCriteriaId\":\"489EE0F6-5510-470E-8711-DC08B4AFB4F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*\",\"matchCriteriaId\":\"6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDAA48A9-9319-4104-B151-D529E5EBF0F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*\",\"matchCriteriaId\":\"D16CD918-5075-4975-8B1E-21D8AD35A28E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A38CD8E-494D-4E0E-A300-8550FC81FAE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F40ABE8-8DED-4633-A34C-00DF5D510E71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*\",\"matchCriteriaId\":\"1736B975-089B-413C-8CA0-5524B957EF9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E4DCBF6-7189-497A-B923-08574443172C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*\",\"matchCriteriaId\":\"16FBA646-0B5E-44A7-BB12-29D5C611AEC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*\",\"matchCriteriaId\":\"29F57497-7B48-4D0C-B8F5-8D33062BECEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADDE96C7-C489-4D14-990B-8524627A23D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD82C093-FD98-45DE-9EE6-A05E81A1FEC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*\",\"matchCriteriaId\":\"08789F9E-CDC7-4F89-B925-92C9E3AE5234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*\",\"matchCriteriaId\":\"26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*\",\"matchCriteriaId\":\"621C203B-4B66-49CC-A35D-D7703109BF14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*\",\"matchCriteriaId\":\"3261BDEF-D89C-41D9-A360-EC36EAB17490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*\",\"matchCriteriaId\":\"5170A4F6-02B7-4225-B944-73DB5A4D332C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A97DBA-A56B-4F0B-B9C4-44B5166681AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*\",\"matchCriteriaId\":\"806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA6211E-134A-484E-8444-FBB5070B395D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E7B05B3-4076-4A44-B9A6-A44419F175C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1636B4-6E79-42D7-AA62-5EE43412B43A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F0377D0-BBED-41BF-80C5-58414ED413EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*\",\"matchCriteriaId\":\"6495283C-D18A-4DDA-852E-46F2273D6DAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*\",\"matchCriteriaId\":\"09DEFEE5-5E9E-4F3A-A245-3E8E2B291339\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*\",\"matchCriteriaId\":\"17A84E0A-1429-467F-9EE1-FCA062392DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*\",\"matchCriteriaId\":\"C591163D-64BC-403B-A460-5B2258EC2F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED932B89-D34D-4398-8F79-AF98987CAFD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD365A0-0B09-4EC2-9973-691144C99507\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E198AE4-A6A3-4875-A7DA-44BE9E1B280F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FDD5BA0-8180-484D-8308-B0862B6E9DC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A6EB9A-A908-42D1-A6BC-E38E861BBECE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*\",\"matchCriteriaId\":\"651EDCAA-D785-464D-AE41-425A69F6FFB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B3C704C-9D60-4F72-B482-07F209985E68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1CFE956-4391-4B71-BD0B-96A008A624B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*\",\"matchCriteriaId\":\"409778CD-9AB3-4793-A5F5-8D8657F81442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC45A8B-6DE0-465F-9644-B75A09394F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A265671-BCB0-401A-A1E8-500F9D41492E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*\",\"matchCriteriaId\":\"83168067-1E43-4186-9B15-3FC702C6583C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C122DB4-8410-4C4E-87BE-EB3175CE182B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*\",\"matchCriteriaId\":\"C76ED78D-0778-4269-938E-BB7586C1E44E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1F78C5-E995-4E37-83C5-5B6A1D39E549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A2E842D-AF37-4641-AD05-B91F250E7487\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07EAC87-32FD-4553-B71D-181F2C66AE68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*\",\"matchCriteriaId\":\"865D3042-68ED-44B9-A036-9433F7463D6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*\",\"matchCriteriaId\":\"11AE3F61-9655-4B20-96E1-92112BE2BEDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE35166-3019-450B-9C69-484E4EDE5A6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*\",\"matchCriteriaId\":\"D892B066-381B-4F46-8363-7BA1647BBCD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*\",\"matchCriteriaId\":\"710DB381-5504-4493-8D0A-17AB8E5A903B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*\",\"matchCriteriaId\":\"42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*\",\"matchCriteriaId\":\"33CBCA55-010E-4E84-B2F8-F9B53D5A3340\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*\",\"matchCriteriaId\":\"95A73B4B-F9B3-4D66-9668-902902C73CB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D14D51D-E2EA-4826-8C6E-AF1C15F12384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED100A1-9D59-48BE-91D4-0C8F2D678E6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*\",\"matchCriteriaId\":\"660B51F2-DFE0-49F6-AD2A-6E94B20F4019\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF80536-348A-468E-AC1C-DA53632FCC83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFABF302-AC32-4507-BDD9-314854DE55BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EDE020F-4FB1-4F1D-B434-6745045702D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA1538B9-E860-46CE-A4CA-1393ECA20D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*\",\"matchCriteriaId\":\"386A6805-6167-47BA-A02F-073DC7E0FE36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*\",\"matchCriteriaId\":\"03BA15D8-F7A2-428C-8104-BCEBDE7C1EC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CFCFE7B-37E5-4C64-9B43-4F693F227231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*\",\"matchCriteriaId\":\"02CFAE22-37DB-4787-96FB-9E0F8EF671E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BC70488-A435-43BE-AEF4-30CBA36CBC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201811401:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B37DC7D-A1C6-468F-A42E-160CE226FF7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201903001:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B0A3263-193B-4725-BF20-08A2B2F3BB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201905001:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6C6287E-C24E-4291-8DE7-4413993577F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201909001:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA74FDE2-4656-446D-9215-77326C7EC62C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBA15143-734D-4889-8B5A-2445A2DDDD4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*\",\"matchCriteriaId\":\"04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D2ED442-3F6D-472A-AA98-51D05A65B2E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A71EC72-3389-4EC7-8104-2A78F7B8C0DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*\",\"matchCriteriaId\":\"F948E806-0F73-4145-A723-7A43BA45842B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*\",\"matchCriteriaId\":\"75FAFF86-C65F-4723-8A63-BACE2F797937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC31DE3-ACFE-422F-B253-2FE4AAFE3954\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*\",\"matchCriteriaId\":\"B30B3EA4-495F-4915-B6E3-5FB9277C2DE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FA9E337-B4F3-4895-BA58-962F8CDEE73E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*\",\"matchCriteriaId\":\"830B0BC1-A368-49AC-B6C9-B000972EF92A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*\",\"matchCriteriaId\":\"614394F3-3BEE-4E12-AABF-436D54A04313\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*\",\"matchCriteriaId\":\"350FD3CE-8B64-4FCF-82DE-BE941156F4F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9EAE177-6C7E-4C1B-ADEE-2C036F731272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFEEC31-8462-4DF9-A1DA-D7057C209CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*\",\"matchCriteriaId\":\"942DAD67-9455-4D02-BD3B-BFD2DE7A7E52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ACC1A72-F6B6-430A-AB89-AB0A11587F58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*\",\"matchCriteriaId\":\"45111C74-BF6F-4C05-A0D3-CE325AD0C02B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1CE5849-01B1-4E36-83E8-496A3F328C9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*\",\"matchCriteriaId\":\"A879BA05-3A80-4EBC-AA9D-9B53695425B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D65A0E8-A1E0-42F3-B77D-2F32979278BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*\",\"matchCriteriaId\":\"80C10150-39BA-4818-B48F-8645D4A0D316\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*\",\"matchCriteriaId\":\"9792B986-86EF-40E0-9427-A45F858717E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*\",\"matchCriteriaId\":\"37EDD688-C91A-4A35-913A-82E156ADD242\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*\",\"matchCriteriaId\":\"47DA50DA-7CA4-4B76-8B3B-A5732509F71D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*\",\"matchCriteriaId\":\"76EB1A04-0645-4909-AEF9-33D6FADA4793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A35723-D968-42D6-89EB-86CA550516E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3AC8A19-F98E-48F1-A1EA-EAA1C7208335\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6A3952-8429-4762-8701-47D7C1F05A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B007609-C312-469B-BACF-04D6D80DADF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*\",\"matchCriteriaId\":\"514F2ECD-FC55-42A5-BEE4-DA7641CC93A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*\",\"matchCriteriaId\":\"3594E391-19CD-4803-8285-FA11BE63AB05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CEC248D-502E-4A8D-8786-CD72A2E3AB1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F08529C-B14C-45FB-AEA1-77D12C88CB30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*\",\"matchCriteriaId\":\"617835F5-49DA-4B42-8C7B-C122D7363A00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE1372AD-2853-4BED-BB71-6BACB28B95C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0E684DF-9E45-459E-AB75-6B4653E5C7CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3DDD3E9-186F-472C-BA76-C2A363206792\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*\",\"matchCriteriaId\":\"A09E9914-DB27-41EF-B55D-5B79ECD1DA69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2792D06-A73E-4A56-A152-82E1AD4E707D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE9D758-2170-4ACD-965C-C76BDA693466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD4A373B-2AC6-4193-9C34-1E4EEB552A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*\",\"matchCriteriaId\":\"E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B75B45F-E25A-4362-856D-465A9F8B70DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA4AE4C-3BA8-472D-950A-3C8684565CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AA3617D-B911-4BC5-B544-B31D4F43D2B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDC6E0F6-83DF-4670-8D04-A41C7DC1B881\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*\",\"matchCriteriaId\":\"047A71B3-CDFB-41F3-B2DE-11360DAE5744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*\",\"matchCriteriaId\":\"F88691FD-F263-4B75-BF21-481BC1623C3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A47CDA-D3DD-4E0F-8268-32A188EA1D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*\",\"matchCriteriaId\":\"36A67476-2E8E-4104-9F10-7AE42F82508F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2283675-582F-44A8-833B-B5B439CBFA1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*\",\"matchCriteriaId\":\"94C4A188-6B00-48C4-B7E2-9F70811BF618\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*\",\"matchCriteriaId\":\"F82943E9-E2D0-49F4-BD32-40E84BA1957E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*\",\"matchCriteriaId\":\"B854BA24-11FD-4D0C-9EFD-A88E64FED4E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*\",\"matchCriteriaId\":\"554434AB-763F-4E95-B616-F7594041D511\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE56E7AC-F63D-4A4B-9B45-0E623973B14B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*\",\"matchCriteriaId\":\"36664142-0111-42F5-A371-AD2C0DF211EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*\",\"matchCriteriaId\":\"49EA78B6-8208-4351-88F9-103CA01EF3A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*\",\"matchCriteriaId\":\"27AC575F-9AC4-4AA1-A71C-BF9F752295F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C0F47F3-0509-45AC-8EA9-37246E4E6095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE103301-6AEF-4348-8F36-833021739AEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D92B2FF-8962-41F9-B019-D83AAAD188FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E6D5227-3421-412F-9BE0-583AA768446D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*\",\"matchCriteriaId\":\"82BA9EB1-4EFB-4649-92C7-2C307966956E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*\",\"matchCriteriaId\":\"2133378D-8DFD-48B9-83A1-9FA7DDC68902\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*\",\"matchCriteriaId\":\"57BF8703-0C83-4BA5-B0F7-FB6E45229685\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAADDD62-2F6E-4D12-A49F-3D38ACF488E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*\",\"matchCriteriaId\":\"27FA0C0E-B5A2-4619-998B-CFB45496D895\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*\",\"matchCriteriaId\":\"B98EDBA4-0BA4-4894-B6F6-681117A5C5C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E756914-2C2A-4999-AAEA-2F6835A29C49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AC0C89B-26A3-40F7-855F-5F6B36B77F5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF2FE18-A90E-429A-98D1-9A97DD0464B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*\",\"matchCriteriaId\":\"92289D85-0652-41D1-A6BA-D4B8C7EE1F45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF41887D-B145-4D01-9AEF-2E36479B2FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FEAF0ED-BD20-4BA6-BB23-1C978B823A11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*\",\"matchCriteriaId\":\"36234CE1-FA7E-4534-9720-410435E2BAEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABE65721-57C0-4748-B159-F6D97CE8CAB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD1889D7-3313-4004-AA42-7879E8551413\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*\",\"matchCriteriaId\":\"494E0B07-CE16-46D4-A89B-4F12A6CECDF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD046237-16D7-4A57-9F09-2A6A649368C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*\",\"matchCriteriaId\":\"8343E8DB-1D54-4B82-9254-2E2AFC548609\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*\",\"matchCriteriaId\":\"F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*\",\"matchCriteriaId\":\"0169E032-F47A-45E0-BC33-B7DF54EC11BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redlion:n-tron_702-w_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E7E2A2E-13BA-46CF-A98D-CC855C381834\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:redlion:n-tron_702-w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30885167-CD8F-4026-ADCB-2E07E772ECD5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redlion:n-tron_702m12-w_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6633FE15-2CF0-4F83-91AB-6B090684C284\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:redlion:n-tron_702m12-w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94F253CC-A9DC-463A-93F0-71DD4FC190FF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Jun/18\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Sep/7\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Aug/20\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Mar/15\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Sep/6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Aug/21\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Jan/39\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Jun/36\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2019-0013.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jun/14\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/7\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://usn.ubuntu.com/3935-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Jun/18\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Sep/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Aug/20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Mar/15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Sep/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Aug/21\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Jan/39\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Jun/36\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2019-0013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jun/14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://usn.ubuntu.com/3935-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html\", \"name\": \"[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3935-1/\", \"name\": \"USN-3935-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/18\", \"name\": \"20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/14\", \"name\": \"20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Sep/7\", \"name\": \"20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/7\", \"name\": \"20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2019-0013.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Mar/15\", \"name\": \"20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router \u0026 TC Cloud Client\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Aug/20\", \"name\": \"20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Sep/6\", \"name\": \"20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Jan/39\", \"name\": \"20210113 SEC Consult SA-20210113-0 :: Multiple vulnerabilities in Pepperl+Fuchs IO-Link Master Series\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html\", \"name\": \"[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Aug/21\", \"name\": \"20210819 SEC Consult SA-20210819-0 :: Multiple critical vulnerabilities in Altus Nexto and Hadron series\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Jun/36\", \"name\": \"20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T20:27:04.005Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2017-16544\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-09T15:34:08.917753Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-94\", \"description\": \"CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-09T15:34:38.655Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2017-11-20T00:00:00.000Z\", \"references\": [{\"url\": \"https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html\", \"name\": \"[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://usn.ubuntu.com/3935-1/\", \"name\": \"USN-3935-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/18\", \"name\": \"20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/14\", \"name\": \"20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Sep/7\", \"name\": \"20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/7\", \"name\": \"20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"]}, {\"url\": \"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2019-0013.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Mar/15\", \"name\": \"20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router \u0026 TC Cloud Client\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Aug/20\", \"name\": \"20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Sep/6\", \"name\": \"20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Jan/39\", \"name\": \"20210113 SEC Consult SA-20210113-0 :: Multiple vulnerabilities in Pepperl+Fuchs IO-Link Master Series\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html\", \"name\": \"[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Aug/21\", \"name\": \"20210819 SEC Consult SA-20210819-0 :: Multiple critical vulnerabilities in Altus Nexto and Hadron series\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Jun/36\", \"name\": \"20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2022-06-20T18:06:31.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"n/a\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/\", \"name\": \"https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/\", \"refsource\": \"MISC\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html\", \"name\": \"[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update\", \"refsource\": \"MLIST\"}, {\"url\": \"https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8\", \"name\": \"https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8\", \"refsource\": \"MISC\"}, {\"url\": \"https://usn.ubuntu.com/3935-1/\", \"name\": \"USN-3935-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/18\", \"name\": \"20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series\", \"refsource\": \"FULLDISC\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/14\", \"name\": \"20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series\", \"refsource\": \"BUGTRAQ\"}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Sep/7\", \"name\": \"20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X\", \"refsource\": \"FULLDISC\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/7\", \"name\": \"20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X\", \"refsource\": \"BUGTRAQ\"}, {\"url\": \"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\", \"name\": \"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2019-0013.html\", \"name\": \"http://www.vmware.com/security/advisories/VMSA-2019-0013.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html\", \"name\": \"http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Mar/15\", \"name\": \"20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router \u0026 TC Cloud Client\", \"refsource\": \"FULLDISC\"}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Aug/20\", \"name\": \"20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S\", \"refsource\": \"FULLDISC\"}, {\"url\": \"https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01\", \"name\": \"https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01\", \"refsource\": \"MISC\"}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Sep/6\", \"name\": \"20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W\", \"refsource\": \"FULLDISC\"}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Jan/39\", \"name\": \"20210113 SEC Consult SA-20210113-0 :: Multiple vulnerabilities in Pepperl+Fuchs IO-Link Master Series\", \"refsource\": \"FULLDISC\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html\", \"name\": \"[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update\", \"refsource\": \"MLIST\"}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Aug/21\", \"name\": \"20210819 SEC Consult SA-20210819-0 :: Multiple critical vulnerabilities in Altus Nexto and Hadron series\", \"refsource\": \"FULLDISC\"}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Jun/36\", \"name\": \"20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series\", \"refsource\": \"FULLDISC\"}, {\"url\": \"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html\", \"name\": \"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2017-16544\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"cve@mitre.org\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2017-16544\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-09T15:35:03.132Z\", \"dateReserved\": \"2017-11-05T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2017-11-20T15:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2019-AVI-446
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | vCenter versions 6.0.x antérieures à 6.0 U3j | ||
| VMware | N/A | vCenter versions 6.7.x antérieures à 6.7 U1b | ||
| VMware | ESXi | ESXi versions 6.0-x antérieures à ESXi600-201909101-SG | ||
| VMware | ESXi | ESXi versions 6.5-x antérieures à ESXi650-201907101-SG | ||
| VMware | ESXi | ESXi versions 6.7-x antérieures à ESXi670-201904101-SG | ||
| VMware | N/A | vCenter versions 6.5.x antérieures à 6.5 U2b |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "vCenter versions 6.0.x ant\u00e9rieures \u00e0 6.0 U3j",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vCenter versions 6.7.x ant\u00e9rieures \u00e0 6.7 U1b",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi versions 6.0-x ant\u00e9rieures \u00e0 ESXi600-201909101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi versions 6.5-x ant\u00e9rieures \u00e0 ESXi650-201907101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi versions 6.7-x ant\u00e9rieures \u00e0 ESXi670-201904101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vCenter versions 6.5.x ant\u00e9rieures \u00e0 6.5 U2b",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-5534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5534"
},
{
"name": "CVE-2017-16544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16544"
},
{
"name": "CVE-2019-5532",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5532"
},
{
"name": "CVE-2019-5531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5531"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-446",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-09-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nVMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2019-0013 du 16 septembre 2019",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0013.html"
}
]
}
CERTFR-2019-AVI-446
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | vCenter versions 6.0.x antérieures à 6.0 U3j | ||
| VMware | N/A | vCenter versions 6.7.x antérieures à 6.7 U1b | ||
| VMware | ESXi | ESXi versions 6.0-x antérieures à ESXi600-201909101-SG | ||
| VMware | ESXi | ESXi versions 6.5-x antérieures à ESXi650-201907101-SG | ||
| VMware | ESXi | ESXi versions 6.7-x antérieures à ESXi670-201904101-SG | ||
| VMware | N/A | vCenter versions 6.5.x antérieures à 6.5 U2b |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "vCenter versions 6.0.x ant\u00e9rieures \u00e0 6.0 U3j",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vCenter versions 6.7.x ant\u00e9rieures \u00e0 6.7 U1b",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi versions 6.0-x ant\u00e9rieures \u00e0 ESXi600-201909101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi versions 6.5-x ant\u00e9rieures \u00e0 ESXi650-201907101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi versions 6.7-x ant\u00e9rieures \u00e0 ESXi670-201904101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vCenter versions 6.5.x ant\u00e9rieures \u00e0 6.5 U2b",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-5534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5534"
},
{
"name": "CVE-2017-16544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16544"
},
{
"name": "CVE-2019-5532",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5532"
},
{
"name": "CVE-2019-5531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5531"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-446",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-09-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nVMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2019-0013 du 16 septembre 2019",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0013.html"
}
]
}
CERTFR-2026-AVI-0199
Vulnerability from certfr_avis - Published: 2026-02-24 - Updated: 2026-02-24
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Telco Cloud Platform | Telco Cloud Platform versions 4.x et 5.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Data Services | Tanzu Data Flow versions antérieures à 2.0.2 sur Tanzu Platform | ||
| VMware | Azure Spring Enterprise | Harbor Registry versions antérieures à 2.14.2 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour MySQL versions 2.0.0 sur Kubernetes | ||
| VMware | Cloud Foundation | Cloud Foundation versions 9.x antérieures à 9.0.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | App Metrics versions antérieures à2.3.3 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire versions antérieures à 2.6.1 sur Kubernetes | ||
| VMware | Tanzu Kubernetes Runtime | CredHub Secrets Management pour Tanzu Platform versions antérieures à 1.6.8 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 3.3.1 sur Kubernetes | ||
| VMware | Tanzu Operations Manager | Foundation Core pour Tanzu Platform versions antérieures à 3.2.4 | ||
| VMware | Aria Operations | Aria Operations versions 8.x antérieures à 8.18.6 | ||
| VMware | Tanzu Kubernetes Runtime | cf-mgmt pour Tanzu Platform versions antérieures à 1.0.108 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 9.0.1 | ||
| VMware | Tanzu Kubernetes Runtime | Extended App Support pour Tanzu Platform versions antérieures à 1.0.15 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire Management versions antérieures à 1.4.3 | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.77 | ||
| VMware | Tanzu Kubernetes Runtime | Cloud Native Buildpacks pour Tanzu Platform versions antérieures à 0.6.5 | ||
| VMware | Cloud Foundation | Cloud Foundation versions 4.x et 5.x sans le correctif de sécurité KB92148 | ||
| VMware | Tanzu Kubernetes Runtime | AI Services pour Tanzu Platform versions antérieures à 10.3.4 | ||
| VMware | Tanzu Kubernetes Runtime | Java Buildpack versions antérieures à 4.89.0 | ||
| VMware | Telco Cloud Infrastructure | Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Telco Cloud Platform versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow versions ant\u00e9rieures \u00e0 2.0.2 sur Tanzu Platform",
"product": {
"name": "Tanzu Data Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Harbor Registry versions ant\u00e9rieures \u00e0 2.14.2",
"product": {
"name": "Azure Spring Enterprise",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour MySQL versions 2.0.0 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 9.x ant\u00e9rieures \u00e0 9.0.2.0",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Metrics versions ant\u00e9rieures \u00e02.3.3",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 2.6.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.8",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 3.3.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.4",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Aria Operations versions 8.x ant\u00e9rieures \u00e0 8.18.6",
"product": {
"name": "Aria Operations",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "cf-mgmt pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.108",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 9.0.1",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.15",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Management versions ant\u00e9rieures \u00e0 1.4.3",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.77",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Native Buildpacks pour Tanzu Platform versions ant\u00e9rieures \u00e0 0.6.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB92148",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.89.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Infrastructure",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47219"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2017-16544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16544"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2022-24450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24450"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2020-10750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10750"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41091"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2018-1000517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000517"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10543"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2019-5481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5481"
},
{
"name": "CVE-2025-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26646"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-29222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29222"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-29190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29190"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2018-20679",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20679"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2017-15873",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15873"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-22719",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22719"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-39399",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39399"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2023-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22041"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2023-47090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47090"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2022-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29946"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-30215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30215"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-22036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22036"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2022-26652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26652"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2023-42365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42365"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2025-68146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68146"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2017-15874",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15874"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2026-22721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22721"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2022-48174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48174"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2023-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21835"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41089"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2023-42364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42364"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2019-5747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5747"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2018-1000500",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2026-26014",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26014"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2026-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21941"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2026-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21947"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2019-5443",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5443"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2023-22006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22006"
},
{
"name": "CVE-2019-5435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5435"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2026-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22720"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-42363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42363"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29189"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-24T00:00:00",
"last_revision_date": "2026-02-24T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0199",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37012",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37012"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37001",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37001"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37013",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37013"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37003",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37003"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37023",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37023"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37017",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37017"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37006",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37006"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37024",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37024"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36997",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36997"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37004",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37004"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36947",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37018",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37018"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37005",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37005"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37008",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37008"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37007",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37007"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37020",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37020"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36998",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36998"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37002",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37002"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37021",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37021"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37022",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37022"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37016",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37016"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37019",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37019"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37010",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37010"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37009",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37009"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37000",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37000"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37011",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37011"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37015",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37015"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37014",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37014"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36999",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36999"
}
]
}
BDU:2021-03363
Vulnerability from fstec - Published: 05.11.2017{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb), \u0434\u043e 1.27.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (BusyBox), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f BusyBox:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8\n\n\u0414\u043b\u044f \u041e\u0421 Debian:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://security-tracker.debian.org/tracker/CVE-2017-16544\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20210730SE16\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20211019SE81\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f busybox \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1:1.22.0-19+deb9u2.osnova4",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "05.11.2017",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "02.07.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-03363",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2017-16544",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), BusyBox, \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 add_match \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 libbb/lineedit.c \u043d\u0430\u0431\u043e\u0440\u0430 UNIX-\u0443\u0442\u0438\u043b\u0438\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0438 BusyBox, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u043c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0435\u0439 \u043a\u043e\u0434\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0432\u0435\u0440\u043d\u043e\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0435\u0439 \u043a\u043e\u0434\u0430 (\u0412\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430) (CWE-94)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 add_match \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 libbb/lineedit.c \u043d\u0430\u0431\u043e\u0440\u0430 UNIX-\u0443\u0442\u0438\u043b\u0438\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0438 BusyBox \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u0438\u043c\u0451\u043d \u0444\u0430\u0439\u043b\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-16544\nhttps://security-tracker.debian.org/tracker/CVE-2017-16544\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20210611SE16\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20211019SE81\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-94",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
CNVD-2017-37820
Vulnerability from cnvd - Published: 2017-12-21厂商已发布漏洞修复程序,请及时关注更新: https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8
| Name | BusyBox BusyBox <=1.27.2 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-16544"
}
},
"description": "BusyBox\u662f\u4e4c\u514b\u5170\u8f6f\u4ef6\u5f00\u53d1\u8005\u4e39\u5c3c\u65af-\u5f17\u62c9\u5148\u79d1\uff08Denis Vlasenko\uff09\u6240\u8d1f\u8d23\u7ef4\u62a4\u7684\u4e00\u5957\u5305\u542b\u4e86\u591a\u4e2alinux\u547d\u4ee4\u548c\u5de5\u5177\u7684\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nBusyBox 1.27.2\u53ca\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u7684libbb/lineedit.c\u6587\u4ef6\u7684\u2018add_match\u2019\u51fd\u6570\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u8fc7\u6ee4\u6587\u4ef6\u540d\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4ee3\u7801\u6216\u5199\u5165\u4efb\u610f\u6587\u4ef6\u3002",
"discovererName": "unknow",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-37820",
"openTime": "2017-12-21",
"patchDescription": "BusyBox\u662f\u4e4c\u514b\u5170\u8f6f\u4ef6\u5f00\u53d1\u8005\u4e39\u5c3c\u65af-\u5f17\u62c9\u5148\u79d1\uff08Denis Vlasenko\uff09\u6240\u8d1f\u8d23\u7ef4\u62a4\u7684\u4e00\u5957\u5305\u542b\u4e86\u591a\u4e2alinux\u547d\u4ee4\u548c\u5de5\u5177\u7684\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nBusyBox 1.27.2\u53ca\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u7684libbb/lineedit.c\u6587\u4ef6\u7684\u2018add_match\u2019\u51fd\u6570\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u8fc7\u6ee4\u6587\u4ef6\u540d\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4ee3\u7801\u6216\u5199\u5165\u4efb\u610f\u6587\u4ef6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "BusyBox\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "BusyBox BusyBox \u003c=1.27.2"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2017-16544\r\nhttps://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/",
"serverity": "\u4e2d",
"submitTime": "2017-11-21",
"title": "BusyBox\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
FKIE_CVE-2017-16544
Vulnerability from fkie_nvd - Published: 2017-11-20 15:29 - Updated: 2026-05-13 00:248.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html | Exploit, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html | Exploit, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html | Exploit, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://seclists.org/fulldisclosure/2019/Jun/18 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://seclists.org/fulldisclosure/2019/Sep/7 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://seclists.org/fulldisclosure/2020/Aug/20 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://seclists.org/fulldisclosure/2020/Mar/15 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://seclists.org/fulldisclosure/2020/Sep/6 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://seclists.org/fulldisclosure/2021/Aug/21 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://seclists.org/fulldisclosure/2021/Jan/39 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://seclists.org/fulldisclosure/2022/Jun/36 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2019-0013.html | Third Party Advisory | |
| cve@mitre.org | https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8 | Patch, Vendor Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://seclists.org/bugtraq/2019/Jun/14 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | https://seclists.org/bugtraq/2019/Sep/7 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01 | Third Party Advisory, US Government Resource | |
| cve@mitre.org | https://usn.ubuntu.com/3935-1/ | Third Party Advisory | |
| cve@mitre.org | https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2019/Jun/18 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2019/Sep/7 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Aug/20 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Mar/15 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Sep/6 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/Aug/21 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/Jan/39 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2022/Jun/36 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2019-0013.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Jun/14 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Sep/7 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3935-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/ | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| busybox | busybox | * | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.0 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.5 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| vmware | esxi | 6.7 | |
| redlion | n-tron_702-w_firmware | * | |
| redlion | n-tron_702-w | - | |
| redlion | n-tron_702m12-w_firmware | * | |
| redlion | n-tron_702m12-w | - | |
| canonical | ubuntu_linux | 14.04 | |
| canonical | ubuntu_linux | 16.04 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37287FA9-D061-4C33-AA55-BFF45D880108",
"versionEndIncluding": "1.27.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC77ADEA-F0B8-4E5D-B965-39397F823075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*",
"matchCriteriaId": "52403C80-3022-4E5B-B16A-24B116D1E6B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*",
"matchCriteriaId": "FBECED2E-05FD-492E-8B57-9BB8ADA82444",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*",
"matchCriteriaId": "3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*",
"matchCriteriaId": "A63E3C72-3145-4661-BBCD-8A67EC0CDDF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*",
"matchCriteriaId": "9159F6E1-6A36-4D3C-85B1-2205B90CD244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*",
"matchCriteriaId": "C2C08C24-FBAC-49B8-AABF-4FF8BADA3412",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*",
"matchCriteriaId": "2B9D5E67-78C9-495E-91F0-AF94871E5FA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*",
"matchCriteriaId": "6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*",
"matchCriteriaId": "ADC13026-3B5A-4BF0-BDEC-B77338E427E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*",
"matchCriteriaId": "6CBA70BA-FFCD-4D2D-AD26-95CC62748937",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*",
"matchCriteriaId": "4C92DD8B-8AB8-40D4-8E86-12FEB055D37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*",
"matchCriteriaId": "C58D77F5-CDB2-47DA-A879-BABEBE2E1E04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*",
"matchCriteriaId": "D0C324FB-3989-4A4A-BF5B-C40CA698DDB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*",
"matchCriteriaId": "0E7AC58E-D1F8-4FDF-9A28-61CF6158330A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*",
"matchCriteriaId": "489EE0F6-5510-470E-8711-DC08B4AFB4F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*",
"matchCriteriaId": "6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*",
"matchCriteriaId": "DDAA48A9-9319-4104-B151-D529E5EBF0F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*",
"matchCriteriaId": "D16CD918-5075-4975-8B1E-21D8AD35A28E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*",
"matchCriteriaId": "7A38CD8E-494D-4E0E-A300-8550FC81FAE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*",
"matchCriteriaId": "1F40ABE8-8DED-4633-A34C-00DF5D510E71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*",
"matchCriteriaId": "1736B975-089B-413C-8CA0-5524B957EF9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*",
"matchCriteriaId": "0E4DCBF6-7189-497A-B923-08574443172C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*",
"matchCriteriaId": "16FBA646-0B5E-44A7-BB12-29D5C611AEC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*",
"matchCriteriaId": "29F57497-7B48-4D0C-B8F5-8D33062BECEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*",
"matchCriteriaId": "ADDE96C7-C489-4D14-990B-8524627A23D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*",
"matchCriteriaId": "AD82C093-FD98-45DE-9EE6-A05E81A1FEC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*",
"matchCriteriaId": "08789F9E-CDC7-4F89-B925-92C9E3AE5234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*",
"matchCriteriaId": "26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*",
"matchCriteriaId": "621C203B-4B66-49CC-A35D-D7703109BF14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*",
"matchCriteriaId": "3261BDEF-D89C-41D9-A360-EC36EAB17490",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*",
"matchCriteriaId": "5170A4F6-02B7-4225-B944-73DB5A4D332C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*",
"matchCriteriaId": "62A97DBA-A56B-4F0B-B9C4-44B5166681AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*",
"matchCriteriaId": "806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*",
"matchCriteriaId": "DBA6211E-134A-484E-8444-FBB5070B395D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*",
"matchCriteriaId": "3E7B05B3-4076-4A44-B9A6-A44419F175C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*",
"matchCriteriaId": "1A1636B4-6E79-42D7-AA62-5EE43412B43A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*",
"matchCriteriaId": "0F0377D0-BBED-41BF-80C5-58414ED413EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*",
"matchCriteriaId": "6495283C-D18A-4DDA-852E-46F2273D6DAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*",
"matchCriteriaId": "09DEFEE5-5E9E-4F3A-A245-3E8E2B291339",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*",
"matchCriteriaId": "4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*",
"matchCriteriaId": "17A84E0A-1429-467F-9EE1-FCA062392DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*",
"matchCriteriaId": "C591163D-64BC-403B-A460-5B2258EC2F8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*",
"matchCriteriaId": "ED932B89-D34D-4398-8F79-AF98987CAFD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*",
"matchCriteriaId": "ABD365A0-0B09-4EC2-9973-691144C99507",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*",
"matchCriteriaId": "FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*",
"matchCriteriaId": "0E198AE4-A6A3-4875-A7DA-44BE9E1B280F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*",
"matchCriteriaId": "2FDD5BA0-8180-484D-8308-B0862B6E9DC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*",
"matchCriteriaId": "96A6EB9A-A908-42D1-A6BC-E38E861BBECE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*",
"matchCriteriaId": "651EDCAA-D785-464D-AE41-425A69F6FFB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*",
"matchCriteriaId": "1B3C704C-9D60-4F72-B482-07F209985E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*",
"matchCriteriaId": "C1CFE956-4391-4B71-BD0B-96A008A624B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*",
"matchCriteriaId": "409778CD-9AB3-4793-A5F5-8D8657F81442",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*",
"matchCriteriaId": "F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*",
"matchCriteriaId": "0DC45A8B-6DE0-465F-9644-B75A09394F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*",
"matchCriteriaId": "7A265671-BCB0-401A-A1E8-500F9D41492E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*",
"matchCriteriaId": "83168067-1E43-4186-9B15-3FC702C6583C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*",
"matchCriteriaId": "8C122DB4-8410-4C4E-87BE-EB3175CE182B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*",
"matchCriteriaId": "C76ED78D-0778-4269-938E-BB7586C1E44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*",
"matchCriteriaId": "7A1F78C5-E995-4E37-83C5-5B6A1D39E549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*",
"matchCriteriaId": "7A2E842D-AF37-4641-AD05-B91F250E7487",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*",
"matchCriteriaId": "A07EAC87-32FD-4553-B71D-181F2C66AE68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*",
"matchCriteriaId": "AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*",
"matchCriteriaId": "865D3042-68ED-44B9-A036-9433F7463D6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*",
"matchCriteriaId": "FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*",
"matchCriteriaId": "11AE3F61-9655-4B20-96E1-92112BE2BEDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*",
"matchCriteriaId": "ECE35166-3019-450B-9C69-484E4EDE5A6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*",
"matchCriteriaId": "D892B066-381B-4F46-8363-7BA1647BBCD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*",
"matchCriteriaId": "710DB381-5504-4493-8D0A-17AB8E5A903B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*",
"matchCriteriaId": "42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*",
"matchCriteriaId": "33CBCA55-010E-4E84-B2F8-F9B53D5A3340",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*",
"matchCriteriaId": "95A73B4B-F9B3-4D66-9668-902902C73CB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*",
"matchCriteriaId": "8D14D51D-E2EA-4826-8C6E-AF1C15F12384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*",
"matchCriteriaId": "BED100A1-9D59-48BE-91D4-0C8F2D678E6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*",
"matchCriteriaId": "660B51F2-DFE0-49F6-AD2A-6E94B20F4019",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*",
"matchCriteriaId": "8BF80536-348A-468E-AC1C-DA53632FCC83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*",
"matchCriteriaId": "CFABF302-AC32-4507-BDD9-314854DE55BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*",
"matchCriteriaId": "9EDE020F-4FB1-4F1D-B434-6745045702D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*",
"matchCriteriaId": "AA1538B9-E860-46CE-A4CA-1393ECA20D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*",
"matchCriteriaId": "386A6805-6167-47BA-A02F-073DC7E0FE36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*",
"matchCriteriaId": "03BA15D8-F7A2-428C-8104-BCEBDE7C1EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*",
"matchCriteriaId": "1CFCFE7B-37E5-4C64-9B43-4F693F227231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*",
"matchCriteriaId": "02CFAE22-37DB-4787-96FB-9E0F8EF671E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*",
"matchCriteriaId": "0BC70488-A435-43BE-AEF4-30CBA36CBC03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201811401:*:*:*:*:*:*",
"matchCriteriaId": "2B37DC7D-A1C6-468F-A42E-160CE226FF7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201903001:*:*:*:*:*:*",
"matchCriteriaId": "7B0A3263-193B-4725-BF20-08A2B2F3BB82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201905001:*:*:*:*:*:*",
"matchCriteriaId": "D6C6287E-C24E-4291-8DE7-4413993577F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201909001:*:*:*:*:*:*",
"matchCriteriaId": "AA74FDE2-4656-446D-9215-77326C7EC62C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*",
"matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*",
"matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*",
"matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*",
"matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*",
"matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*",
"matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*",
"matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*",
"matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*",
"matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*",
"matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*",
"matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*",
"matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*",
"matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*",
"matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*",
"matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*",
"matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*",
"matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*",
"matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*",
"matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*",
"matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*",
"matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*",
"matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*",
"matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*",
"matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*",
"matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*",
"matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*",
"matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*",
"matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*",
"matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*",
"matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*",
"matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*",
"matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*",
"matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*",
"matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*",
"matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*",
"matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*",
"matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*",
"matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*",
"matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*",
"matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*",
"matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*",
"matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*",
"matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*",
"matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*",
"matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*",
"matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*",
"matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*",
"matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*",
"matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*",
"matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*",
"matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*",
"matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*",
"matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*",
"matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*",
"matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*",
"matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*",
"matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*",
"matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*",
"matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*",
"matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*",
"matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*",
"matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*",
"matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*",
"matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*",
"matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*",
"matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*",
"matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*",
"matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*",
"matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*",
"matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*",
"matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*",
"matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*",
"matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*",
"matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*",
"matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*",
"matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*",
"matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*",
"matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*",
"matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*",
"matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*",
"matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*",
"matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*",
"matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*",
"matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*",
"matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*",
"matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*",
"matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*",
"matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*",
"matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*",
"matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*",
"matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redlion:n-tron_702-w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E7E2A2E-13BA-46CF-A98D-CC855C381834",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redlion:n-tron_702-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30885167-CD8F-4026-ADCB-2E07E772ECD5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redlion:n-tron_702m12-w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6633FE15-2CF0-4F83-91AB-6B090684C284",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redlion:n-tron_702m12-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94F253CC-A9DC-463A-93F0-71DD4FC190FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks."
},
{
"lang": "es",
"value": "En la funci\u00f3n add_match en libbb/lineedit.c en BusyBox hasta la versi\u00f3n 1.27.2, la caracter\u00edstica de autocompletar pesta\u00f1as del shell, empleada para obtener una lista de nombres de archivo en un directorio, no inmuniza los nombres de archivo. Esto conduce a la ejecuci\u00f3n de cualquier secuencia de escape en el terminal. Esto podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo, escrituras arbitrarias de archivos u otros ataques."
}
],
"id": "CVE-2017-16544",
"lastModified": "2026-05-13T00:24:29.033",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2017-11-20T15:29:00.387",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2019/Jun/18"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Aug/20"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Mar/15"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Sep/6"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2021/Aug/21"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2021/Jan/39"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2022/Jun/36"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Jun/14"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3935-1/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2019/Jun/18"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Aug/20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Mar/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Sep/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2021/Aug/21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2021/Jan/39"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2022/Jun/36"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Jun/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3935-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-234C-568R-P7M4
Vulnerability from github – Published: 2022-05-13 01:04 – Updated: 2025-04-20 03:48In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.
{
"affected": [],
"aliases": [
"CVE-2017-16544"
],
"database_specific": {
"cwe_ids": [
"CWE-94"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-11-20T15:29:00Z",
"severity": "HIGH"
},
"details": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
"id": "GHSA-234c-568r-p7m4",
"modified": "2025-04-20T03:48:47Z",
"published": "2022-05-13T01:04:02Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16544"
},
{
"type": "WEB",
"url": "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html"
},
{
"type": "WEB",
"url": "https://seclists.org/bugtraq/2019/Jun/14"
},
{
"type": "WEB",
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"type": "WEB",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/3935-1"
},
{
"type": "WEB",
"url": "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2019/Jun/18"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2020/Aug/20"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2020/Mar/15"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2020/Sep/6"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2021/Aug/21"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2021/Jan/39"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2022/Jun/36"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2017-16544
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2017-16544",
"description": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
"id": "GSD-2017-16544",
"references": [
"https://www.suse.com/security/cve/CVE-2017-16544.html",
"https://ubuntu.com/security/CVE-2017-16544",
"https://security.archlinux.org/CVE-2017-16544",
"https://packetstormsecurity.com/files/cve/CVE-2017-16544"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-16544"
],
"details": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
"id": "GSD-2017-16544",
"modified": "2023-12-13T01:21:01.138999Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-16544",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/",
"refsource": "MISC",
"url": "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/"
},
{
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html"
},
{
"name": "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8",
"refsource": "MISC",
"url": "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8"
},
{
"name": "USN-3935-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3935-1/"
},
{
"name": "20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2019/Jun/18"
},
{
"name": "20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Jun/14"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"name": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
},
{
"name": "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html"
},
{
"name": "20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router \u0026 TC Cloud Client",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2020/Mar/15"
},
{
"name": "20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2020/Aug/20"
},
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01"
},
{
"name": "20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2020/Sep/6"
},
{
"name": "20210113 SEC Consult SA-20210113-0 :: Multiple vulnerabilities in Pepperl+Fuchs IO-Link Master Series",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2021/Jan/39"
},
{
"name": "[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html"
},
{
"name": "20210819 SEC Consult SA-20210819-0 :: Multiple critical vulnerabilities in Altus Nexto and Hadron series",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2021/Aug/21"
},
{
"name": "20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2022/Jun/36"
},
{
"name": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.27.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201811401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201903001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201905001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201909001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redlion:n-tron_702-w_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:redlion:n-tron_702-w:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redlion:n-tron_702m12-w_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:redlion:n-tron_702m12-w:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-16544"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/"
},
{
"name": "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8"
},
{
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html"
},
{
"name": "USN-3935-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3935-1/"
},
{
"name": "20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"refsource": "FULLDISC",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2019/Jun/18"
},
{
"name": "20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"refsource": "BUGTRAQ",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Jun/14"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"refsource": "FULLDISC",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"refsource": "BUGTRAQ",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"name": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
},
{
"name": "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html"
},
{
"name": "20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router \u0026 TC Cloud Client",
"refsource": "FULLDISC",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Mar/15"
},
{
"name": "20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S",
"refsource": "FULLDISC",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Aug/20"
},
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01"
},
{
"name": "20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W",
"refsource": "FULLDISC",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Sep/6"
},
{
"name": "20210113 SEC Consult SA-20210113-0 :: Multiple vulnerabilities in Pepperl+Fuchs IO-Link Master Series",
"refsource": "FULLDISC",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2021/Jan/39"
},
{
"name": "[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html"
},
{
"name": "20210819 SEC Consult SA-20210819-0 :: Multiple critical vulnerabilities in Altus Nexto and Hadron series",
"refsource": "FULLDISC",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2021/Aug/21"
},
{
"name": "20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series",
"refsource": "FULLDISC",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2022/Jun/36"
},
{
"name": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-10-28T19:29Z",
"publishedDate": "2017-11-20T15:29Z"
}
}
}
ICSA-20-240-01
Vulnerability from csaf_cisa - Published: 2020-08-27 00:00 - Updated: 2020-08-27 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
N-Tron 702M12-W: All versions
Red Lion, AutomationDirect / N-Tron 702M12-W
|
vers:all/* |
Mitigation
|
|
|
N-Tron 702-W: All versions
Red Lion, AutomationDirect / N-Tron 702-W
|
vers:all/* |
Mitigation
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
N-Tron 702M12-W: All versions
Red Lion, AutomationDirect / N-Tron 702M12-W
|
vers:all/* |
Mitigation
|
|
|
N-Tron 702-W: All versions
Red Lion, AutomationDirect / N-Tron 702-W
|
vers:all/* |
Mitigation
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
N-Tron 702M12-W: All versions
Red Lion, AutomationDirect / N-Tron 702M12-W
|
vers:all/* |
Mitigation
|
|
|
N-Tron 702-W: All versions
Red Lion, AutomationDirect / N-Tron 702-W
|
vers:all/* |
Mitigation
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
N-Tron 702M12-W: All versions
Red Lion, AutomationDirect / N-Tron 702M12-W
|
vers:all/* |
Mitigation
|
|
|
N-Tron 702-W: All versions
Red Lion, AutomationDirect / N-Tron 702-W
|
vers:all/* |
Mitigation
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
N-Tron 702M12-W: All versions
Red Lion, AutomationDirect / N-Tron 702M12-W
|
vers:all/* |
Mitigation
|
|
|
N-Tron 702-W: All versions
Red Lion, AutomationDirect / N-Tron 702-W
|
vers:all/* |
Mitigation
|
| URL | Category |
|---|---|
| https://raw.githubusercontent.com/cisagov/CSAF/de… | self |
| https://www.cisa.gov/news-events/ics-advisories/i… | self |
| https://www.us-cert.gov/ncas/tips/ST04-014 | external |
| https://www.us-cert.gov/sites/default/files/recom… | external |
| https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B | external |
| http://web.nvd.nist.gov/view/vuln/detail?vulnId=C… | external |
| https://www.first.org/cvss/calculator/3.0#CVSS:3.… | external |
| http://web.nvd.nist.gov/view/vuln/detail?vulnId=C… | external |
| http://web.nvd.nist.gov/view/vuln/detail?vulnId=C… | external |
| https://www.first.org/cvss/calculator/3.0#CVSS:3.… | external |
| http://web.nvd.nist.gov/view/vuln/detail?vulnId=C… | external |
| https://www.first.org/cvss/calculator/3.0#CVSS:3.… | external |
| http://web.nvd.nist.gov/view/vuln/detail?vulnId=C… | external |
| https://www.first.org/cvss/calculator/3.0#CVSS:3.… | external |
{
"document": {
"acknowledgments": [
{
"names": [
"Thomas Weber"
],
"organization": "SEC Consult Vulnerability Lab",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access to sensitive information, execute system commands, and perform actions in the context of an attacked user.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Commercial Facilities, Energy, Transportation Systems, Water and Wastewater Systems",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target these vulnerabilities.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-20-240-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-240-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-20-240-01 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-240-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.us-cert.gov/ncas/tips/ST04-014"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Red Lion N-Tron 702-W, 702M12-W",
"tracking": {
"current_release_date": "2020-08-27T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-20-240-01",
"initial_release_date": "2020-08-27T00:00:00.000000Z",
"revision_history": [
{
"date": "2020-08-27T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-20-240-01 Red Lion N-Tron 702-W, 702M12-W"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "N-Tron 702M12-W: All versions",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "N-Tron 702M12-W"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "N-Tron 702-W: All versions",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "N-Tron 702-W"
}
],
"category": "vendor",
"name": "Red Lion, AutomationDirect"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-16210",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The affected product is vulnerable to reflected cross-site scripting, which may allow an attacker to remotely execute arbitrary code and perform actions in the context of an attacked user.CVE-2020-16210 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16210"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-16206",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data.CVE-2020-16206 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16206"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-16208",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"notes": [
{
"category": "summary",
"text": "The affected product is vulnerable to cross-site request forgery, which may allow an attacker to modify different configurations of a device by luring an authenticated user to click on a crafted link.CVE-2020-16208 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16208"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-16204",
"cwe": {
"id": "CWE-912",
"name": "Hidden Functionality"
},
"notes": [
{
"category": "summary",
"text": "The affected product is vulnerable due to an undocumented interface found on the device, which may allow an attacker to execute commands as root on the device.CVE-2020-16204 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16204"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-16544",
"cwe": {
"id": "CWE-1104",
"name": "Use of Unmaintained Third Party Components"
},
"notes": [
{
"category": "summary",
"text": "The affected product is vulnerable due to outdated software components, which may allow an attacker to gain access to sensitive information and take control of the device.CVE-2017-16544 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16544"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
}
]
}
OPENSUSE-SU-2022:0135-1
Vulnerability from csaf_opensuse - Published: 2022-01-20 09:04 - Updated: 2022-01-20 09:04| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://bugzilla.suse.com/1064976 | self |
| https://bugzilla.suse.com/1064978 | self |
| https://bugzilla.suse.com/1069412 | self |
| https://bugzilla.suse.com/1099260 | self |
| https://bugzilla.suse.com/1099263 | self |
| https://bugzilla.suse.com/1102912 | self |
| https://bugzilla.suse.com/1121426 | self |
| https://bugzilla.suse.com/1121428 | self |
| https://bugzilla.suse.com/1184522 | self |
| https://bugzilla.suse.com/1192869 | self |
| https://bugzilla.suse.com/951562 | self |
| https://bugzilla.suse.com/970662 | self |
| https://bugzilla.suse.com/970663 | self |
| https://bugzilla.suse.com/991940 | self |
| https://www.suse.com/security/cve/CVE-2011-5325/ | self |
| https://www.suse.com/security/cve/CVE-2015-9261/ | self |
| https://www.suse.com/security/cve/CVE-2016-2147/ | self |
| https://www.suse.com/security/cve/CVE-2016-2148/ | self |
| https://www.suse.com/security/cve/CVE-2016-6301/ | self |
| https://www.suse.com/security/cve/CVE-2017-15873/ | self |
| https://www.suse.com/security/cve/CVE-2017-15874/ | self |
| https://www.suse.com/security/cve/CVE-2017-16544/ | self |
| https://www.suse.com/security/cve/CVE-2018-1000500/ | self |
| https://www.suse.com/security/cve/CVE-2018-1000517/ | self |
| https://www.suse.com/security/cve/CVE-2018-20679/ | self |
| https://www.suse.com/security/cve/CVE-2019-5747/ | self |
| https://www.suse.com/security/cve/CVE-2021-28831/ | self |
| https://www.suse.com/security/cve/CVE-2021-42373/ | self |
| https://www.suse.com/security/cve/CVE-2021-42374/ | self |
| https://www.suse.com/security/cve/CVE-2021-42375/ | self |
| https://www.suse.com/security/cve/CVE-2021-42376/ | self |
| https://www.suse.com/security/cve/CVE-2021-42377/ | self |
| https://www.suse.com/security/cve/CVE-2021-42378/ | self |
| https://www.suse.com/security/cve/CVE-2021-42379/ | self |
| https://www.suse.com/security/cve/CVE-2021-42380/ | self |
| https://www.suse.com/security/cve/CVE-2021-42381/ | self |
| https://www.suse.com/security/cve/CVE-2021-42382/ | self |
| https://www.suse.com/security/cve/CVE-2021-42383/ | self |
| https://www.suse.com/security/cve/CVE-2021-42384/ | self |
| https://www.suse.com/security/cve/CVE-2021-42385/ | self |
| https://www.suse.com/security/cve/CVE-2021-42386/ | self |
| https://www.suse.com/security/cve/CVE-2011-5325 | external |
| https://bugzilla.suse.com/951562 | external |
| https://www.suse.com/security/cve/CVE-2015-9261 | external |
| https://bugzilla.suse.com/1102912 | external |
| https://www.suse.com/security/cve/CVE-2016-2147 | external |
| https://bugzilla.suse.com/970663 | external |
| https://www.suse.com/security/cve/CVE-2016-2148 | external |
| https://bugzilla.suse.com/970662 | external |
| https://www.suse.com/security/cve/CVE-2016-6301 | external |
| https://bugzilla.suse.com/991940 | external |
| https://www.suse.com/security/cve/CVE-2017-15873 | external |
| https://bugzilla.suse.com/1064976 | external |
| https://www.suse.com/security/cve/CVE-2017-15874 | external |
| https://bugzilla.suse.com/1064978 | external |
| https://www.suse.com/security/cve/CVE-2017-16544 | external |
| https://bugzilla.suse.com/1069412 | external |
| https://www.suse.com/security/cve/CVE-2018-1000500 | external |
| https://bugzilla.suse.com/1099263 | external |
| https://www.suse.com/security/cve/CVE-2018-1000517 | external |
| https://bugzilla.suse.com/1099260 | external |
| https://www.suse.com/security/cve/CVE-2018-20679 | external |
| https://bugzilla.suse.com/1121426 | external |
| https://bugzilla.suse.com/1121428 | external |
| https://www.suse.com/security/cve/CVE-2019-5747 | external |
| https://bugzilla.suse.com/1121426 | external |
| https://bugzilla.suse.com/1121428 | external |
| https://www.suse.com/security/cve/CVE-2021-28831 | external |
| https://bugzilla.suse.com/1184522 | external |
| https://www.suse.com/security/cve/CVE-2021-42373 | external |
| https://www.suse.com/security/cve/CVE-2021-42374 | external |
| https://www.suse.com/security/cve/CVE-2021-42375 | external |
| https://www.suse.com/security/cve/CVE-2021-42376 | external |
| https://www.suse.com/security/cve/CVE-2021-42377 | external |
| https://www.suse.com/security/cve/CVE-2021-42378 | external |
| https://www.suse.com/security/cve/CVE-2021-42379 | external |
| https://www.suse.com/security/cve/CVE-2021-42380 | external |
| https://www.suse.com/security/cve/CVE-2021-42381 | external |
| https://www.suse.com/security/cve/CVE-2021-42382 | external |
| https://www.suse.com/security/cve/CVE-2021-42383 | external |
| https://www.suse.com/security/cve/CVE-2021-42384 | external |
| https://www.suse.com/security/cve/CVE-2021-42385 | external |
| https://www.suse.com/security/cve/CVE-2021-42386 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for busybox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for busybox fixes the following issues:\n\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).\n- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).\n- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).\n- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).\n- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).\n- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).\n- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).\n- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).\n- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).\n- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).\n- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2022-135,openSUSE-SLE-15.3-2022-135",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0135-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:0135-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:0135-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/"
},
{
"category": "self",
"summary": "SUSE Bug 1064976",
"url": "https://bugzilla.suse.com/1064976"
},
{
"category": "self",
"summary": "SUSE Bug 1064978",
"url": "https://bugzilla.suse.com/1064978"
},
{
"category": "self",
"summary": "SUSE Bug 1069412",
"url": "https://bugzilla.suse.com/1069412"
},
{
"category": "self",
"summary": "SUSE Bug 1099260",
"url": "https://bugzilla.suse.com/1099260"
},
{
"category": "self",
"summary": "SUSE Bug 1099263",
"url": "https://bugzilla.suse.com/1099263"
},
{
"category": "self",
"summary": "SUSE Bug 1102912",
"url": "https://bugzilla.suse.com/1102912"
},
{
"category": "self",
"summary": "SUSE Bug 1121426",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "self",
"summary": "SUSE Bug 1121428",
"url": "https://bugzilla.suse.com/1121428"
},
{
"category": "self",
"summary": "SUSE Bug 1184522",
"url": "https://bugzilla.suse.com/1184522"
},
{
"category": "self",
"summary": "SUSE Bug 1192869",
"url": "https://bugzilla.suse.com/1192869"
},
{
"category": "self",
"summary": "SUSE Bug 951562",
"url": "https://bugzilla.suse.com/951562"
},
{
"category": "self",
"summary": "SUSE Bug 970662",
"url": "https://bugzilla.suse.com/970662"
},
{
"category": "self",
"summary": "SUSE Bug 970663",
"url": "https://bugzilla.suse.com/970663"
},
{
"category": "self",
"summary": "SUSE Bug 991940",
"url": "https://bugzilla.suse.com/991940"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-5325 page",
"url": "https://www.suse.com/security/cve/CVE-2011-5325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-9261 page",
"url": "https://www.suse.com/security/cve/CVE-2015-9261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2147 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2148 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6301 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15873 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15874 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16544 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000500 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000517 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20679 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5747 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28831 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42373 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42374 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42376 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42376/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42377 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42380 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42381 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42382 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42383 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42384 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42385 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42386 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42386/"
}
],
"title": "Security update for busybox",
"tracking": {
"current_release_date": "2022-01-20T09:04:27Z",
"generator": {
"date": "2022-01-20T09:04:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:0135-1",
"initial_release_date": "2022-01-20T09:04:27Z",
"revision_history": [
{
"date": "2022-01-20T09:04:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.aarch64",
"product": {
"name": "busybox-1.34.1-4.9.1.aarch64",
"product_id": "busybox-1.34.1-4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.aarch64",
"product": {
"name": "busybox-static-1.34.1-4.9.1.aarch64",
"product_id": "busybox-static-1.34.1-4.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"product": {
"name": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"product_id": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch"
}
},
{
"category": "product_version",
"name": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"product": {
"name": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"product_id": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch"
}
},
{
"category": "product_version",
"name": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"product": {
"name": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"product_id": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.ppc64le",
"product": {
"name": "busybox-1.34.1-4.9.1.ppc64le",
"product_id": "busybox-1.34.1-4.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.ppc64le",
"product": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le",
"product_id": "busybox-static-1.34.1-4.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.s390x",
"product": {
"name": "busybox-1.34.1-4.9.1.s390x",
"product_id": "busybox-1.34.1-4.9.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.s390x",
"product": {
"name": "busybox-static-1.34.1-4.9.1.s390x",
"product_id": "busybox-static-1.34.1-4.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"product_id": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"product": {
"name": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"product_id": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"product": {
"name": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"product_id": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.x86_64",
"product": {
"name": "busybox-1.34.1-4.9.1.x86_64",
"product_id": "busybox-1.34.1-4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.x86_64",
"product": {
"name": "busybox-static-1.34.1-4.9.1.x86_64",
"product_id": "busybox-static-1.34.1-4.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch"
},
"product_reference": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch"
},
"product_reference": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch"
},
"product_reference": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64"
},
"product_reference": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64"
},
"product_reference": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-static-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-static-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch"
},
"product_reference": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch"
},
"product_reference": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch"
},
"product_reference": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64"
},
"product_reference": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64"
},
"product_reference": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-static-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-static-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-5325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-5325"
}
],
"notes": [
{
"category": "general",
"text": "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-5325",
"url": "https://www.suse.com/security/cve/CVE-2011-5325"
},
{
"category": "external",
"summary": "SUSE Bug 951562 for CVE-2011-5325",
"url": "https://bugzilla.suse.com/951562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2011-5325"
},
{
"cve": "CVE-2015-9261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-9261"
}
],
"notes": [
{
"category": "general",
"text": "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-9261",
"url": "https://www.suse.com/security/cve/CVE-2015-9261"
},
{
"category": "external",
"summary": "SUSE Bug 1102912 for CVE-2015-9261",
"url": "https://bugzilla.suse.com/1102912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2015-9261"
},
{
"cve": "CVE-2016-2147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2147"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2147",
"url": "https://www.suse.com/security/cve/CVE-2016-2147"
},
{
"category": "external",
"summary": "SUSE Bug 970663 for CVE-2016-2147",
"url": "https://bugzilla.suse.com/970663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "important"
}
],
"title": "CVE-2016-2147"
},
{
"cve": "CVE-2016-2148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2148"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2148",
"url": "https://www.suse.com/security/cve/CVE-2016-2148"
},
{
"category": "external",
"summary": "SUSE Bug 970662 for CVE-2016-2148",
"url": "https://bugzilla.suse.com/970662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2016-2148"
},
{
"cve": "CVE-2016-6301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6301"
}
],
"notes": [
{
"category": "general",
"text": "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6301",
"url": "https://www.suse.com/security/cve/CVE-2016-6301"
},
{
"category": "external",
"summary": "SUSE Bug 991940 for CVE-2016-6301",
"url": "https://bugzilla.suse.com/991940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2016-6301"
},
{
"cve": "CVE-2017-15873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15873"
}
],
"notes": [
{
"category": "general",
"text": "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15873",
"url": "https://www.suse.com/security/cve/CVE-2017-15873"
},
{
"category": "external",
"summary": "SUSE Bug 1064976 for CVE-2017-15873",
"url": "https://bugzilla.suse.com/1064976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2017-15873"
},
{
"cve": "CVE-2017-15874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15874"
}
],
"notes": [
{
"category": "general",
"text": "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15874",
"url": "https://www.suse.com/security/cve/CVE-2017-15874"
},
{
"category": "external",
"summary": "SUSE Bug 1064978 for CVE-2017-15874",
"url": "https://bugzilla.suse.com/1064978"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "low"
}
],
"title": "CVE-2017-15874"
},
{
"cve": "CVE-2017-16544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16544"
}
],
"notes": [
{
"category": "general",
"text": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16544",
"url": "https://www.suse.com/security/cve/CVE-2017-16544"
},
{
"category": "external",
"summary": "SUSE Bug 1069412 for CVE-2017-16544",
"url": "https://bugzilla.suse.com/1069412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "important"
}
],
"title": "CVE-2017-16544"
},
{
"cve": "CVE-2018-1000500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000500"
}
],
"notes": [
{
"category": "general",
"text": "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000500",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500"
},
{
"category": "external",
"summary": "SUSE Bug 1099263 for CVE-2018-1000500",
"url": "https://bugzilla.suse.com/1099263"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "important"
}
],
"title": "CVE-2018-1000500"
},
{
"cve": "CVE-2018-1000517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000517"
}
],
"notes": [
{
"category": "general",
"text": "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000517",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517"
},
{
"category": "external",
"summary": "SUSE Bug 1099260 for CVE-2018-1000517",
"url": "https://bugzilla.suse.com/1099260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "important"
}
],
"title": "CVE-2018-1000517"
},
{
"cve": "CVE-2018-20679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20679"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20679",
"url": "https://www.suse.com/security/cve/CVE-2018-20679"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2018-20679"
},
{
"cve": "CVE-2019-5747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5747"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5747",
"url": "https://www.suse.com/security/cve/CVE-2019-5747"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "low"
}
],
"title": "CVE-2019-5747"
},
{
"cve": "CVE-2021-28831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28831"
}
],
"notes": [
{
"category": "general",
"text": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28831",
"url": "https://www.suse.com/security/cve/CVE-2021-28831"
},
{
"category": "external",
"summary": "SUSE Bug 1184522 for CVE-2021-28831",
"url": "https://bugzilla.suse.com/1184522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "important"
}
],
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-42373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42373"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42373",
"url": "https://www.suse.com/security/cve/CVE-2021-42373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42374"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42374",
"url": "https://www.suse.com/security/cve/CVE-2021-42374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42375"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42375",
"url": "https://www.suse.com/security/cve/CVE-2021-42375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42376"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42376",
"url": "https://www.suse.com/security/cve/CVE-2021-42376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42377"
}
],
"notes": [
{
"category": "general",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42377",
"url": "https://www.suse.com/security/cve/CVE-2021-42377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42378"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42378",
"url": "https://www.suse.com/security/cve/CVE-2021-42378"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42379"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42379",
"url": "https://www.suse.com/security/cve/CVE-2021-42379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42380"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42380",
"url": "https://www.suse.com/security/cve/CVE-2021-42380"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42381"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42381",
"url": "https://www.suse.com/security/cve/CVE-2021-42381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42382"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42382",
"url": "https://www.suse.com/security/cve/CVE-2021-42382"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42383"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42383",
"url": "https://www.suse.com/security/cve/CVE-2021-42383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42384"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42384",
"url": "https://www.suse.com/security/cve/CVE-2021-42384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42385"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42385",
"url": "https://www.suse.com/security/cve/CVE-2021-42385"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42386"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42386",
"url": "https://www.suse.com/security/cve/CVE-2021-42386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42386"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.