Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-53238 (GCVE-0-2024-53238)
Vulnerability from cvelistv5 – Published: 2024-12-27 13:50 – Updated: 2026-05-11 20:53- CWE-476 - NULL Pointer Dereference
| Vendor | Product | Version | |
|---|---|---|---|
| Linux | Linux |
Affected:
ceac1cb0259de682d78f5c784ef8e0b13022e9d9 , < d8bd79f0eea9c07d90ce870a714ab5c10afaa4b3
(git)
Affected: ceac1cb0259de682d78f5c784ef8e0b13022e9d9 , < 1219c211ccd061cde002cc5708692efca515a7a0 (git) Affected: ceac1cb0259de682d78f5c784ef8e0b13022e9d9 , < 61c5a3def90ac729a538e5ca5ff7f461cff72776 (git) |
|
| Linux | Linux |
Affected:
6.11
Unaffected: 0 , < 6.11 (semver) Unaffected: 6.11.11 , ≤ 6.11.* (semver) Unaffected: 6.12.2 , ≤ 6.12.* (semver) Unaffected: 6.13 , ≤ * (original_commit_for_fix) |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-53238",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-01T20:02:56.016492Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-476",
"description": "CWE-476 NULL Pointer Dereference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-01T20:07:17.881Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/bluetooth/btmtk.c",
"drivers/bluetooth/btusb.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "d8bd79f0eea9c07d90ce870a714ab5c10afaa4b3",
"status": "affected",
"version": "ceac1cb0259de682d78f5c784ef8e0b13022e9d9",
"versionType": "git"
},
{
"lessThan": "1219c211ccd061cde002cc5708692efca515a7a0",
"status": "affected",
"version": "ceac1cb0259de682d78f5c784ef8e0b13022e9d9",
"versionType": "git"
},
{
"lessThan": "61c5a3def90ac729a538e5ca5ff7f461cff72776",
"status": "affected",
"version": "ceac1cb0259de682d78f5c784ef8e0b13022e9d9",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/bluetooth/btmtk.c",
"drivers/bluetooth/btusb.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.11"
},
{
"lessThan": "6.11",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.11.*",
"status": "unaffected",
"version": "6.11.11",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.13",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.11.11",
"versionStartIncluding": "6.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.2",
"versionStartIncluding": "6.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.13",
"versionStartIncluding": "6.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btmtk: adjust the position to init iso data anchor\n\nMediaTek iso data anchor init should be moved to where MediaTek\nclaims iso data interface.\nIf there is an unexpected BT usb disconnect during setup flow,\nit will cause a NULL pointer crash issue when releasing iso\nanchor since the anchor wasn\u0027t been init yet. Adjust the position\nto do iso data anchor init.\n\n[ 17.137991] pc : usb_kill_anchored_urbs+0x60/0x168\n[ 17.137998] lr : usb_kill_anchored_urbs+0x44/0x168\n[ 17.137999] sp : ffffffc0890cb5f0\n[ 17.138000] x29: ffffffc0890cb5f0 x28: ffffff80bb6c2e80\n[ 17.144081] gpio gpiochip0: registered chardev handle for 1 lines\n[ 17.148421] x27: 0000000000000000\n[ 17.148422] x26: ffffffd301ff4298 x25: 0000000000000003 x24: 00000000000000f0\n[ 17.148424] x23: 0000000000000000 x22: 00000000ffffffff x21: 0000000000000001\n[ 17.148425] x20: ffffffffffffffd8 x19: ffffff80c0f25560 x18: 0000000000000000\n[ 17.148427] x17: ffffffd33864e408 x16: ffffffd33808f7c8 x15: 0000000000200000\n[ 17.232789] x14: e0cd73cf80ffffff x13: 50f2137c0a0338c9 x12: 0000000000000001\n[ 17.239912] x11: 0000000080150011 x10: 0000000000000002 x9 : 0000000000000001\n[ 17.247035] x8 : 0000000000000000 x7 : 0000000000008080 x6 : 8080000000000000\n[ 17.254158] x5 : ffffffd33808ebc0 x4 : fffffffe033dcf20 x3 : 0000000080150011\n[ 17.261281] x2 : ffffff8087a91400 x1 : 0000000000000000 x0 : ffffff80c0f25588\n[ 17.268404] Call trace:\n[ 17.270841] usb_kill_anchored_urbs+0x60/0x168\n[ 17.275274] btusb_mtk_release_iso_intf+0x2c/0xd8 [btusb (HASH:5afe 6)]\n[ 17.284226] btusb_mtk_disconnect+0x14/0x28 [btusb (HASH:5afe 6)]\n[ 17.292652] btusb_disconnect+0x70/0x140 [btusb (HASH:5afe 6)]\n[ 17.300818] usb_unbind_interface+0xc4/0x240\n[ 17.305079] device_release_driver_internal+0x18c/0x258\n[ 17.310296] device_release_driver+0x1c/0x30\n[ 17.314557] bus_remove_device+0x140/0x160\n[ 17.318643] device_del+0x1c0/0x330\n[ 17.322121] usb_disable_device+0x80/0x180\n[ 17.326207] usb_disconnect+0xec/0x300\n[ 17.329948] hub_quiesce+0x80/0xd0\n[ 17.333339] hub_disconnect+0x44/0x190\n[ 17.337078] usb_unbind_interface+0xc4/0x240\n[ 17.341337] device_release_driver_internal+0x18c/0x258\n[ 17.346551] device_release_driver+0x1c/0x30\n[ 17.350810] usb_driver_release_interface+0x70/0x88\n[ 17.355677] proc_ioctl+0x13c/0x228\n[ 17.359157] proc_ioctl_default+0x50/0x80\n[ 17.363155] usbdev_ioctl+0x830/0xd08\n[ 17.366808] __arm64_sys_ioctl+0x94/0xd0\n[ 17.370723] invoke_syscall+0x6c/0xf8\n[ 17.374377] el0_svc_common+0x84/0xe0\n[ 17.378030] do_el0_svc+0x20/0x30\n[ 17.381334] el0_svc+0x34/0x60\n[ 17.384382] el0t_64_sync_handler+0x88/0xf0\n[ 17.388554] el0t_64_sync+0x180/0x188\n[ 17.392208] Code: f9400677 f100a2f4 54fffea0 d503201f (b8350288)\n[ 17.398289] ---[ end trace 0000000000000000 ]---"
}
],
"providerMetadata": {
"dateUpdated": "2026-05-11T20:53:31.668Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/d8bd79f0eea9c07d90ce870a714ab5c10afaa4b3"
},
{
"url": "https://git.kernel.org/stable/c/1219c211ccd061cde002cc5708692efca515a7a0"
},
{
"url": "https://git.kernel.org/stable/c/61c5a3def90ac729a538e5ca5ff7f461cff72776"
}
],
"title": "Bluetooth: btmtk: adjust the position to init iso data anchor",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2024-53238",
"datePublished": "2024-12-27T13:50:24.113Z",
"dateReserved": "2024-11-19T17:17:25.026Z",
"dateUpdated": "2026-05-11T20:53:31.668Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-53238",
"date": "2026-05-19",
"epss": "0.00029",
"percentile": "0.08435"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.11\", \"versionEndExcluding\": \"6.11.11\", \"matchCriteriaId\": \"07BE5DA1-4C04-4052-9B58-6EDE15469D65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.12\", \"versionEndExcluding\": \"6.12.2\", \"matchCriteriaId\": \"D8882B1B-2ABC-4838-AC1D-DBDBB5764776\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nBluetooth: btmtk: adjust the position to init iso data anchor\\n\\nMediaTek iso data anchor init should be moved to where MediaTek\\nclaims iso data interface.\\nIf there is an unexpected BT usb disconnect during setup flow,\\nit will cause a NULL pointer crash issue when releasing iso\\nanchor since the anchor wasn\u0027t been init yet. Adjust the position\\nto do iso data anchor init.\\n\\n[ 17.137991] pc : usb_kill_anchored_urbs+0x60/0x168\\n[ 17.137998] lr : usb_kill_anchored_urbs+0x44/0x168\\n[ 17.137999] sp : ffffffc0890cb5f0\\n[ 17.138000] x29: ffffffc0890cb5f0 x28: ffffff80bb6c2e80\\n[ 17.144081] gpio gpiochip0: registered chardev handle for 1 lines\\n[ 17.148421] x27: 0000000000000000\\n[ 17.148422] x26: ffffffd301ff4298 x25: 0000000000000003 x24: 00000000000000f0\\n[ 17.148424] x23: 0000000000000000 x22: 00000000ffffffff x21: 0000000000000001\\n[ 17.148425] x20: ffffffffffffffd8 x19: ffffff80c0f25560 x18: 0000000000000000\\n[ 17.148427] x17: ffffffd33864e408 x16: ffffffd33808f7c8 x15: 0000000000200000\\n[ 17.232789] x14: e0cd73cf80ffffff x13: 50f2137c0a0338c9 x12: 0000000000000001\\n[ 17.239912] x11: 0000000080150011 x10: 0000000000000002 x9 : 0000000000000001\\n[ 17.247035] x8 : 0000000000000000 x7 : 0000000000008080 x6 : 8080000000000000\\n[ 17.254158] x5 : ffffffd33808ebc0 x4 : fffffffe033dcf20 x3 : 0000000080150011\\n[ 17.261281] x2 : ffffff8087a91400 x1 : 0000000000000000 x0 : ffffff80c0f25588\\n[ 17.268404] Call trace:\\n[ 17.270841] usb_kill_anchored_urbs+0x60/0x168\\n[ 17.275274] btusb_mtk_release_iso_intf+0x2c/0xd8 [btusb (HASH:5afe 6)]\\n[ 17.284226] btusb_mtk_disconnect+0x14/0x28 [btusb (HASH:5afe 6)]\\n[ 17.292652] btusb_disconnect+0x70/0x140 [btusb (HASH:5afe 6)]\\n[ 17.300818] usb_unbind_interface+0xc4/0x240\\n[ 17.305079] device_release_driver_internal+0x18c/0x258\\n[ 17.310296] device_release_driver+0x1c/0x30\\n[ 17.314557] bus_remove_device+0x140/0x160\\n[ 17.318643] device_del+0x1c0/0x330\\n[ 17.322121] usb_disable_device+0x80/0x180\\n[ 17.326207] usb_disconnect+0xec/0x300\\n[ 17.329948] hub_quiesce+0x80/0xd0\\n[ 17.333339] hub_disconnect+0x44/0x190\\n[ 17.337078] usb_unbind_interface+0xc4/0x240\\n[ 17.341337] device_release_driver_internal+0x18c/0x258\\n[ 17.346551] device_release_driver+0x1c/0x30\\n[ 17.350810] usb_driver_release_interface+0x70/0x88\\n[ 17.355677] proc_ioctl+0x13c/0x228\\n[ 17.359157] proc_ioctl_default+0x50/0x80\\n[ 17.363155] usbdev_ioctl+0x830/0xd08\\n[ 17.366808] __arm64_sys_ioctl+0x94/0xd0\\n[ 17.370723] invoke_syscall+0x6c/0xf8\\n[ 17.374377] el0_svc_common+0x84/0xe0\\n[ 17.378030] do_el0_svc+0x20/0x30\\n[ 17.381334] el0_svc+0x34/0x60\\n[ 17.384382] el0t_64_sync_handler+0x88/0xf0\\n[ 17.388554] el0t_64_sync+0x180/0x188\\n[ 17.392208] Code: f9400677 f100a2f4 54fffea0 d503201f (b8350288)\\n[ 17.398289] ---[ end trace 0000000000000000 ]---\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: btmtk: ajuste la posici\\u00f3n para inicializar el ancla de datos iso. La inicializaci\\u00f3n del ancla de datos iso de MediaTek debe moverse a donde MediaTek afirma que tiene interfaz de datos iso. Si hay una desconexi\\u00f3n USB de BT inesperada durante el flujo de configuraci\\u00f3n, provocar\\u00e1 un problema de bloqueo del puntero NULL al liberar el ancla iso, ya que el ancla a\\u00fan no se hab\\u00eda inicializado. Ajuste la posici\\u00f3n para inicializar el ancla de datos iso. [ 17.137991] pc : usb_kill_anchored_urbs+0x60/0x168 [ 17.137998] lr : usb_kill_anchored_urbs+0x44/0x168 [ 17.137999] sp : ffffffc0890cb5f0 [ 17.138000] x29: ffffffc0890cb5f0 x28: ffffff80bb6c2e80 [ 17.144081] gpio gpiochip0: identificador chardev registrado para 1 l\\u00edneas [ 17.148421] x27: 0000000000000000 [ 17.148422] x26: ffffffd301ff4298 x25: 00000000000000003 x24: 00000000000000f0 [ 17.148424] x23: 0000000000000000 x22: 00000000ffffffff x21: 0000000000000001 [ 17.148425] x20: ffffffffffffffd8 x19: ffffff80c0f25560 x18: 0000000000000000 [ 17.148427] x17: ffffffd33864e408 x16: ffffffd33808f7c8 x15: 0000000000200000 [ 17.232789] x14: e0cd73cf80ffffff x13: 50f2137c0a0338c9 x12: 0000000000000001 [ 17.239912] x11: 0000000080150011 x10: 0000000000000002 x9: 0000000000000001 [ 17.247035] x8: 0000000000000000 x7: 0000000000008080 x6: 8080000000000000 [ 17.254158] x5: ffffffd33808ebc0 x4 : fffffffe033dcf20 x3 : 0000000080150011 [ 17.261281] x2 : ffffff8087a91400 x1 : 0000000000000000 x0 : ffffff80c0f25588 [ 17.268404] Rastreo de llamadas: [ 17.270841] usb_kill_anchored_urbs+0x60/0x168 [ 17.275274] btusb_mtk_release_iso_intf+0x2c/0xd8 [btusb (HASH:5afe 6)] [ 17.284226] btusb_mtk_disconnect+0x14/0x28 [btusb (HASH:5afe 6)] [ 17.292652] btusb_disconnect+0x70/0x140 [btusb (HASH:5afe 6)] [ 17.300818] interfaz_desvinculaci\\u00f3n_usb+0xc4/0x240 [ 17.305079] controlador_liberaci\\u00f3n_dispositivo_interno+0x18c/0x258 [ 17.310296] controlador_liberaci\\u00f3n_dispositivo+0x1c/0x30 [ 17.314557] dispositivo_eliminaci\\u00f3n_bus+0x140/0x160 [ 17.318643] dispositivo_del+0x1c0/0x330 [ 17.322121] usb_disable_device+0x80/0x180 [ 17.326207] usb_disconnect+0xec/0x300 [ 17.329948] hub_quiesce+0x80/0xd0 [ 17.333339] hub_disconnect+0x44/0x190 [ 17.337078] usb_unbind_interface+0xc4/0x240 [ 17.341337] device_release_driver_internal+0x18c/0x258 [ 17.346551] device_release_driver+0x1c/0x30 [ 17.350810] usb_driver_release_interface+0x70/0x88 [ 17.355677] El0_svc_common+0x84/0xe0 [ 17.378030] El0_svc+0x20/0x30 [ 17.381334] El0_svc+0x34/0x60 [ 17.384382] el0t_64_sync_handler+0x88/0xf0 [ 17.388554] el0t_64_sync+0x180/0x188 [ 17.392208] C\\u00f3digo: f9400677 f100a2f4 54fffea0 d503201f (b8350288) [ 17.398289] ---[ fin de seguimiento 0000000000000000 ]---\"}]",
"id": "CVE-2024-53238",
"lastModified": "2025-01-08T16:41:35.353",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2024-12-27T14:15:32.253",
"references": "[{\"url\": \"https://git.kernel.org/stable/c/1219c211ccd061cde002cc5708692efca515a7a0\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/61c5a3def90ac729a538e5ca5ff7f461cff72776\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/d8bd79f0eea9c07d90ce870a714ab5c10afaa4b3\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}]",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-476\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-53238\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-12-27T14:15:32.253\",\"lastModified\":\"2025-10-01T20:17:23.563\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nBluetooth: btmtk: adjust the position to init iso data anchor\\n\\nMediaTek iso data anchor init should be moved to where MediaTek\\nclaims iso data interface.\\nIf there is an unexpected BT usb disconnect during setup flow,\\nit will cause a NULL pointer crash issue when releasing iso\\nanchor since the anchor wasn\u0027t been init yet. Adjust the position\\nto do iso data anchor init.\\n\\n[ 17.137991] pc : usb_kill_anchored_urbs+0x60/0x168\\n[ 17.137998] lr : usb_kill_anchored_urbs+0x44/0x168\\n[ 17.137999] sp : ffffffc0890cb5f0\\n[ 17.138000] x29: ffffffc0890cb5f0 x28: ffffff80bb6c2e80\\n[ 17.144081] gpio gpiochip0: registered chardev handle for 1 lines\\n[ 17.148421] x27: 0000000000000000\\n[ 17.148422] x26: ffffffd301ff4298 x25: 0000000000000003 x24: 00000000000000f0\\n[ 17.148424] x23: 0000000000000000 x22: 00000000ffffffff x21: 0000000000000001\\n[ 17.148425] x20: ffffffffffffffd8 x19: ffffff80c0f25560 x18: 0000000000000000\\n[ 17.148427] x17: ffffffd33864e408 x16: ffffffd33808f7c8 x15: 0000000000200000\\n[ 17.232789] x14: e0cd73cf80ffffff x13: 50f2137c0a0338c9 x12: 0000000000000001\\n[ 17.239912] x11: 0000000080150011 x10: 0000000000000002 x9 : 0000000000000001\\n[ 17.247035] x8 : 0000000000000000 x7 : 0000000000008080 x6 : 8080000000000000\\n[ 17.254158] x5 : ffffffd33808ebc0 x4 : fffffffe033dcf20 x3 : 0000000080150011\\n[ 17.261281] x2 : ffffff8087a91400 x1 : 0000000000000000 x0 : ffffff80c0f25588\\n[ 17.268404] Call trace:\\n[ 17.270841] usb_kill_anchored_urbs+0x60/0x168\\n[ 17.275274] btusb_mtk_release_iso_intf+0x2c/0xd8 [btusb (HASH:5afe 6)]\\n[ 17.284226] btusb_mtk_disconnect+0x14/0x28 [btusb (HASH:5afe 6)]\\n[ 17.292652] btusb_disconnect+0x70/0x140 [btusb (HASH:5afe 6)]\\n[ 17.300818] usb_unbind_interface+0xc4/0x240\\n[ 17.305079] device_release_driver_internal+0x18c/0x258\\n[ 17.310296] device_release_driver+0x1c/0x30\\n[ 17.314557] bus_remove_device+0x140/0x160\\n[ 17.318643] device_del+0x1c0/0x330\\n[ 17.322121] usb_disable_device+0x80/0x180\\n[ 17.326207] usb_disconnect+0xec/0x300\\n[ 17.329948] hub_quiesce+0x80/0xd0\\n[ 17.333339] hub_disconnect+0x44/0x190\\n[ 17.337078] usb_unbind_interface+0xc4/0x240\\n[ 17.341337] device_release_driver_internal+0x18c/0x258\\n[ 17.346551] device_release_driver+0x1c/0x30\\n[ 17.350810] usb_driver_release_interface+0x70/0x88\\n[ 17.355677] proc_ioctl+0x13c/0x228\\n[ 17.359157] proc_ioctl_default+0x50/0x80\\n[ 17.363155] usbdev_ioctl+0x830/0xd08\\n[ 17.366808] __arm64_sys_ioctl+0x94/0xd0\\n[ 17.370723] invoke_syscall+0x6c/0xf8\\n[ 17.374377] el0_svc_common+0x84/0xe0\\n[ 17.378030] do_el0_svc+0x20/0x30\\n[ 17.381334] el0_svc+0x34/0x60\\n[ 17.384382] el0t_64_sync_handler+0x88/0xf0\\n[ 17.388554] el0t_64_sync+0x180/0x188\\n[ 17.392208] Code: f9400677 f100a2f4 54fffea0 d503201f (b8350288)\\n[ 17.398289] ---[ end trace 0000000000000000 ]---\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: btmtk: ajuste la posici\u00f3n para inicializar el ancla de datos iso. La inicializaci\u00f3n del ancla de datos iso de MediaTek debe moverse a donde MediaTek afirma que tiene interfaz de datos iso. Si hay una desconexi\u00f3n USB de BT inesperada durante el flujo de configuraci\u00f3n, provocar\u00e1 un problema de bloqueo del puntero NULL al liberar el ancla iso, ya que el ancla a\u00fan no se hab\u00eda inicializado. Ajuste la posici\u00f3n para inicializar el ancla de datos iso. [ 17.137991] pc : usb_kill_anchored_urbs+0x60/0x168 [ 17.137998] lr : usb_kill_anchored_urbs+0x44/0x168 [ 17.137999] sp : ffffffc0890cb5f0 [ 17.138000] x29: ffffffc0890cb5f0 x28: ffffff80bb6c2e80 [ 17.144081] gpio gpiochip0: identificador chardev registrado para 1 l\u00edneas [ 17.148421] x27: 0000000000000000 [ 17.148422] x26: ffffffd301ff4298 x25: 00000000000000003 x24: 00000000000000f0 [ 17.148424] x23: 0000000000000000 x22: 00000000ffffffff x21: 0000000000000001 [ 17.148425] x20: ffffffffffffffd8 x19: ffffff80c0f25560 x18: 0000000000000000 [ 17.148427] x17: ffffffd33864e408 x16: ffffffd33808f7c8 x15: 0000000000200000 [ 17.232789] x14: e0cd73cf80ffffff x13: 50f2137c0a0338c9 x12: 0000000000000001 [ 17.239912] x11: 0000000080150011 x10: 0000000000000002 x9: 0000000000000001 [ 17.247035] x8: 0000000000000000 x7: 0000000000008080 x6: 8080000000000000 [ 17.254158] x5: ffffffd33808ebc0 x4 : fffffffe033dcf20 x3 : 0000000080150011 [ 17.261281] x2 : ffffff8087a91400 x1 : 0000000000000000 x0 : ffffff80c0f25588 [ 17.268404] Rastreo de llamadas: [ 17.270841] usb_kill_anchored_urbs+0x60/0x168 [ 17.275274] btusb_mtk_release_iso_intf+0x2c/0xd8 [btusb (HASH:5afe 6)] [ 17.284226] btusb_mtk_disconnect+0x14/0x28 [btusb (HASH:5afe 6)] [ 17.292652] btusb_disconnect+0x70/0x140 [btusb (HASH:5afe 6)] [ 17.300818] interfaz_desvinculaci\u00f3n_usb+0xc4/0x240 [ 17.305079] controlador_liberaci\u00f3n_dispositivo_interno+0x18c/0x258 [ 17.310296] controlador_liberaci\u00f3n_dispositivo+0x1c/0x30 [ 17.314557] dispositivo_eliminaci\u00f3n_bus+0x140/0x160 [ 17.318643] dispositivo_del+0x1c0/0x330 [ 17.322121] usb_disable_device+0x80/0x180 [ 17.326207] usb_disconnect+0xec/0x300 [ 17.329948] hub_quiesce+0x80/0xd0 [ 17.333339] hub_disconnect+0x44/0x190 [ 17.337078] usb_unbind_interface+0xc4/0x240 [ 17.341337] device_release_driver_internal+0x18c/0x258 [ 17.346551] device_release_driver+0x1c/0x30 [ 17.350810] usb_driver_release_interface+0x70/0x88 [ 17.355677] El0_svc_common+0x84/0xe0 [ 17.378030] El0_svc+0x20/0x30 [ 17.381334] El0_svc+0x34/0x60 [ 17.384382] el0t_64_sync_handler+0x88/0xf0 [ 17.388554] el0t_64_sync+0x180/0x188 [ 17.392208] C\u00f3digo: f9400677 f100a2f4 54fffea0 d503201f (b8350288) [ 17.398289] ---[ fin de seguimiento 0000000000000000 ]---\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.11\",\"matchCriteriaId\":\"07BE5DA1-4C04-4052-9B58-6EDE15469D65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.12\",\"versionEndExcluding\":\"6.12.2\",\"matchCriteriaId\":\"D8882B1B-2ABC-4838-AC1D-DBDBB5764776\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1219c211ccd061cde002cc5708692efca515a7a0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/61c5a3def90ac729a538e5ca5ff7f461cff72776\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d8bd79f0eea9c07d90ce870a714ab5c10afaa4b3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-53238\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-01T20:02:56.016492Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-476\", \"description\": \"CWE-476 NULL Pointer Dereference\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-01T15:40:02.103Z\"}}], \"cna\": {\"title\": \"Bluetooth: btmtk: adjust the position to init iso data anchor\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"ceac1cb0259de682d78f5c784ef8e0b13022e9d9\", \"lessThan\": \"d8bd79f0eea9c07d90ce870a714ab5c10afaa4b3\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ceac1cb0259de682d78f5c784ef8e0b13022e9d9\", \"lessThan\": \"1219c211ccd061cde002cc5708692efca515a7a0\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ceac1cb0259de682d78f5c784ef8e0b13022e9d9\", \"lessThan\": \"61c5a3def90ac729a538e5ca5ff7f461cff72776\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/bluetooth/btmtk.c\", \"drivers/bluetooth/btusb.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.11\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.11\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.11.11\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.12.*\"}, {\"status\": \"unaffected\", \"version\": \"6.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/bluetooth/btmtk.c\", \"drivers/bluetooth/btusb.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/d8bd79f0eea9c07d90ce870a714ab5c10afaa4b3\"}, {\"url\": \"https://git.kernel.org/stable/c/1219c211ccd061cde002cc5708692efca515a7a0\"}, {\"url\": \"https://git.kernel.org/stable/c/61c5a3def90ac729a538e5ca5ff7f461cff72776\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nBluetooth: btmtk: adjust the position to init iso data anchor\\n\\nMediaTek iso data anchor init should be moved to where MediaTek\\nclaims iso data interface.\\nIf there is an unexpected BT usb disconnect during setup flow,\\nit will cause a NULL pointer crash issue when releasing iso\\nanchor since the anchor wasn\u0027t been init yet. Adjust the position\\nto do iso data anchor init.\\n\\n[ 17.137991] pc : usb_kill_anchored_urbs+0x60/0x168\\n[ 17.137998] lr : usb_kill_anchored_urbs+0x44/0x168\\n[ 17.137999] sp : ffffffc0890cb5f0\\n[ 17.138000] x29: ffffffc0890cb5f0 x28: ffffff80bb6c2e80\\n[ 17.144081] gpio gpiochip0: registered chardev handle for 1 lines\\n[ 17.148421] x27: 0000000000000000\\n[ 17.148422] x26: ffffffd301ff4298 x25: 0000000000000003 x24: 00000000000000f0\\n[ 17.148424] x23: 0000000000000000 x22: 00000000ffffffff x21: 0000000000000001\\n[ 17.148425] x20: ffffffffffffffd8 x19: ffffff80c0f25560 x18: 0000000000000000\\n[ 17.148427] x17: ffffffd33864e408 x16: ffffffd33808f7c8 x15: 0000000000200000\\n[ 17.232789] x14: e0cd73cf80ffffff x13: 50f2137c0a0338c9 x12: 0000000000000001\\n[ 17.239912] x11: 0000000080150011 x10: 0000000000000002 x9 : 0000000000000001\\n[ 17.247035] x8 : 0000000000000000 x7 : 0000000000008080 x6 : 8080000000000000\\n[ 17.254158] x5 : ffffffd33808ebc0 x4 : fffffffe033dcf20 x3 : 0000000080150011\\n[ 17.261281] x2 : ffffff8087a91400 x1 : 0000000000000000 x0 : ffffff80c0f25588\\n[ 17.268404] Call trace:\\n[ 17.270841] usb_kill_anchored_urbs+0x60/0x168\\n[ 17.275274] btusb_mtk_release_iso_intf+0x2c/0xd8 [btusb (HASH:5afe 6)]\\n[ 17.284226] btusb_mtk_disconnect+0x14/0x28 [btusb (HASH:5afe 6)]\\n[ 17.292652] btusb_disconnect+0x70/0x140 [btusb (HASH:5afe 6)]\\n[ 17.300818] usb_unbind_interface+0xc4/0x240\\n[ 17.305079] device_release_driver_internal+0x18c/0x258\\n[ 17.310296] device_release_driver+0x1c/0x30\\n[ 17.314557] bus_remove_device+0x140/0x160\\n[ 17.318643] device_del+0x1c0/0x330\\n[ 17.322121] usb_disable_device+0x80/0x180\\n[ 17.326207] usb_disconnect+0xec/0x300\\n[ 17.329948] hub_quiesce+0x80/0xd0\\n[ 17.333339] hub_disconnect+0x44/0x190\\n[ 17.337078] usb_unbind_interface+0xc4/0x240\\n[ 17.341337] device_release_driver_internal+0x18c/0x258\\n[ 17.346551] device_release_driver+0x1c/0x30\\n[ 17.350810] usb_driver_release_interface+0x70/0x88\\n[ 17.355677] proc_ioctl+0x13c/0x228\\n[ 17.359157] proc_ioctl_default+0x50/0x80\\n[ 17.363155] usbdev_ioctl+0x830/0xd08\\n[ 17.366808] __arm64_sys_ioctl+0x94/0xd0\\n[ 17.370723] invoke_syscall+0x6c/0xf8\\n[ 17.374377] el0_svc_common+0x84/0xe0\\n[ 17.378030] do_el0_svc+0x20/0x30\\n[ 17.381334] el0_svc+0x34/0x60\\n[ 17.384382] el0t_64_sync_handler+0x88/0xf0\\n[ 17.388554] el0t_64_sync+0x180/0x188\\n[ 17.392208] Code: f9400677 f100a2f4 54fffea0 d503201f (b8350288)\\n[ 17.398289] ---[ end trace 0000000000000000 ]---\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11.11\", \"versionStartIncluding\": \"6.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.12.2\", \"versionStartIncluding\": \"6.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.13\", \"versionStartIncluding\": \"6.11\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:56:44.293Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-53238\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-01T20:07:17.881Z\", \"dateReserved\": \"2024-11-19T17:17:25.026Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-12-27T13:50:24.113Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2025-AVI-0069
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-47748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47748"
},
{
"name": "CVE-2024-49863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49863"
},
{
"name": "CVE-2024-49907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49907"
},
{
"name": "CVE-2024-46849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46849"
},
{
"name": "CVE-2024-47697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47697"
},
{
"name": "CVE-2024-41016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41016"
},
{
"name": "CVE-2024-49890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49890"
},
{
"name": "CVE-2024-49903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49903"
},
{
"name": "CVE-2024-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49969"
},
{
"name": "CVE-2023-52904",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52904"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2023-52621",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52621"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-35951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35951"
},
{
"name": "CVE-2024-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49967"
},
{
"name": "CVE-2024-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49858"
},
{
"name": "CVE-2024-42158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42158"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-49948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49948"
},
{
"name": "CVE-2024-50038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
},
{
"name": "CVE-2024-49878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49878"
},
{
"name": "CVE-2024-46855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46855"
},
{
"name": "CVE-2024-49884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49884"
},
{
"name": "CVE-2024-47673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47673"
},
{
"name": "CVE-2024-50024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50024"
},
{
"name": "CVE-2024-47684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47684"
},
{
"name": "CVE-2024-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49965"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-49852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49852"
},
{
"name": "CVE-2024-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47701"
},
{
"name": "CVE-2024-50191",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50191"
},
{
"name": "CVE-2024-47713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47713"
},
{
"name": "CVE-2024-49936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49936"
},
{
"name": "CVE-2024-49871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49871"
},
{
"name": "CVE-2024-49881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49881"
},
{
"name": "CVE-2024-47690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47690"
},
{
"name": "CVE-2024-49896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49896"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2024-49913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49913"
},
{
"name": "CVE-2024-47693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47693"
},
{
"name": "CVE-2024-50045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50045"
},
{
"name": "CVE-2024-49995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49995"
},
{
"name": "CVE-2024-39463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39463"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-49900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49900"
},
{
"name": "CVE-2024-47679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47679"
},
{
"name": "CVE-2024-47735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47735"
},
{
"name": "CVE-2024-49952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49952"
},
{
"name": "CVE-2024-49981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49981"
},
{
"name": "CVE-2024-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50181"
},
{
"name": "CVE-2024-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49997"
},
{
"name": "CVE-2024-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50002"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2024-49983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49983"
},
{
"name": "CVE-2024-49889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49889"
},
{
"name": "CVE-2024-27072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27072"
},
{
"name": "CVE-2024-50013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50013"
},
{
"name": "CVE-2024-49957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49957"
},
{
"name": "CVE-2024-49962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49962"
},
{
"name": "CVE-2024-46859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46859"
},
{
"name": "CVE-2024-49958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49958"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2024-47723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47723"
},
{
"name": "CVE-2024-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49955"
},
{
"name": "CVE-2024-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50095"
},
{
"name": "CVE-2024-50006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50006"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-50049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50049"
},
{
"name": "CVE-2024-50007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50007"
},
{
"name": "CVE-2024-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50096"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2024-49868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49868"
},
{
"name": "CVE-2024-47699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47699"
},
{
"name": "CVE-2024-50062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50062"
},
{
"name": "CVE-2024-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50059"
},
{
"name": "CVE-2024-47712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47712"
},
{
"name": "CVE-2024-49963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49963"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2024-47739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47739"
},
{
"name": "CVE-2024-47705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47705"
},
{
"name": "CVE-2024-50035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50035"
},
{
"name": "CVE-2024-47740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47740"
},
{
"name": "CVE-2024-46854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46854"
},
{
"name": "CVE-2024-49924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
},
{
"name": "CVE-2024-26947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26947"
},
{
"name": "CVE-2024-49938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49938"
},
{
"name": "CVE-2024-47756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47756"
},
{
"name": "CVE-2024-47737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47737"
},
{
"name": "CVE-2024-49954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49954"
},
{
"name": "CVE-2023-52639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52639"
},
{
"name": "CVE-2024-50008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50008"
},
{
"name": "CVE-2024-46695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46695"
},
{
"name": "CVE-2024-50033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50033"
},
{
"name": "CVE-2024-44942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44942"
},
{
"name": "CVE-2024-50180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50180"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2024-50046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50046"
},
{
"name": "CVE-2024-49944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49944"
},
{
"name": "CVE-2024-47749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47749"
},
{
"name": "CVE-2024-49966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49966"
},
{
"name": "CVE-2024-49902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49902"
},
{
"name": "CVE-2024-47757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47757"
},
{
"name": "CVE-2024-47692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47692"
},
{
"name": "CVE-2024-50184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50184"
},
{
"name": "CVE-2024-38667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38667"
},
{
"name": "CVE-2024-49851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49851"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49933"
},
{
"name": "CVE-2024-47685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47685"
},
{
"name": "CVE-2024-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49935"
},
{
"name": "CVE-2024-49879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49879"
},
{
"name": "CVE-2024-50044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50044"
},
{
"name": "CVE-2024-49894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49894"
},
{
"name": "CVE-2024-47718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47718"
},
{
"name": "CVE-2024-44940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44940"
},
{
"name": "CVE-2024-49867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49867"
},
{
"name": "CVE-2024-47671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47671"
},
{
"name": "CVE-2024-49985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49985"
},
{
"name": "CVE-2024-50001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50001"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-47710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47710"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-49892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49892"
},
{
"name": "CVE-2024-49930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49930"
},
{
"name": "CVE-2024-47698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47698"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47695"
},
{
"name": "CVE-2024-50039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50039"
},
{
"name": "CVE-2024-49973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49973"
},
{
"name": "CVE-2024-49883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49883"
},
{
"name": "CVE-2024-47670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47670"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-46852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46852"
},
{
"name": "CVE-2024-50003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50003"
},
{
"name": "CVE-2024-49860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49860"
},
{
"name": "CVE-2024-36893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36893"
},
{
"name": "CVE-2024-44931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44931"
},
{
"name": "CVE-2024-49927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49927"
},
{
"name": "CVE-2024-49895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49895"
},
{
"name": "CVE-2024-49882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49882"
},
{
"name": "CVE-2024-50031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50031"
},
{
"name": "CVE-2024-35904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35904"
},
{
"name": "CVE-2024-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49975"
},
{
"name": "CVE-2024-50179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50179"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-46853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46853"
},
{
"name": "CVE-2024-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50015"
},
{
"name": "CVE-2024-36968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36968"
},
{
"name": "CVE-2024-47674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47674"
},
{
"name": "CVE-2024-50188",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50188"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2024-49982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49982"
},
{
"name": "CVE-2024-46865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46865"
},
{
"name": "CVE-2024-42156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42156"
},
{
"name": "CVE-2024-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38544"
},
{
"name": "CVE-2024-47720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47720"
},
{
"name": "CVE-2024-47742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47742"
},
{
"name": "CVE-2024-47709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47709"
},
{
"name": "CVE-2024-47706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47706"
},
{
"name": "CVE-2024-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47747"
},
{
"name": "CVE-2024-49877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49877"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2024-46858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46858"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38545"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0069",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2025-01-21",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7221-1",
"url": "https://ubuntu.com/security/notices/USN-7221-1"
},
{
"published_at": "2025-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7166-4",
"url": "https://ubuntu.com/security/notices/USN-7166-4"
}
]
}
CERTFR-2025-AVI-0152
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26921"
},
{
"name": "CVE-2024-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38630"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2024-47671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47671"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47681"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47684"
},
{
"name": "CVE-2024-47685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47685"
},
{
"name": "CVE-2024-47686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47686"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47688"
},
{
"name": "CVE-2024-47692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47692"
},
{
"name": "CVE-2024-47693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47693"
},
{
"name": "CVE-2024-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47695"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47697"
},
{
"name": "CVE-2024-47698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47698"
},
{
"name": "CVE-2024-47699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47699"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2024-47705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47705"
},
{
"name": "CVE-2024-47706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47706"
},
{
"name": "CVE-2024-47707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47707"
},
{
"name": "CVE-2024-47709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47709"
},
{
"name": "CVE-2024-47710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47710"
},
{
"name": "CVE-2024-47712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47712"
},
{
"name": "CVE-2024-47713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47713"
},
{
"name": "CVE-2024-47714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47714"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47718"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47720"
},
{
"name": "CVE-2024-47723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47723"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2024-47730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47730"
},
{
"name": "CVE-2024-47731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47731"
},
{
"name": "CVE-2024-47732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47732"
},
{
"name": "CVE-2024-47735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47735"
},
{
"name": "CVE-2024-47737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47737"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2024-47739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47739"
},
{
"name": "CVE-2024-47741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47741"
},
{
"name": "CVE-2024-47742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47742"
},
{
"name": "CVE-2024-47743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47743"
},
{
"name": "CVE-2024-47744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47744"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2024-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47747"
},
{
"name": "CVE-2024-47748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47748"
},
{
"name": "CVE-2024-47749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47749"
},
{
"name": "CVE-2024-47750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47750"
},
{
"name": "CVE-2024-47751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47751"
},
{
"name": "CVE-2024-47752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47752"
},
{
"name": "CVE-2024-47753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47753"
},
{
"name": "CVE-2024-47754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47754"
},
{
"name": "CVE-2024-47756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47756"
},
{
"name": "CVE-2024-47757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47757"
},
{
"name": "CVE-2024-49850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49850"
},
{
"name": "CVE-2024-49851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49851"
},
{
"name": "CVE-2024-49852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49852"
},
{
"name": "CVE-2024-49853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49853"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49858"
},
{
"name": "CVE-2024-49860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49860"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49863"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49867"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49871"
},
{
"name": "CVE-2024-49874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49874"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2024-49877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49877"
},
{
"name": "CVE-2024-49878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49878"
},
{
"name": "CVE-2024-49879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49879"
},
{
"name": "CVE-2024-49881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49881"
},
{
"name": "CVE-2024-49882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49882"
},
{
"name": "CVE-2024-49883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49883"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2024-49890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49890"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-49892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49892"
},
{
"name": "CVE-2024-49894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49894"
},
{
"name": "CVE-2024-49895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49895"
},
{
"name": "CVE-2024-49896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49896"
},
{
"name": "CVE-2024-49897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49897"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2024-49900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49900"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2024-49902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49902"
},
{
"name": "CVE-2024-49903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49903"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-49907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49907"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-49913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49913"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2024-49930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49930"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-49933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49933"
},
{
"name": "CVE-2024-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49935"
},
{
"name": "CVE-2024-49936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49936"
},
{
"name": "CVE-2024-49937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49937"
},
{
"name": "CVE-2024-49938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49938"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49947"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2024-49950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49950"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-49954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49954"
},
{
"name": "CVE-2024-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49955"
},
{
"name": "CVE-2024-49957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49957"
},
{
"name": "CVE-2024-49958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49958"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49961"
},
{
"name": "CVE-2024-49962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49962"
},
{
"name": "CVE-2024-49963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49963"
},
{
"name": "CVE-2024-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49965"
},
{
"name": "CVE-2024-49966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49966"
},
{
"name": "CVE-2024-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49969"
},
{
"name": "CVE-2024-49972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49972"
},
{
"name": "CVE-2024-49973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49973"
},
{
"name": "CVE-2024-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49974"
},
{
"name": "CVE-2024-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49975"
},
{
"name": "CVE-2024-49981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49981"
},
{
"name": "CVE-2024-49982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49982"
},
{
"name": "CVE-2024-49985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49985"
},
{
"name": "CVE-2024-49986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49986"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2024-49995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49995"
},
{
"name": "CVE-2024-49996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49996"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50001"
},
{
"name": "CVE-2024-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50002"
},
{
"name": "CVE-2024-50006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50006"
},
{
"name": "CVE-2024-50007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50007"
},
{
"name": "CVE-2024-50008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50008"
},
{
"name": "CVE-2024-50013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50013"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2024-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50015"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50024"
},
{
"name": "CVE-2024-50025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50025"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2024-50031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50031"
},
{
"name": "CVE-2024-50033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50033"
},
{
"name": "CVE-2024-50035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50035"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50044"
},
{
"name": "CVE-2024-50045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50045"
},
{
"name": "CVE-2024-50046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50046"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2024-50049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50049"
},
{
"name": "CVE-2024-50055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50055"
},
{
"name": "CVE-2024-50058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50058"
},
{
"name": "CVE-2024-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50059"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50061"
},
{
"name": "CVE-2024-50062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50062"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50069"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50080"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2024-50036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50036"
},
{
"name": "CVE-2024-50067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50067"
},
{
"name": "CVE-2024-50072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50072"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50218"
},
{
"name": "CVE-2024-50229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50229"
},
{
"name": "CVE-2024-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50230"
},
{
"name": "CVE-2024-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50232"
},
{
"name": "CVE-2024-50233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50233"
},
{
"name": "CVE-2024-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50234"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50236"
},
{
"name": "CVE-2024-50237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50237"
},
{
"name": "CVE-2024-50242",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50242"
},
{
"name": "CVE-2024-50243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50243"
},
{
"name": "CVE-2024-50244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50244"
},
{
"name": "CVE-2024-50245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50245"
},
{
"name": "CVE-2024-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50247"
},
{
"name": "CVE-2024-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50249"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50251"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50256"
},
{
"name": "CVE-2024-50257",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50257"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50262"
},
{
"name": "CVE-2024-50264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50264"
},
{
"name": "CVE-2024-50265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50265"
},
{
"name": "CVE-2024-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50267"
},
{
"name": "CVE-2024-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50268"
},
{
"name": "CVE-2024-50269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50269"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50273"
},
{
"name": "CVE-2024-50276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50276"
},
{
"name": "CVE-2024-50278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50278"
},
{
"name": "CVE-2024-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50282"
},
{
"name": "CVE-2024-50283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50283"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2024-50287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50287"
},
{
"name": "CVE-2024-50290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
},
{
"name": "CVE-2024-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50292"
},
{
"name": "CVE-2024-50295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50295"
},
{
"name": "CVE-2024-50296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50296"
},
{
"name": "CVE-2024-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
},
{
"name": "CVE-2024-50301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50301"
},
{
"name": "CVE-2024-50302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53043"
},
{
"name": "CVE-2024-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53052"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53058"
},
{
"name": "CVE-2024-53059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53059"
},
{
"name": "CVE-2024-53061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53061"
},
{
"name": "CVE-2024-53063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
},
{
"name": "CVE-2024-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53066"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53081"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-53088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53088"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-49925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49925"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2024-50208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50208"
},
{
"name": "CVE-2024-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50082"
},
{
"name": "CVE-2024-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50099"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-50142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50142"
},
{
"name": "CVE-2024-50192",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50192"
},
{
"name": "CVE-2024-47679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47679"
},
{
"name": "CVE-2024-47690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47690"
},
{
"name": "CVE-2024-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47701"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-47740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47740"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49868"
},
{
"name": "CVE-2024-49884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49884"
},
{
"name": "CVE-2024-49889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49889"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-49924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
},
{
"name": "CVE-2024-49927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49927"
},
{
"name": "CVE-2024-49944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49944"
},
{
"name": "CVE-2024-49948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49948"
},
{
"name": "CVE-2024-49952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49952"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-49983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49983"
},
{
"name": "CVE-2024-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49997"
},
{
"name": "CVE-2024-50003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50003"
},
{
"name": "CVE-2024-50038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
},
{
"name": "CVE-2024-50039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50039"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50095"
},
{
"name": "CVE-2024-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50096"
},
{
"name": "CVE-2024-50179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50179"
},
{
"name": "CVE-2024-50180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50180"
},
{
"name": "CVE-2024-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50181"
},
{
"name": "CVE-2024-50184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50184"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50188",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50188"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2024-50191",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50191"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2024-50026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50026"
},
{
"name": "CVE-2024-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50084"
},
{
"name": "CVE-2024-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50087"
},
{
"name": "CVE-2024-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50088"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50100"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50103"
},
{
"name": "CVE-2024-50108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50108"
},
{
"name": "CVE-2024-50115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50115"
},
{
"name": "CVE-2024-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50116"
},
{
"name": "CVE-2024-50117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50117"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50127"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50130"
},
{
"name": "CVE-2024-50131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50131"
},
{
"name": "CVE-2024-50134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50134"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50148"
},
{
"name": "CVE-2024-50150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50150"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50154"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50156"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50159"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50167"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50171"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50176"
},
{
"name": "CVE-2024-50177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50177"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2024-50194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50194"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2024-50196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50196"
},
{
"name": "CVE-2024-50198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50198"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50201"
},
{
"name": "CVE-2024-50205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50205"
},
{
"name": "CVE-2024-50209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50209"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50221"
},
{
"name": "CVE-2024-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50224"
},
{
"name": "CVE-2024-50225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50225"
},
{
"name": "CVE-2024-50231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50231"
},
{
"name": "CVE-2024-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50240"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2024-50248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50248"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2024-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53068"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53076"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53094"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2024-53100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53100"
},
{
"name": "CVE-2024-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53101"
},
{
"name": "CVE-2024-53104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
},
{
"name": "CVE-2024-53106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53106"
},
{
"name": "CVE-2024-53108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53108"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-53112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53112"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2024-53121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53121"
},
{
"name": "CVE-2024-53138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53138"
},
{
"name": "CVE-2024-53142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53142"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2024-50010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50010"
},
{
"name": "CVE-2024-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
},
{
"name": "CVE-2024-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50085"
},
{
"name": "CVE-2024-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50086"
},
{
"name": "CVE-2024-50133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50133"
},
{
"name": "CVE-2024-50143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
},
{
"name": "CVE-2024-50151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50151"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-50168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50168"
},
{
"name": "CVE-2024-50185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50185"
},
{
"name": "CVE-2024-50193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50193"
},
{
"name": "CVE-2024-50199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50199"
},
{
"name": "CVE-2024-50202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50202"
},
{
"name": "CVE-2024-53103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53103"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53119"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53122"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53127"
},
{
"name": "CVE-2024-53129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53129"
},
{
"name": "CVE-2024-53130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53130"
},
{
"name": "CVE-2024-53131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53131"
},
{
"name": "CVE-2024-53135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53135"
},
{
"name": "CVE-2024-53140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-50011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50011"
},
{
"name": "CVE-2024-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50016"
},
{
"name": "CVE-2024-50203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50203"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53090"
},
{
"name": "CVE-2024-53099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53099"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53111",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53111"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53125"
},
{
"name": "CVE-2024-53126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53126"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53141"
},
{
"name": "CVE-2024-53146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53146"
},
{
"name": "CVE-2024-53148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53148"
},
{
"name": "CVE-2024-53150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53150"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53154"
},
{
"name": "CVE-2024-53155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53155"
},
{
"name": "CVE-2024-53156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53156"
},
{
"name": "CVE-2024-53157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53157"
},
{
"name": "CVE-2024-53158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53158"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53161"
},
{
"name": "CVE-2024-53162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53162"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53171"
},
{
"name": "CVE-2024-53173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53173"
},
{
"name": "CVE-2024-53174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53174"
},
{
"name": "CVE-2024-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53180"
},
{
"name": "CVE-2024-53188",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53188"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2024-53191",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53191"
},
{
"name": "CVE-2024-53200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53200"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53209"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53214",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53214"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2024-53217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53217"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2024-53237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53237"
},
{
"name": "CVE-2024-56536",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56536"
},
{
"name": "CVE-2024-56539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56539"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-56754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56754"
},
{
"name": "CVE-2024-56755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56755"
},
{
"name": "CVE-2024-56756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
},
{
"name": "CVE-2024-53239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53239"
},
{
"name": "CVE-2024-56548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56548"
},
{
"name": "CVE-2024-56704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56704"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-49998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49998"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53168"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53172"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53194"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2024-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
},
{
"name": "CVE-2024-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53198"
},
{
"name": "CVE-2024-53227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53227"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53233"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-56531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56531"
},
{
"name": "CVE-2024-56532",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56532"
},
{
"name": "CVE-2024-56533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56533"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2024-56543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56543"
},
{
"name": "CVE-2024-56546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56546"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2024-56678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56678"
},
{
"name": "CVE-2024-56681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56681"
},
{
"name": "CVE-2024-56683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56683"
},
{
"name": "CVE-2024-56687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56687"
},
{
"name": "CVE-2024-56688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56688"
},
{
"name": "CVE-2024-56690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56690"
},
{
"name": "CVE-2024-56691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56691"
},
{
"name": "CVE-2024-56694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56694"
},
{
"name": "CVE-2024-56698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56698"
},
{
"name": "CVE-2024-56700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56700"
},
{
"name": "CVE-2024-56701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56701"
},
{
"name": "CVE-2024-56705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56705"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2024-56723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56723"
},
{
"name": "CVE-2024-56724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56724"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56739"
},
{
"name": "CVE-2024-56741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56741"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56746"
},
{
"name": "CVE-2024-56747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56747"
},
{
"name": "CVE-2024-56748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56748"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2024-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50304"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56693"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-56728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56728"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2022-49034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49034"
},
{
"name": "CVE-2024-46869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46869"
},
{
"name": "CVE-2024-47676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47676"
},
{
"name": "CVE-2024-47677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47677"
},
{
"name": "CVE-2024-47680",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47680"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2024-47691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47691"
},
{
"name": "CVE-2024-47694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47694"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-47708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47708"
},
{
"name": "CVE-2024-47711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47711"
},
{
"name": "CVE-2024-47716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47716"
},
{
"name": "CVE-2024-47717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47717"
},
{
"name": "CVE-2024-47721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47721"
},
{
"name": "CVE-2024-47724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47724"
},
{
"name": "CVE-2024-47726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47726"
},
{
"name": "CVE-2024-47733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47733"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2024-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47746"
},
{
"name": "CVE-2024-49857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49857"
},
{
"name": "CVE-2024-49865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49865"
},
{
"name": "CVE-2024-49869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49869"
},
{
"name": "CVE-2024-49872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49872"
},
{
"name": "CVE-2024-49873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49873"
},
{
"name": "CVE-2024-49876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49876"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2024-49926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49926"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2024-49941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49941"
},
{
"name": "CVE-2024-49942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49942"
},
{
"name": "CVE-2024-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49943"
},
{
"name": "CVE-2024-49956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49956"
},
{
"name": "CVE-2024-49964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49964"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49971"
},
{
"name": "CVE-2024-49979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49979"
},
{
"name": "CVE-2024-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49980"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50005"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50030"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2024-50037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50037"
},
{
"name": "CVE-2024-50043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50043"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2024-50065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50065"
},
{
"name": "CVE-2024-50066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50066"
},
{
"name": "CVE-2024-50068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50068"
},
{
"name": "CVE-2024-50070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50070"
},
{
"name": "CVE-2024-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50071"
},
{
"name": "CVE-2024-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50079"
},
{
"name": "CVE-2024-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50090"
},
{
"name": "CVE-2024-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50091"
},
{
"name": "CVE-2024-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50092"
},
{
"name": "CVE-2024-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50094"
},
{
"name": "CVE-2024-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50104"
},
{
"name": "CVE-2024-50105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50105"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50111",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50111"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2024-50113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50113"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50118"
},
{
"name": "CVE-2024-50119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50119"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50122"
},
{
"name": "CVE-2024-50123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50123"
},
{
"name": "CVE-2024-50129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50129"
},
{
"name": "CVE-2024-50132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50132"
},
{
"name": "CVE-2024-50137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50137"
},
{
"name": "CVE-2024-50140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50140"
},
{
"name": "CVE-2024-50144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50144"
},
{
"name": "CVE-2024-50149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50149"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50161"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50170"
},
{
"name": "CVE-2024-50173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50173"
},
{
"name": "CVE-2024-50174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50174"
},
{
"name": "CVE-2024-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50178"
},
{
"name": "CVE-2024-50190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50190"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50204"
},
{
"name": "CVE-2024-50206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50206"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50212"
},
{
"name": "CVE-2024-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50213"
},
{
"name": "CVE-2024-50214",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50214"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2024-50220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50220"
},
{
"name": "CVE-2024-50222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50222"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50227"
},
{
"name": "CVE-2024-50238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50238"
},
{
"name": "CVE-2024-50239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50239"
},
{
"name": "CVE-2024-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50253"
},
{
"name": "CVE-2024-50254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50254"
},
{
"name": "CVE-2024-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50260"
},
{
"name": "CVE-2024-50263",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50263"
},
{
"name": "CVE-2024-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50266"
},
{
"name": "CVE-2024-50270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50270"
},
{
"name": "CVE-2024-50277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50277"
},
{
"name": "CVE-2024-50281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50281"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2024-50288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50288"
},
{
"name": "CVE-2024-50291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50291"
},
{
"name": "CVE-2024-50293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50293"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50297"
},
{
"name": "CVE-2024-50300",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50300"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53046"
},
{
"name": "CVE-2024-53049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53049"
},
{
"name": "CVE-2024-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53053"
},
{
"name": "CVE-2024-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53062"
},
{
"name": "CVE-2024-53065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53065"
},
{
"name": "CVE-2024-53067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53067"
},
{
"name": "CVE-2024-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53069"
},
{
"name": "CVE-2024-53071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53071"
},
{
"name": "CVE-2024-53075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53075"
},
{
"name": "CVE-2024-53077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53077"
},
{
"name": "CVE-2024-53078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53078"
},
{
"name": "CVE-2024-53080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53080"
},
{
"name": "CVE-2024-53083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53083"
},
{
"name": "CVE-2024-53084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53084"
},
{
"name": "CVE-2024-53086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53086"
},
{
"name": "CVE-2024-53087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53087"
},
{
"name": "CVE-2024-53089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53089"
},
{
"name": "CVE-2024-53092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53092"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2024-53107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53107"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53115"
},
{
"name": "CVE-2024-53116",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53116"
},
{
"name": "CVE-2024-53132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53132"
},
{
"name": "CVE-2024-53137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53137"
},
{
"name": "CVE-2024-53139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53139"
},
{
"name": "CVE-2024-53143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53143"
},
{
"name": "CVE-2024-53145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53145"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2024-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53149"
},
{
"name": "CVE-2024-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53152"
},
{
"name": "CVE-2024-53153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53153"
},
{
"name": "CVE-2024-53163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53163"
},
{
"name": "CVE-2024-53165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53165"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53181"
},
{
"name": "CVE-2024-53183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53183"
},
{
"name": "CVE-2024-53184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53184"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-53192",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53192"
},
{
"name": "CVE-2024-53193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53193"
},
{
"name": "CVE-2024-53199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53199"
},
{
"name": "CVE-2024-53212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53212"
},
{
"name": "CVE-2024-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53218"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-53223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53223"
},
{
"name": "CVE-2024-53226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53226"
},
{
"name": "CVE-2024-53228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53228"
},
{
"name": "CVE-2024-56534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56534"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56537",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56537"
},
{
"name": "CVE-2024-56540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56540"
},
{
"name": "CVE-2024-56541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56541"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-56680",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56680"
},
{
"name": "CVE-2024-56684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56684"
},
{
"name": "CVE-2024-56685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56685"
},
{
"name": "CVE-2024-56689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56689"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56697"
},
{
"name": "CVE-2024-56699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56699"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56720"
},
{
"name": "CVE-2024-56721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56721"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2024-56749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56749"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2025-0927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0927"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0152",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2025-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0109-1",
"url": "https://ubuntu.com/security/notices/LSN-0109-1"
},
{
"published_at": "2025-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7277-1",
"url": "https://ubuntu.com/security/notices/USN-7277-1"
},
{
"published_at": "2025-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7276-1",
"url": "https://ubuntu.com/security/notices/USN-7276-1"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2025-AVI-0069
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-47748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47748"
},
{
"name": "CVE-2024-49863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49863"
},
{
"name": "CVE-2024-49907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49907"
},
{
"name": "CVE-2024-46849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46849"
},
{
"name": "CVE-2024-47697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47697"
},
{
"name": "CVE-2024-41016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41016"
},
{
"name": "CVE-2024-49890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49890"
},
{
"name": "CVE-2024-49903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49903"
},
{
"name": "CVE-2024-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49969"
},
{
"name": "CVE-2023-52904",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52904"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2023-52621",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52621"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-35951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35951"
},
{
"name": "CVE-2024-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49967"
},
{
"name": "CVE-2024-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49858"
},
{
"name": "CVE-2024-42158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42158"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-49948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49948"
},
{
"name": "CVE-2024-50038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
},
{
"name": "CVE-2024-49878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49878"
},
{
"name": "CVE-2024-46855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46855"
},
{
"name": "CVE-2024-49884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49884"
},
{
"name": "CVE-2024-47673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47673"
},
{
"name": "CVE-2024-50024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50024"
},
{
"name": "CVE-2024-47684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47684"
},
{
"name": "CVE-2024-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49965"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-49852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49852"
},
{
"name": "CVE-2024-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47701"
},
{
"name": "CVE-2024-50191",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50191"
},
{
"name": "CVE-2024-47713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47713"
},
{
"name": "CVE-2024-49936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49936"
},
{
"name": "CVE-2024-49871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49871"
},
{
"name": "CVE-2024-49881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49881"
},
{
"name": "CVE-2024-47690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47690"
},
{
"name": "CVE-2024-49896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49896"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2024-49913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49913"
},
{
"name": "CVE-2024-47693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47693"
},
{
"name": "CVE-2024-50045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50045"
},
{
"name": "CVE-2024-49995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49995"
},
{
"name": "CVE-2024-39463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39463"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-49900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49900"
},
{
"name": "CVE-2024-47679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47679"
},
{
"name": "CVE-2024-47735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47735"
},
{
"name": "CVE-2024-49952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49952"
},
{
"name": "CVE-2024-49981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49981"
},
{
"name": "CVE-2024-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50181"
},
{
"name": "CVE-2024-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49997"
},
{
"name": "CVE-2024-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50002"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2024-49983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49983"
},
{
"name": "CVE-2024-49889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49889"
},
{
"name": "CVE-2024-27072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27072"
},
{
"name": "CVE-2024-50013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50013"
},
{
"name": "CVE-2024-49957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49957"
},
{
"name": "CVE-2024-49962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49962"
},
{
"name": "CVE-2024-46859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46859"
},
{
"name": "CVE-2024-49958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49958"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2024-47723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47723"
},
{
"name": "CVE-2024-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49955"
},
{
"name": "CVE-2024-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50095"
},
{
"name": "CVE-2024-50006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50006"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-50049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50049"
},
{
"name": "CVE-2024-50007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50007"
},
{
"name": "CVE-2024-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50096"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2024-49868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49868"
},
{
"name": "CVE-2024-47699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47699"
},
{
"name": "CVE-2024-50062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50062"
},
{
"name": "CVE-2024-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50059"
},
{
"name": "CVE-2024-47712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47712"
},
{
"name": "CVE-2024-49963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49963"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2024-47739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47739"
},
{
"name": "CVE-2024-47705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47705"
},
{
"name": "CVE-2024-50035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50035"
},
{
"name": "CVE-2024-47740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47740"
},
{
"name": "CVE-2024-46854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46854"
},
{
"name": "CVE-2024-49924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
},
{
"name": "CVE-2024-26947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26947"
},
{
"name": "CVE-2024-49938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49938"
},
{
"name": "CVE-2024-47756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47756"
},
{
"name": "CVE-2024-47737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47737"
},
{
"name": "CVE-2024-49954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49954"
},
{
"name": "CVE-2023-52639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52639"
},
{
"name": "CVE-2024-50008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50008"
},
{
"name": "CVE-2024-46695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46695"
},
{
"name": "CVE-2024-50033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50033"
},
{
"name": "CVE-2024-44942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44942"
},
{
"name": "CVE-2024-50180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50180"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2024-50046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50046"
},
{
"name": "CVE-2024-49944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49944"
},
{
"name": "CVE-2024-47749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47749"
},
{
"name": "CVE-2024-49966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49966"
},
{
"name": "CVE-2024-49902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49902"
},
{
"name": "CVE-2024-47757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47757"
},
{
"name": "CVE-2024-47692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47692"
},
{
"name": "CVE-2024-50184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50184"
},
{
"name": "CVE-2024-38667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38667"
},
{
"name": "CVE-2024-49851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49851"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49933"
},
{
"name": "CVE-2024-47685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47685"
},
{
"name": "CVE-2024-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49935"
},
{
"name": "CVE-2024-49879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49879"
},
{
"name": "CVE-2024-50044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50044"
},
{
"name": "CVE-2024-49894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49894"
},
{
"name": "CVE-2024-47718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47718"
},
{
"name": "CVE-2024-44940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44940"
},
{
"name": "CVE-2024-49867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49867"
},
{
"name": "CVE-2024-47671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47671"
},
{
"name": "CVE-2024-49985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49985"
},
{
"name": "CVE-2024-50001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50001"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-47710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47710"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-49892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49892"
},
{
"name": "CVE-2024-49930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49930"
},
{
"name": "CVE-2024-47698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47698"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47695"
},
{
"name": "CVE-2024-50039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50039"
},
{
"name": "CVE-2024-49973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49973"
},
{
"name": "CVE-2024-49883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49883"
},
{
"name": "CVE-2024-47670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47670"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-46852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46852"
},
{
"name": "CVE-2024-50003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50003"
},
{
"name": "CVE-2024-49860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49860"
},
{
"name": "CVE-2024-36893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36893"
},
{
"name": "CVE-2024-44931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44931"
},
{
"name": "CVE-2024-49927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49927"
},
{
"name": "CVE-2024-49895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49895"
},
{
"name": "CVE-2024-49882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49882"
},
{
"name": "CVE-2024-50031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50031"
},
{
"name": "CVE-2024-35904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35904"
},
{
"name": "CVE-2024-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49975"
},
{
"name": "CVE-2024-50179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50179"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-46853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46853"
},
{
"name": "CVE-2024-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50015"
},
{
"name": "CVE-2024-36968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36968"
},
{
"name": "CVE-2024-47674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47674"
},
{
"name": "CVE-2024-50188",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50188"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2024-49982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49982"
},
{
"name": "CVE-2024-46865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46865"
},
{
"name": "CVE-2024-42156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42156"
},
{
"name": "CVE-2024-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38544"
},
{
"name": "CVE-2024-47720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47720"
},
{
"name": "CVE-2024-47742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47742"
},
{
"name": "CVE-2024-47709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47709"
},
{
"name": "CVE-2024-47706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47706"
},
{
"name": "CVE-2024-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47747"
},
{
"name": "CVE-2024-49877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49877"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2024-46858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46858"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38545"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0069",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2025-01-21",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7221-1",
"url": "https://ubuntu.com/security/notices/USN-7221-1"
},
{
"published_at": "2025-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7166-4",
"url": "https://ubuntu.com/security/notices/USN-7166-4"
}
]
}
CERTFR-2025-AVI-0152
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26921"
},
{
"name": "CVE-2024-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38630"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2024-47671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47671"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47681"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47684"
},
{
"name": "CVE-2024-47685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47685"
},
{
"name": "CVE-2024-47686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47686"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47688"
},
{
"name": "CVE-2024-47692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47692"
},
{
"name": "CVE-2024-47693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47693"
},
{
"name": "CVE-2024-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47695"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47697"
},
{
"name": "CVE-2024-47698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47698"
},
{
"name": "CVE-2024-47699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47699"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2024-47705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47705"
},
{
"name": "CVE-2024-47706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47706"
},
{
"name": "CVE-2024-47707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47707"
},
{
"name": "CVE-2024-47709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47709"
},
{
"name": "CVE-2024-47710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47710"
},
{
"name": "CVE-2024-47712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47712"
},
{
"name": "CVE-2024-47713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47713"
},
{
"name": "CVE-2024-47714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47714"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47718"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47720"
},
{
"name": "CVE-2024-47723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47723"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2024-47730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47730"
},
{
"name": "CVE-2024-47731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47731"
},
{
"name": "CVE-2024-47732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47732"
},
{
"name": "CVE-2024-47735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47735"
},
{
"name": "CVE-2024-47737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47737"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2024-47739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47739"
},
{
"name": "CVE-2024-47741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47741"
},
{
"name": "CVE-2024-47742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47742"
},
{
"name": "CVE-2024-47743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47743"
},
{
"name": "CVE-2024-47744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47744"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2024-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47747"
},
{
"name": "CVE-2024-47748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47748"
},
{
"name": "CVE-2024-47749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47749"
},
{
"name": "CVE-2024-47750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47750"
},
{
"name": "CVE-2024-47751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47751"
},
{
"name": "CVE-2024-47752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47752"
},
{
"name": "CVE-2024-47753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47753"
},
{
"name": "CVE-2024-47754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47754"
},
{
"name": "CVE-2024-47756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47756"
},
{
"name": "CVE-2024-47757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47757"
},
{
"name": "CVE-2024-49850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49850"
},
{
"name": "CVE-2024-49851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49851"
},
{
"name": "CVE-2024-49852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49852"
},
{
"name": "CVE-2024-49853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49853"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49858"
},
{
"name": "CVE-2024-49860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49860"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49863"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49867"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49871"
},
{
"name": "CVE-2024-49874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49874"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2024-49877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49877"
},
{
"name": "CVE-2024-49878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49878"
},
{
"name": "CVE-2024-49879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49879"
},
{
"name": "CVE-2024-49881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49881"
},
{
"name": "CVE-2024-49882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49882"
},
{
"name": "CVE-2024-49883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49883"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2024-49890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49890"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-49892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49892"
},
{
"name": "CVE-2024-49894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49894"
},
{
"name": "CVE-2024-49895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49895"
},
{
"name": "CVE-2024-49896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49896"
},
{
"name": "CVE-2024-49897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49897"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2024-49900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49900"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2024-49902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49902"
},
{
"name": "CVE-2024-49903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49903"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-49907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49907"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-49913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49913"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2024-49930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49930"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-49933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49933"
},
{
"name": "CVE-2024-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49935"
},
{
"name": "CVE-2024-49936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49936"
},
{
"name": "CVE-2024-49937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49937"
},
{
"name": "CVE-2024-49938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49938"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49947"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2024-49950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49950"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-49954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49954"
},
{
"name": "CVE-2024-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49955"
},
{
"name": "CVE-2024-49957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49957"
},
{
"name": "CVE-2024-49958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49958"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49961"
},
{
"name": "CVE-2024-49962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49962"
},
{
"name": "CVE-2024-49963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49963"
},
{
"name": "CVE-2024-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49965"
},
{
"name": "CVE-2024-49966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49966"
},
{
"name": "CVE-2024-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49969"
},
{
"name": "CVE-2024-49972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49972"
},
{
"name": "CVE-2024-49973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49973"
},
{
"name": "CVE-2024-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49974"
},
{
"name": "CVE-2024-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49975"
},
{
"name": "CVE-2024-49981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49981"
},
{
"name": "CVE-2024-49982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49982"
},
{
"name": "CVE-2024-49985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49985"
},
{
"name": "CVE-2024-49986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49986"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2024-49995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49995"
},
{
"name": "CVE-2024-49996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49996"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50001"
},
{
"name": "CVE-2024-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50002"
},
{
"name": "CVE-2024-50006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50006"
},
{
"name": "CVE-2024-50007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50007"
},
{
"name": "CVE-2024-50008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50008"
},
{
"name": "CVE-2024-50013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50013"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2024-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50015"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50024"
},
{
"name": "CVE-2024-50025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50025"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2024-50031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50031"
},
{
"name": "CVE-2024-50033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50033"
},
{
"name": "CVE-2024-50035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50035"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50044"
},
{
"name": "CVE-2024-50045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50045"
},
{
"name": "CVE-2024-50046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50046"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2024-50049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50049"
},
{
"name": "CVE-2024-50055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50055"
},
{
"name": "CVE-2024-50058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50058"
},
{
"name": "CVE-2024-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50059"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50061"
},
{
"name": "CVE-2024-50062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50062"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50069"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50080"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2024-50036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50036"
},
{
"name": "CVE-2024-50067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50067"
},
{
"name": "CVE-2024-50072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50072"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50218"
},
{
"name": "CVE-2024-50229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50229"
},
{
"name": "CVE-2024-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50230"
},
{
"name": "CVE-2024-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50232"
},
{
"name": "CVE-2024-50233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50233"
},
{
"name": "CVE-2024-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50234"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50236"
},
{
"name": "CVE-2024-50237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50237"
},
{
"name": "CVE-2024-50242",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50242"
},
{
"name": "CVE-2024-50243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50243"
},
{
"name": "CVE-2024-50244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50244"
},
{
"name": "CVE-2024-50245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50245"
},
{
"name": "CVE-2024-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50247"
},
{
"name": "CVE-2024-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50249"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50251"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50256"
},
{
"name": "CVE-2024-50257",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50257"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50262"
},
{
"name": "CVE-2024-50264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50264"
},
{
"name": "CVE-2024-50265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50265"
},
{
"name": "CVE-2024-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50267"
},
{
"name": "CVE-2024-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50268"
},
{
"name": "CVE-2024-50269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50269"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50273"
},
{
"name": "CVE-2024-50276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50276"
},
{
"name": "CVE-2024-50278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50278"
},
{
"name": "CVE-2024-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50282"
},
{
"name": "CVE-2024-50283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50283"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2024-50287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50287"
},
{
"name": "CVE-2024-50290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
},
{
"name": "CVE-2024-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50292"
},
{
"name": "CVE-2024-50295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50295"
},
{
"name": "CVE-2024-50296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50296"
},
{
"name": "CVE-2024-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
},
{
"name": "CVE-2024-50301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50301"
},
{
"name": "CVE-2024-50302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53043"
},
{
"name": "CVE-2024-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53052"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53058"
},
{
"name": "CVE-2024-53059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53059"
},
{
"name": "CVE-2024-53061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53061"
},
{
"name": "CVE-2024-53063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
},
{
"name": "CVE-2024-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53066"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53081"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-53088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53088"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-49925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49925"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2024-50208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50208"
},
{
"name": "CVE-2024-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50082"
},
{
"name": "CVE-2024-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50099"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-50142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50142"
},
{
"name": "CVE-2024-50192",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50192"
},
{
"name": "CVE-2024-47679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47679"
},
{
"name": "CVE-2024-47690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47690"
},
{
"name": "CVE-2024-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47701"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-47740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47740"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49868"
},
{
"name": "CVE-2024-49884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49884"
},
{
"name": "CVE-2024-49889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49889"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-49924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
},
{
"name": "CVE-2024-49927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49927"
},
{
"name": "CVE-2024-49944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49944"
},
{
"name": "CVE-2024-49948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49948"
},
{
"name": "CVE-2024-49952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49952"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-49983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49983"
},
{
"name": "CVE-2024-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49997"
},
{
"name": "CVE-2024-50003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50003"
},
{
"name": "CVE-2024-50038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
},
{
"name": "CVE-2024-50039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50039"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50095"
},
{
"name": "CVE-2024-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50096"
},
{
"name": "CVE-2024-50179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50179"
},
{
"name": "CVE-2024-50180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50180"
},
{
"name": "CVE-2024-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50181"
},
{
"name": "CVE-2024-50184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50184"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50188",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50188"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2024-50191",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50191"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2024-50026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50026"
},
{
"name": "CVE-2024-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50084"
},
{
"name": "CVE-2024-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50087"
},
{
"name": "CVE-2024-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50088"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50100"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50103"
},
{
"name": "CVE-2024-50108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50108"
},
{
"name": "CVE-2024-50115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50115"
},
{
"name": "CVE-2024-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50116"
},
{
"name": "CVE-2024-50117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50117"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50127"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50130"
},
{
"name": "CVE-2024-50131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50131"
},
{
"name": "CVE-2024-50134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50134"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50148"
},
{
"name": "CVE-2024-50150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50150"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50154"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50156"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50159"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50167"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50171"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50176"
},
{
"name": "CVE-2024-50177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50177"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2024-50194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50194"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2024-50196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50196"
},
{
"name": "CVE-2024-50198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50198"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50201"
},
{
"name": "CVE-2024-50205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50205"
},
{
"name": "CVE-2024-50209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50209"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50221"
},
{
"name": "CVE-2024-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50224"
},
{
"name": "CVE-2024-50225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50225"
},
{
"name": "CVE-2024-50231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50231"
},
{
"name": "CVE-2024-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50240"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2024-50248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50248"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2024-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53068"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53076"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53094"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2024-53100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53100"
},
{
"name": "CVE-2024-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53101"
},
{
"name": "CVE-2024-53104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
},
{
"name": "CVE-2024-53106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53106"
},
{
"name": "CVE-2024-53108",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53108"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-53112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53112"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2024-53121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53121"
},
{
"name": "CVE-2024-53138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53138"
},
{
"name": "CVE-2024-53142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53142"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2024-50010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50010"
},
{
"name": "CVE-2024-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
},
{
"name": "CVE-2024-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50085"
},
{
"name": "CVE-2024-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50086"
},
{
"name": "CVE-2024-50133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50133"
},
{
"name": "CVE-2024-50143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
},
{
"name": "CVE-2024-50151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50151"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-50168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50168"
},
{
"name": "CVE-2024-50185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50185"
},
{
"name": "CVE-2024-50193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50193"
},
{
"name": "CVE-2024-50199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50199"
},
{
"name": "CVE-2024-50202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50202"
},
{
"name": "CVE-2024-53103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53103"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53119"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53122"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53127"
},
{
"name": "CVE-2024-53129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53129"
},
{
"name": "CVE-2024-53130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53130"
},
{
"name": "CVE-2024-53131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53131"
},
{
"name": "CVE-2024-53135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53135"
},
{
"name": "CVE-2024-53140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-50011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50011"
},
{
"name": "CVE-2024-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50016"
},
{
"name": "CVE-2024-50203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50203"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53090"
},
{
"name": "CVE-2024-53099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53099"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53111",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53111"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53125"
},
{
"name": "CVE-2024-53126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53126"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53141"
},
{
"name": "CVE-2024-53146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53146"
},
{
"name": "CVE-2024-53148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53148"
},
{
"name": "CVE-2024-53150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53150"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53154"
},
{
"name": "CVE-2024-53155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53155"
},
{
"name": "CVE-2024-53156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53156"
},
{
"name": "CVE-2024-53157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53157"
},
{
"name": "CVE-2024-53158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53158"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53161"
},
{
"name": "CVE-2024-53162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53162"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53171"
},
{
"name": "CVE-2024-53173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53173"
},
{
"name": "CVE-2024-53174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53174"
},
{
"name": "CVE-2024-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53180"
},
{
"name": "CVE-2024-53188",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53188"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2024-53191",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53191"
},
{
"name": "CVE-2024-53200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53200"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53209"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53214",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53214"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2024-53217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53217"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2024-53237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53237"
},
{
"name": "CVE-2024-56536",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56536"
},
{
"name": "CVE-2024-56539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56539"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-56754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56754"
},
{
"name": "CVE-2024-56755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56755"
},
{
"name": "CVE-2024-56756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
},
{
"name": "CVE-2024-53239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53239"
},
{
"name": "CVE-2024-56548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56548"
},
{
"name": "CVE-2024-56704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56704"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-49998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49998"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53168"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53172"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53194"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2024-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
},
{
"name": "CVE-2024-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53198"
},
{
"name": "CVE-2024-53227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53227"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53233"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-56531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56531"
},
{
"name": "CVE-2024-56532",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56532"
},
{
"name": "CVE-2024-56533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56533"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2024-56543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56543"
},
{
"name": "CVE-2024-56546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56546"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2024-56678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56678"
},
{
"name": "CVE-2024-56681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56681"
},
{
"name": "CVE-2024-56683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56683"
},
{
"name": "CVE-2024-56687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56687"
},
{
"name": "CVE-2024-56688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56688"
},
{
"name": "CVE-2024-56690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56690"
},
{
"name": "CVE-2024-56691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56691"
},
{
"name": "CVE-2024-56694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56694"
},
{
"name": "CVE-2024-56698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56698"
},
{
"name": "CVE-2024-56700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56700"
},
{
"name": "CVE-2024-56701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56701"
},
{
"name": "CVE-2024-56705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56705"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2024-56723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56723"
},
{
"name": "CVE-2024-56724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56724"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56739"
},
{
"name": "CVE-2024-56741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56741"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56746"
},
{
"name": "CVE-2024-56747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56747"
},
{
"name": "CVE-2024-56748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56748"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2024-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50304"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56693"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-56728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56728"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2022-49034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49034"
},
{
"name": "CVE-2024-46869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46869"
},
{
"name": "CVE-2024-47676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47676"
},
{
"name": "CVE-2024-47677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47677"
},
{
"name": "CVE-2024-47680",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47680"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2024-47691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47691"
},
{
"name": "CVE-2024-47694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47694"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-47708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47708"
},
{
"name": "CVE-2024-47711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47711"
},
{
"name": "CVE-2024-47716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47716"
},
{
"name": "CVE-2024-47717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47717"
},
{
"name": "CVE-2024-47721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47721"
},
{
"name": "CVE-2024-47724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47724"
},
{
"name": "CVE-2024-47726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47726"
},
{
"name": "CVE-2024-47733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47733"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2024-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47746"
},
{
"name": "CVE-2024-49857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49857"
},
{
"name": "CVE-2024-49865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49865"
},
{
"name": "CVE-2024-49869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49869"
},
{
"name": "CVE-2024-49872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49872"
},
{
"name": "CVE-2024-49873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49873"
},
{
"name": "CVE-2024-49876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49876"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2024-49926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49926"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2024-49941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49941"
},
{
"name": "CVE-2024-49942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49942"
},
{
"name": "CVE-2024-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49943"
},
{
"name": "CVE-2024-49956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49956"
},
{
"name": "CVE-2024-49964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49964"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49971"
},
{
"name": "CVE-2024-49979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49979"
},
{
"name": "CVE-2024-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49980"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50005"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50030"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2024-50037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50037"
},
{
"name": "CVE-2024-50043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50043"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2024-50065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50065"
},
{
"name": "CVE-2024-50066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50066"
},
{
"name": "CVE-2024-50068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50068"
},
{
"name": "CVE-2024-50070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50070"
},
{
"name": "CVE-2024-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50071"
},
{
"name": "CVE-2024-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50079"
},
{
"name": "CVE-2024-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50090"
},
{
"name": "CVE-2024-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50091"
},
{
"name": "CVE-2024-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50092"
},
{
"name": "CVE-2024-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50094"
},
{
"name": "CVE-2024-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50104"
},
{
"name": "CVE-2024-50105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50105"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50111",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50111"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2024-50113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50113"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50118"
},
{
"name": "CVE-2024-50119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50119"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50122"
},
{
"name": "CVE-2024-50123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50123"
},
{
"name": "CVE-2024-50129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50129"
},
{
"name": "CVE-2024-50132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50132"
},
{
"name": "CVE-2024-50137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50137"
},
{
"name": "CVE-2024-50140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50140"
},
{
"name": "CVE-2024-50144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50144"
},
{
"name": "CVE-2024-50149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50149"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50161"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50170"
},
{
"name": "CVE-2024-50173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50173"
},
{
"name": "CVE-2024-50174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50174"
},
{
"name": "CVE-2024-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50178"
},
{
"name": "CVE-2024-50190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50190"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50204"
},
{
"name": "CVE-2024-50206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50206"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50212"
},
{
"name": "CVE-2024-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50213"
},
{
"name": "CVE-2024-50214",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50214"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2024-50220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50220"
},
{
"name": "CVE-2024-50222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50222"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50227"
},
{
"name": "CVE-2024-50238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50238"
},
{
"name": "CVE-2024-50239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50239"
},
{
"name": "CVE-2024-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50253"
},
{
"name": "CVE-2024-50254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50254"
},
{
"name": "CVE-2024-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50260"
},
{
"name": "CVE-2024-50263",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50263"
},
{
"name": "CVE-2024-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50266"
},
{
"name": "CVE-2024-50270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50270"
},
{
"name": "CVE-2024-50277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50277"
},
{
"name": "CVE-2024-50281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50281"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2024-50288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50288"
},
{
"name": "CVE-2024-50291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50291"
},
{
"name": "CVE-2024-50293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50293"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50297"
},
{
"name": "CVE-2024-50300",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50300"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53046"
},
{
"name": "CVE-2024-53049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53049"
},
{
"name": "CVE-2024-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53053"
},
{
"name": "CVE-2024-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53062"
},
{
"name": "CVE-2024-53065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53065"
},
{
"name": "CVE-2024-53067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53067"
},
{
"name": "CVE-2024-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53069"
},
{
"name": "CVE-2024-53071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53071"
},
{
"name": "CVE-2024-53075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53075"
},
{
"name": "CVE-2024-53077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53077"
},
{
"name": "CVE-2024-53078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53078"
},
{
"name": "CVE-2024-53080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53080"
},
{
"name": "CVE-2024-53083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53083"
},
{
"name": "CVE-2024-53084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53084"
},
{
"name": "CVE-2024-53086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53086"
},
{
"name": "CVE-2024-53087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53087"
},
{
"name": "CVE-2024-53089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53089"
},
{
"name": "CVE-2024-53092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53092"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2024-53107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53107"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53115"
},
{
"name": "CVE-2024-53116",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53116"
},
{
"name": "CVE-2024-53132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53132"
},
{
"name": "CVE-2024-53137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53137"
},
{
"name": "CVE-2024-53139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53139"
},
{
"name": "CVE-2024-53143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53143"
},
{
"name": "CVE-2024-53145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53145"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2024-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53149"
},
{
"name": "CVE-2024-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53152"
},
{
"name": "CVE-2024-53153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53153"
},
{
"name": "CVE-2024-53163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53163"
},
{
"name": "CVE-2024-53165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53165"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53181"
},
{
"name": "CVE-2024-53183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53183"
},
{
"name": "CVE-2024-53184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53184"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-53192",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53192"
},
{
"name": "CVE-2024-53193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53193"
},
{
"name": "CVE-2024-53199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53199"
},
{
"name": "CVE-2024-53212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53212"
},
{
"name": "CVE-2024-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53218"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-53223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53223"
},
{
"name": "CVE-2024-53226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53226"
},
{
"name": "CVE-2024-53228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53228"
},
{
"name": "CVE-2024-56534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56534"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56537",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56537"
},
{
"name": "CVE-2024-56540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56540"
},
{
"name": "CVE-2024-56541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56541"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-56680",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56680"
},
{
"name": "CVE-2024-56684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56684"
},
{
"name": "CVE-2024-56685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56685"
},
{
"name": "CVE-2024-56689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56689"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56697"
},
{
"name": "CVE-2024-56699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56699"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56720"
},
{
"name": "CVE-2024-56721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56721"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2024-56749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56749"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2025-0927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0927"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0152",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2025-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0109-1",
"url": "https://ubuntu.com/security/notices/LSN-0109-1"
},
{
"published_at": "2025-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7277-1",
"url": "https://ubuntu.com/security/notices/USN-7277-1"
},
{
"published_at": "2025-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7276-1",
"url": "https://ubuntu.com/security/notices/USN-7276-1"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
BDU:2025-15308
Vulnerability from fstec - Published: 14.11.2024{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., Canonical Ltd., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Red Hat Enterprise Linux), 24.04 LTS (Ubuntu), \u043e\u0442 6.12 \u0434\u043e 6.12.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), 10 (Red Hat Enterprise Linux), \u043e\u0442 6.11 \u0434\u043e 6.11.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f Linux:\nhttps://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-53238-ea1c@gregkh/\nhttps://git.kernel.org/stable/c/1219c211ccd061cde002cc5708692efca515a7a0\nhttps://git.kernel.org/stable/c/d8bd79f0eea9c07d90ce870a714ab5c10afaa4b3\nhttps://git.kernel.org/linus/61c5a3def90ac729a538e5ca5ff7f461cff72776\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2024-53238\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/CVE-2024-53238",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "14.11.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "08.12.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "08.12.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-15308",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-53238",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Ubuntu, Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 9 , Canonical Ltd. Ubuntu 24.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.12 \u0434\u043e 6.12.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , Red Hat Inc. Red Hat Enterprise Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.11 \u0434\u043e 6.11.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 btmtk_usb_isointf_init() \u043c\u043e\u0434\u0443\u043b\u044f drivers/bluetooth/btmtk.c - \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Bluetooth \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f NULL (CWE-476)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 btmtk_usb_isointf_init() \u043c\u043e\u0434\u0443\u043b\u044f drivers/bluetooth/btmtk.c - \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Bluetooth \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0440\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u0435\u0439. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://git.kernel.org/stable/c/1219c211ccd061cde002cc5708692efca515a7a0\nhttps://git.kernel.org/stable/c/d8bd79f0eea9c07d90ce870a714ab5c10afaa4b3\nhttps://www.cve.org/CVERecord?id=CVE-2024-53238\nhttps://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-53238-ea1c@gregkh/\nhttps://git.kernel.org/linus/61c5a3def90ac729a538e5ca5ff7f461cff72776\nhttps://ubuntu.com/security/notices/USN-7221-1\nhttps://ubuntu.com/security/notices/USN-7276-1\nhttps://ubuntu.com/security/notices/USN-7277-1\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11.11\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.2\nhttps://ubuntu.com/security/CVE-2024-53238\nhttps://access.redhat.com/security/cve/cve-2024-53238",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-476",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
FKIE_CVE-2024-53238
Vulnerability from fkie_nvd - Published: 2024-12-27 14:15 - Updated: 2025-10-01 20:175.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07BE5DA1-4C04-4052-9B58-6EDE15469D65",
"versionEndExcluding": "6.11.11",
"versionStartIncluding": "6.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776",
"versionEndExcluding": "6.12.2",
"versionStartIncluding": "6.12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btmtk: adjust the position to init iso data anchor\n\nMediaTek iso data anchor init should be moved to where MediaTek\nclaims iso data interface.\nIf there is an unexpected BT usb disconnect during setup flow,\nit will cause a NULL pointer crash issue when releasing iso\nanchor since the anchor wasn\u0027t been init yet. Adjust the position\nto do iso data anchor init.\n\n[ 17.137991] pc : usb_kill_anchored_urbs+0x60/0x168\n[ 17.137998] lr : usb_kill_anchored_urbs+0x44/0x168\n[ 17.137999] sp : ffffffc0890cb5f0\n[ 17.138000] x29: ffffffc0890cb5f0 x28: ffffff80bb6c2e80\n[ 17.144081] gpio gpiochip0: registered chardev handle for 1 lines\n[ 17.148421] x27: 0000000000000000\n[ 17.148422] x26: ffffffd301ff4298 x25: 0000000000000003 x24: 00000000000000f0\n[ 17.148424] x23: 0000000000000000 x22: 00000000ffffffff x21: 0000000000000001\n[ 17.148425] x20: ffffffffffffffd8 x19: ffffff80c0f25560 x18: 0000000000000000\n[ 17.148427] x17: ffffffd33864e408 x16: ffffffd33808f7c8 x15: 0000000000200000\n[ 17.232789] x14: e0cd73cf80ffffff x13: 50f2137c0a0338c9 x12: 0000000000000001\n[ 17.239912] x11: 0000000080150011 x10: 0000000000000002 x9 : 0000000000000001\n[ 17.247035] x8 : 0000000000000000 x7 : 0000000000008080 x6 : 8080000000000000\n[ 17.254158] x5 : ffffffd33808ebc0 x4 : fffffffe033dcf20 x3 : 0000000080150011\n[ 17.261281] x2 : ffffff8087a91400 x1 : 0000000000000000 x0 : ffffff80c0f25588\n[ 17.268404] Call trace:\n[ 17.270841] usb_kill_anchored_urbs+0x60/0x168\n[ 17.275274] btusb_mtk_release_iso_intf+0x2c/0xd8 [btusb (HASH:5afe 6)]\n[ 17.284226] btusb_mtk_disconnect+0x14/0x28 [btusb (HASH:5afe 6)]\n[ 17.292652] btusb_disconnect+0x70/0x140 [btusb (HASH:5afe 6)]\n[ 17.300818] usb_unbind_interface+0xc4/0x240\n[ 17.305079] device_release_driver_internal+0x18c/0x258\n[ 17.310296] device_release_driver+0x1c/0x30\n[ 17.314557] bus_remove_device+0x140/0x160\n[ 17.318643] device_del+0x1c0/0x330\n[ 17.322121] usb_disable_device+0x80/0x180\n[ 17.326207] usb_disconnect+0xec/0x300\n[ 17.329948] hub_quiesce+0x80/0xd0\n[ 17.333339] hub_disconnect+0x44/0x190\n[ 17.337078] usb_unbind_interface+0xc4/0x240\n[ 17.341337] device_release_driver_internal+0x18c/0x258\n[ 17.346551] device_release_driver+0x1c/0x30\n[ 17.350810] usb_driver_release_interface+0x70/0x88\n[ 17.355677] proc_ioctl+0x13c/0x228\n[ 17.359157] proc_ioctl_default+0x50/0x80\n[ 17.363155] usbdev_ioctl+0x830/0xd08\n[ 17.366808] __arm64_sys_ioctl+0x94/0xd0\n[ 17.370723] invoke_syscall+0x6c/0xf8\n[ 17.374377] el0_svc_common+0x84/0xe0\n[ 17.378030] do_el0_svc+0x20/0x30\n[ 17.381334] el0_svc+0x34/0x60\n[ 17.384382] el0t_64_sync_handler+0x88/0xf0\n[ 17.388554] el0t_64_sync+0x180/0x188\n[ 17.392208] Code: f9400677 f100a2f4 54fffea0 d503201f (b8350288)\n[ 17.398289] ---[ end trace 0000000000000000 ]---"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: btmtk: ajuste la posici\u00f3n para inicializar el ancla de datos iso. La inicializaci\u00f3n del ancla de datos iso de MediaTek debe moverse a donde MediaTek afirma que tiene interfaz de datos iso. Si hay una desconexi\u00f3n USB de BT inesperada durante el flujo de configuraci\u00f3n, provocar\u00e1 un problema de bloqueo del puntero NULL al liberar el ancla iso, ya que el ancla a\u00fan no se hab\u00eda inicializado. Ajuste la posici\u00f3n para inicializar el ancla de datos iso. [ 17.137991] pc : usb_kill_anchored_urbs+0x60/0x168 [ 17.137998] lr : usb_kill_anchored_urbs+0x44/0x168 [ 17.137999] sp : ffffffc0890cb5f0 [ 17.138000] x29: ffffffc0890cb5f0 x28: ffffff80bb6c2e80 [ 17.144081] gpio gpiochip0: identificador chardev registrado para 1 l\u00edneas [ 17.148421] x27: 0000000000000000 [ 17.148422] x26: ffffffd301ff4298 x25: 00000000000000003 x24: 00000000000000f0 [ 17.148424] x23: 0000000000000000 x22: 00000000ffffffff x21: 0000000000000001 [ 17.148425] x20: ffffffffffffffd8 x19: ffffff80c0f25560 x18: 0000000000000000 [ 17.148427] x17: ffffffd33864e408 x16: ffffffd33808f7c8 x15: 0000000000200000 [ 17.232789] x14: e0cd73cf80ffffff x13: 50f2137c0a0338c9 x12: 0000000000000001 [ 17.239912] x11: 0000000080150011 x10: 0000000000000002 x9: 0000000000000001 [ 17.247035] x8: 0000000000000000 x7: 0000000000008080 x6: 8080000000000000 [ 17.254158] x5: ffffffd33808ebc0 x4 : fffffffe033dcf20 x3 : 0000000080150011 [ 17.261281] x2 : ffffff8087a91400 x1 : 0000000000000000 x0 : ffffff80c0f25588 [ 17.268404] Rastreo de llamadas: [ 17.270841] usb_kill_anchored_urbs+0x60/0x168 [ 17.275274] btusb_mtk_release_iso_intf+0x2c/0xd8 [btusb (HASH:5afe 6)] [ 17.284226] btusb_mtk_disconnect+0x14/0x28 [btusb (HASH:5afe 6)] [ 17.292652] btusb_disconnect+0x70/0x140 [btusb (HASH:5afe 6)] [ 17.300818] interfaz_desvinculaci\u00f3n_usb+0xc4/0x240 [ 17.305079] controlador_liberaci\u00f3n_dispositivo_interno+0x18c/0x258 [ 17.310296] controlador_liberaci\u00f3n_dispositivo+0x1c/0x30 [ 17.314557] dispositivo_eliminaci\u00f3n_bus+0x140/0x160 [ 17.318643] dispositivo_del+0x1c0/0x330 [ 17.322121] usb_disable_device+0x80/0x180 [ 17.326207] usb_disconnect+0xec/0x300 [ 17.329948] hub_quiesce+0x80/0xd0 [ 17.333339] hub_disconnect+0x44/0x190 [ 17.337078] usb_unbind_interface+0xc4/0x240 [ 17.341337] device_release_driver_internal+0x18c/0x258 [ 17.346551] device_release_driver+0x1c/0x30 [ 17.350810] usb_driver_release_interface+0x70/0x88 [ 17.355677] El0_svc_common+0x84/0xe0 [ 17.378030] El0_svc+0x20/0x30 [ 17.381334] El0_svc+0x34/0x60 [ 17.384382] el0t_64_sync_handler+0x88/0xf0 [ 17.388554] el0t_64_sync+0x180/0x188 [ 17.392208] C\u00f3digo: f9400677 f100a2f4 54fffea0 d503201f (b8350288) [ 17.398289] ---[ fin de seguimiento 0000000000000000 ]---"
}
],
"id": "CVE-2024-53238",
"lastModified": "2025-10-01T20:17:23.563",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-27T14:15:32.253",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/1219c211ccd061cde002cc5708692efca515a7a0"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/61c5a3def90ac729a538e5ca5ff7f461cff72776"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/d8bd79f0eea9c07d90ce870a714ab5c10afaa4b3"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-89VJ-8Q5M-MJ67
Vulnerability from github – Published: 2024-12-27 15:31 – Updated: 2025-01-08 18:30In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btmtk: adjust the position to init iso data anchor
MediaTek iso data anchor init should be moved to where MediaTek claims iso data interface. If there is an unexpected BT usb disconnect during setup flow, it will cause a NULL pointer crash issue when releasing iso anchor since the anchor wasn't been init yet. Adjust the position to do iso data anchor init.
[ 17.137991] pc : usb_kill_anchored_urbs+0x60/0x168 [ 17.137998] lr : usb_kill_anchored_urbs+0x44/0x168 [ 17.137999] sp : ffffffc0890cb5f0 [ 17.138000] x29: ffffffc0890cb5f0 x28: ffffff80bb6c2e80 [ 17.144081] gpio gpiochip0: registered chardev handle for 1 lines [ 17.148421] x27: 0000000000000000 [ 17.148422] x26: ffffffd301ff4298 x25: 0000000000000003 x24: 00000000000000f0 [ 17.148424] x23: 0000000000000000 x22: 00000000ffffffff x21: 0000000000000001 [ 17.148425] x20: ffffffffffffffd8 x19: ffffff80c0f25560 x18: 0000000000000000 [ 17.148427] x17: ffffffd33864e408 x16: ffffffd33808f7c8 x15: 0000000000200000 [ 17.232789] x14: e0cd73cf80ffffff x13: 50f2137c0a0338c9 x12: 0000000000000001 [ 17.239912] x11: 0000000080150011 x10: 0000000000000002 x9 : 0000000000000001 [ 17.247035] x8 : 0000000000000000 x7 : 0000000000008080 x6 : 8080000000000000 [ 17.254158] x5 : ffffffd33808ebc0 x4 : fffffffe033dcf20 x3 : 0000000080150011 [ 17.261281] x2 : ffffff8087a91400 x1 : 0000000000000000 x0 : ffffff80c0f25588 [ 17.268404] Call trace: [ 17.270841] usb_kill_anchored_urbs+0x60/0x168 [ 17.275274] btusb_mtk_release_iso_intf+0x2c/0xd8 [btusb (HASH:5afe 6)] [ 17.284226] btusb_mtk_disconnect+0x14/0x28 [btusb (HASH:5afe 6)] [ 17.292652] btusb_disconnect+0x70/0x140 [btusb (HASH:5afe 6)] [ 17.300818] usb_unbind_interface+0xc4/0x240 [ 17.305079] device_release_driver_internal+0x18c/0x258 [ 17.310296] device_release_driver+0x1c/0x30 [ 17.314557] bus_remove_device+0x140/0x160 [ 17.318643] device_del+0x1c0/0x330 [ 17.322121] usb_disable_device+0x80/0x180 [ 17.326207] usb_disconnect+0xec/0x300 [ 17.329948] hub_quiesce+0x80/0xd0 [ 17.333339] hub_disconnect+0x44/0x190 [ 17.337078] usb_unbind_interface+0xc4/0x240 [ 17.341337] device_release_driver_internal+0x18c/0x258 [ 17.346551] device_release_driver+0x1c/0x30 [ 17.350810] usb_driver_release_interface+0x70/0x88 [ 17.355677] proc_ioctl+0x13c/0x228 [ 17.359157] proc_ioctl_default+0x50/0x80 [ 17.363155] usbdev_ioctl+0x830/0xd08 [ 17.366808] __arm64_sys_ioctl+0x94/0xd0 [ 17.370723] invoke_syscall+0x6c/0xf8 [ 17.374377] el0_svc_common+0x84/0xe0 [ 17.378030] do_el0_svc+0x20/0x30 [ 17.381334] el0_svc+0x34/0x60 [ 17.384382] el0t_64_sync_handler+0x88/0xf0 [ 17.388554] el0t_64_sync+0x180/0x188 [ 17.392208] Code: f9400677 f100a2f4 54fffea0 d503201f (b8350288) [ 17.398289] ---[ end trace 0000000000000000 ]---
{
"affected": [],
"aliases": [
"CVE-2024-53238"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-27T14:15:32Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btmtk: adjust the position to init iso data anchor\n\nMediaTek iso data anchor init should be moved to where MediaTek\nclaims iso data interface.\nIf there is an unexpected BT usb disconnect during setup flow,\nit will cause a NULL pointer crash issue when releasing iso\nanchor since the anchor wasn\u0027t been init yet. Adjust the position\nto do iso data anchor init.\n\n[ 17.137991] pc : usb_kill_anchored_urbs+0x60/0x168\n[ 17.137998] lr : usb_kill_anchored_urbs+0x44/0x168\n[ 17.137999] sp : ffffffc0890cb5f0\n[ 17.138000] x29: ffffffc0890cb5f0 x28: ffffff80bb6c2e80\n[ 17.144081] gpio gpiochip0: registered chardev handle for 1 lines\n[ 17.148421] x27: 0000000000000000\n[ 17.148422] x26: ffffffd301ff4298 x25: 0000000000000003 x24: 00000000000000f0\n[ 17.148424] x23: 0000000000000000 x22: 00000000ffffffff x21: 0000000000000001\n[ 17.148425] x20: ffffffffffffffd8 x19: ffffff80c0f25560 x18: 0000000000000000\n[ 17.148427] x17: ffffffd33864e408 x16: ffffffd33808f7c8 x15: 0000000000200000\n[ 17.232789] x14: e0cd73cf80ffffff x13: 50f2137c0a0338c9 x12: 0000000000000001\n[ 17.239912] x11: 0000000080150011 x10: 0000000000000002 x9 : 0000000000000001\n[ 17.247035] x8 : 0000000000000000 x7 : 0000000000008080 x6 : 8080000000000000\n[ 17.254158] x5 : ffffffd33808ebc0 x4 : fffffffe033dcf20 x3 : 0000000080150011\n[ 17.261281] x2 : ffffff8087a91400 x1 : 0000000000000000 x0 : ffffff80c0f25588\n[ 17.268404] Call trace:\n[ 17.270841] usb_kill_anchored_urbs+0x60/0x168\n[ 17.275274] btusb_mtk_release_iso_intf+0x2c/0xd8 [btusb (HASH:5afe 6)]\n[ 17.284226] btusb_mtk_disconnect+0x14/0x28 [btusb (HASH:5afe 6)]\n[ 17.292652] btusb_disconnect+0x70/0x140 [btusb (HASH:5afe 6)]\n[ 17.300818] usb_unbind_interface+0xc4/0x240\n[ 17.305079] device_release_driver_internal+0x18c/0x258\n[ 17.310296] device_release_driver+0x1c/0x30\n[ 17.314557] bus_remove_device+0x140/0x160\n[ 17.318643] device_del+0x1c0/0x330\n[ 17.322121] usb_disable_device+0x80/0x180\n[ 17.326207] usb_disconnect+0xec/0x300\n[ 17.329948] hub_quiesce+0x80/0xd0\n[ 17.333339] hub_disconnect+0x44/0x190\n[ 17.337078] usb_unbind_interface+0xc4/0x240\n[ 17.341337] device_release_driver_internal+0x18c/0x258\n[ 17.346551] device_release_driver+0x1c/0x30\n[ 17.350810] usb_driver_release_interface+0x70/0x88\n[ 17.355677] proc_ioctl+0x13c/0x228\n[ 17.359157] proc_ioctl_default+0x50/0x80\n[ 17.363155] usbdev_ioctl+0x830/0xd08\n[ 17.366808] __arm64_sys_ioctl+0x94/0xd0\n[ 17.370723] invoke_syscall+0x6c/0xf8\n[ 17.374377] el0_svc_common+0x84/0xe0\n[ 17.378030] do_el0_svc+0x20/0x30\n[ 17.381334] el0_svc+0x34/0x60\n[ 17.384382] el0t_64_sync_handler+0x88/0xf0\n[ 17.388554] el0t_64_sync+0x180/0x188\n[ 17.392208] Code: f9400677 f100a2f4 54fffea0 d503201f (b8350288)\n[ 17.398289] ---[ end trace 0000000000000000 ]---",
"id": "GHSA-89vj-8q5m-mj67",
"modified": "2025-01-08T18:30:47Z",
"published": "2024-12-27T15:31:52Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53238"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/1219c211ccd061cde002cc5708692efca515a7a0"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/61c5a3def90ac729a538e5ca5ff7f461cff72776"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d8bd79f0eea9c07d90ce870a714ab5c10afaa4b3"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2024-3762
Vulnerability from csaf_certbund - Published: 2024-12-29 23:00 - Updated: 2026-04-09 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und um nicht n\u00e4her beschriebene Effekte zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3762 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3762.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3762 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3762"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53180",
"url": "https://lore.kernel.org/linux-cve-announce/2024122719-CVE-2024-53180-78ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53182",
"url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-53182-8a61@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53183",
"url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-53183-9efa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53184",
"url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-53184-1a1c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53185",
"url": "https://lore.kernel.org/linux-cve-announce/2024122721-CVE-2024-53185-16d6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53186",
"url": "https://lore.kernel.org/linux-cve-announce/2024122721-CVE-2024-53186-7c05@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53187",
"url": "https://lore.kernel.org/linux-cve-announce/2024122722-CVE-2024-53187-909e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53188",
"url": "https://lore.kernel.org/linux-cve-announce/2024122722-CVE-2024-53188-be4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53189",
"url": "https://lore.kernel.org/linux-cve-announce/2024122722-CVE-2024-53189-1b90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53194",
"url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-53194-9edf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53195",
"url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-53195-772a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53196",
"url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53196-758a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53197",
"url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53197-6aef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53198",
"url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53198-ce0e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53199",
"url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-53199-3a00@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53200",
"url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-53200-1320@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53201",
"url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-53201-2534@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53202",
"url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-53202-f699@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53203",
"url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-53203-80fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53204",
"url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-53204-0f6e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53205",
"url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-53205-1be1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53206",
"url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-53206-d85d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53207",
"url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-53207-72f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53208",
"url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-53208-dff3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53209",
"url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-53209-b6b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53210",
"url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-53210-c51c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53211",
"url": "https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-53211-9837@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53212",
"url": "https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-53212-495a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53213",
"url": "https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-53213-baa6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53214",
"url": "https://lore.kernel.org/linux-cve-announce/2024122731-CVE-2024-53214-5fbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53215",
"url": "https://lore.kernel.org/linux-cve-announce/2024122731-CVE-2024-53215-7de4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53216",
"url": "https://lore.kernel.org/linux-cve-announce/2024122732-CVE-2024-53216-ba8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53217",
"url": "https://lore.kernel.org/linux-cve-announce/2024122732-CVE-2024-53217-4f05@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53218",
"url": "https://lore.kernel.org/linux-cve-announce/2024122732-CVE-2024-53218-4330@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53219",
"url": "https://lore.kernel.org/linux-cve-announce/2024122733-CVE-2024-53219-1a04@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53220",
"url": "https://lore.kernel.org/linux-cve-announce/2024122733-CVE-2024-53220-3664@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53221",
"url": "https://lore.kernel.org/linux-cve-announce/2024122733-CVE-2024-53221-d8b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53222",
"url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-53222-6c79@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53223",
"url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-53223-7669@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53224",
"url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-53224-2509@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53225",
"url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-53225-8deb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53226",
"url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-53226-5c23@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53227",
"url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-53227-d872@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53228",
"url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-53228-0c5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53229",
"url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-53229-f5cc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53230",
"url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-53230-5851@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53231",
"url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-53231-fe0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53232",
"url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-53232-6919@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53233",
"url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-53233-ab02@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53234",
"url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-53234-4ee6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53235",
"url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-53235-80a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53236",
"url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-53236-0ab4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53237",
"url": "https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-53237-2fa6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53238",
"url": "https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-53238-ea1c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53239",
"url": "https://lore.kernel.org/linux-cve-announce/2024122740-CVE-2024-53239-b661@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56531",
"url": "https://lore.kernel.org/linux-cve-announce/2024122721-CVE-2024-56531-6a91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56532",
"url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-56532-6931@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56533",
"url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-56533-5de6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56534",
"url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-56534-6e4d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56535",
"url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-56535-4683@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56536",
"url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-56536-a7c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56537",
"url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-56537-59f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56538",
"url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-56538-379d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56539",
"url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-56539-4d60@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56540",
"url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-56540-d2f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56541",
"url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-56541-1c83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56542",
"url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-56542-d3dc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56543",
"url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-56543-a959@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56544",
"url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-56544-42cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56545",
"url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-56545-0bfa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56546",
"url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-56546-3138@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56547",
"url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-56547-c340@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56548",
"url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-56548-8bfd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56549",
"url": "https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-56549-ebcd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56550",
"url": "https://lore.kernel.org/linux-cve-announce/2024122701-CVE-2024-56550-68f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56551",
"url": "https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56551-4ad2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56552",
"url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56552-aca0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56553",
"url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56553-e097@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56554",
"url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56554-9ee7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56555",
"url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56555-6abc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56556",
"url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56556-96b8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56557",
"url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56557-7440@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56558",
"url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56558-9fd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56559",
"url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56559-b560@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56560",
"url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56560-e044@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56561",
"url": "https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56561-a041@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56562",
"url": "https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56562-9fd5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56563",
"url": "https://lore.kernel.org/linux-cve-announce/2024122714-CVE-2024-56563-148f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56564",
"url": "https://lore.kernel.org/linux-cve-announce/2024122714-CVE-2024-56564-7587@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56565",
"url": "https://lore.kernel.org/linux-cve-announce/2024122714-CVE-2024-56565-1a08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56566",
"url": "https://lore.kernel.org/linux-cve-announce/2024122715-CVE-2024-56566-0a7e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56567",
"url": "https://lore.kernel.org/linux-cve-announce/2024122715-CVE-2024-56567-a306@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56568",
"url": "https://lore.kernel.org/linux-cve-announce/2024122715-CVE-2024-56568-76a5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56569",
"url": "https://lore.kernel.org/linux-cve-announce/2024122716-CVE-2024-56569-cc71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56570",
"url": "https://lore.kernel.org/linux-cve-announce/2024122716-CVE-2024-56570-7580@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56571",
"url": "https://lore.kernel.org/linux-cve-announce/2024122716-CVE-2024-56571-2bbc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56572",
"url": "https://lore.kernel.org/linux-cve-announce/2024122717-CVE-2024-56572-b0fd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56573",
"url": "https://lore.kernel.org/linux-cve-announce/2024122717-CVE-2024-56573-f5d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56574",
"url": "https://lore.kernel.org/linux-cve-announce/2024122717-CVE-2024-56574-68a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56575",
"url": "https://lore.kernel.org/linux-cve-announce/2024122718-CVE-2024-56575-5f0b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56576",
"url": "https://lore.kernel.org/linux-cve-announce/2024122718-CVE-2024-56576-9756@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56577",
"url": "https://lore.kernel.org/linux-cve-announce/2024122718-CVE-2024-56577-42c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56578",
"url": "https://lore.kernel.org/linux-cve-announce/2024122719-CVE-2024-56578-48e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56579",
"url": "https://lore.kernel.org/linux-cve-announce/2024122719-CVE-2024-56579-6134@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56580",
"url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-56580-40b9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56581",
"url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-56581-501d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56582",
"url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-56582-17af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56583",
"url": "https://lore.kernel.org/linux-cve-announce/2024122754-CVE-2024-56583-b1dc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56584",
"url": "https://lore.kernel.org/linux-cve-announce/2024122757-CVE-2024-56584-dad9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56585",
"url": "https://lore.kernel.org/linux-cve-announce/2024122757-CVE-2024-56585-ad56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56586",
"url": "https://lore.kernel.org/linux-cve-announce/2024122757-CVE-2024-56586-bece@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56587",
"url": "https://lore.kernel.org/linux-cve-announce/2024122758-CVE-2024-56587-1786@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56588",
"url": "https://lore.kernel.org/linux-cve-announce/2024122758-CVE-2024-56588-87ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56589",
"url": "https://lore.kernel.org/linux-cve-announce/2024122758-CVE-2024-56589-5cce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56590",
"url": "https://lore.kernel.org/linux-cve-announce/2024122759-CVE-2024-56590-d4ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56591",
"url": "https://lore.kernel.org/linux-cve-announce/2024122759-CVE-2024-56591-eaf9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56592",
"url": "https://lore.kernel.org/linux-cve-announce/2024122700-CVE-2024-56592-d4b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56593",
"url": "https://lore.kernel.org/linux-cve-announce/2024122700-CVE-2024-56593-3974@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56594",
"url": "https://lore.kernel.org/linux-cve-announce/2024122700-CVE-2024-56594-3c24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56595",
"url": "https://lore.kernel.org/linux-cve-announce/2024122701-CVE-2024-56595-0584@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56596",
"url": "https://lore.kernel.org/linux-cve-announce/2024122701-CVE-2024-56596-2add@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56597",
"url": "https://lore.kernel.org/linux-cve-announce/2024122701-CVE-2024-56597-d77b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56598",
"url": "https://lore.kernel.org/linux-cve-announce/2024122702-CVE-2024-56598-3955@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56599",
"url": "https://lore.kernel.org/linux-cve-announce/2024122702-CVE-2024-56599-54af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56600",
"url": "https://lore.kernel.org/linux-cve-announce/2024122702-CVE-2024-56600-7867@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56601",
"url": "https://lore.kernel.org/linux-cve-announce/2024122703-CVE-2024-56601-2150@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56602",
"url": "https://lore.kernel.org/linux-cve-announce/2024122703-CVE-2024-56602-d030@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56603",
"url": "https://lore.kernel.org/linux-cve-announce/2024122703-CVE-2024-56603-3db8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56604",
"url": "https://lore.kernel.org/linux-cve-announce/2024122704-CVE-2024-56604-8494@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56605",
"url": "https://lore.kernel.org/linux-cve-announce/2024122704-CVE-2024-56605-d424@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56606",
"url": "https://lore.kernel.org/linux-cve-announce/2024122704-CVE-2024-56606-bf3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56607",
"url": "https://lore.kernel.org/linux-cve-announce/2024122705-CVE-2024-56607-031e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56608",
"url": "https://lore.kernel.org/linux-cve-announce/2024122705-CVE-2024-56608-30fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56609",
"url": "https://lore.kernel.org/linux-cve-announce/2024122706-CVE-2024-56609-7fe3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56610",
"url": "https://lore.kernel.org/linux-cve-announce/2024122706-CVE-2024-56610-905f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56611",
"url": "https://lore.kernel.org/linux-cve-announce/2024122706-CVE-2024-56611-262a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56612",
"url": "https://lore.kernel.org/linux-cve-announce/2024122707-CVE-2024-56612-a24e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56613",
"url": "https://lore.kernel.org/linux-cve-announce/2024122707-CVE-2024-56613-0897@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56614",
"url": "https://lore.kernel.org/linux-cve-announce/2024122707-CVE-2024-56614-17c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56615",
"url": "https://lore.kernel.org/linux-cve-announce/2024122708-CVE-2024-56615-5148@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56616",
"url": "https://lore.kernel.org/linux-cve-announce/2024122708-CVE-2024-56616-ae89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56617",
"url": "https://lore.kernel.org/linux-cve-announce/2024122708-CVE-2024-56617-7f21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56618",
"url": "https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56618-44a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56619",
"url": "https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56619-501d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56620",
"url": "https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56620-d1a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56621",
"url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56621-98bf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56622",
"url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56622-cee7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56623",
"url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56623-e4c7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56624",
"url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56624-35f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56625",
"url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56625-82a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56626",
"url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56626-f2f9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56627",
"url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56627-f398@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56628",
"url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56628-c347@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56629",
"url": "https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56629-83fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56630",
"url": "https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56630-c856@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56631",
"url": "https://lore.kernel.org/linux-cve-announce/2024122731-CVE-2024-56631-548f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56632",
"url": "https://lore.kernel.org/linux-cve-announce/2024122733-CVE-2024-56632-ea20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56633",
"url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-56633-ac1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56634",
"url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-56634-f6d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56635",
"url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-56635-3014@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56636",
"url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-56636-cdeb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56637",
"url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-56637-23bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56638",
"url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-56638-3a3d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56639",
"url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-56639-809a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56640",
"url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-56640-ef22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56641",
"url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-56641-5492@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56642",
"url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56642-71ee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56643",
"url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56643-8470@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56644",
"url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56644-83c2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56645",
"url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-56645-bc11@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56646",
"url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-56646-e78e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56647",
"url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-56647-d71f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56648",
"url": "https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-56648-5623@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56649",
"url": "https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-56649-33a6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56650",
"url": "https://lore.kernel.org/linux-cve-announce/2024122740-CVE-2024-56650-4d51@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56651",
"url": "https://lore.kernel.org/linux-cve-announce/2024122740-CVE-2024-56651-2d22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56652",
"url": "https://lore.kernel.org/linux-cve-announce/2024122748-CVE-2024-56652-31db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56653",
"url": "https://lore.kernel.org/linux-cve-announce/2024122749-CVE-2024-56653-bb35@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56654",
"url": "https://lore.kernel.org/linux-cve-announce/2024122749-CVE-2024-56654-66a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56655",
"url": "https://lore.kernel.org/linux-cve-announce/2024122749-CVE-2024-56655-e94f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56656",
"url": "https://lore.kernel.org/linux-cve-announce/2024122750-CVE-2024-56656-84a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56657",
"url": "https://lore.kernel.org/linux-cve-announce/2024122750-CVE-2024-56657-4f33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56658",
"url": "https://lore.kernel.org/linux-cve-announce/2024122750-CVE-2024-56658-01fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56659",
"url": "https://lore.kernel.org/linux-cve-announce/2024122751-CVE-2024-56659-6675@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56660",
"url": "https://lore.kernel.org/linux-cve-announce/2024122751-CVE-2024-56660-fb9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56661",
"url": "https://lore.kernel.org/linux-cve-announce/2024122751-CVE-2024-56661-a403@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56662",
"url": "https://lore.kernel.org/linux-cve-announce/2024122752-CVE-2024-56662-b7e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56663",
"url": "https://lore.kernel.org/linux-cve-announce/2024122752-CVE-2024-56663-66d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56664",
"url": "https://lore.kernel.org/linux-cve-announce/2024122752-CVE-2024-56664-9dc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56665",
"url": "https://lore.kernel.org/linux-cve-announce/2024122753-CVE-2024-56665-5df3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56666",
"url": "https://lore.kernel.org/linux-cve-announce/2024122753-CVE-2024-56666-93aa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56667",
"url": "https://lore.kernel.org/linux-cve-announce/2024122753-CVE-2024-56667-3c3f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56668",
"url": "https://lore.kernel.org/linux-cve-announce/2024122754-CVE-2024-56668-0d8d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56669",
"url": "https://lore.kernel.org/linux-cve-announce/2024122754-CVE-2024-56669-2ea9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56670",
"url": "https://lore.kernel.org/linux-cve-announce/2024122755-CVE-2024-56670-929d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56671",
"url": "https://lore.kernel.org/linux-cve-announce/2024122755-CVE-2024-56671-89d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56672",
"url": "https://lore.kernel.org/linux-cve-announce/2024122755-CVE-2024-56672-8d29@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56673",
"url": "https://lore.kernel.org/linux-cve-announce/2024122756-CVE-2024-56673-1ce5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56674",
"url": "https://lore.kernel.org/linux-cve-announce/2024122756-CVE-2024-56674-8005@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56675",
"url": "https://lore.kernel.org/linux-cve-announce/2024122756-CVE-2024-56675-e996@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56676",
"url": "https://lore.kernel.org/linux-cve-announce/2024122829-CVE-2024-56676-0d17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56677",
"url": "https://lore.kernel.org/linux-cve-announce/2024122831-CVE-2024-56677-f922@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56678",
"url": "https://lore.kernel.org/linux-cve-announce/2024122832-CVE-2024-56678-977d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56679",
"url": "https://lore.kernel.org/linux-cve-announce/2024122832-CVE-2024-56679-02b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56680",
"url": "https://lore.kernel.org/linux-cve-announce/2024122832-CVE-2024-56680-fac9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56681",
"url": "https://lore.kernel.org/linux-cve-announce/2024122832-CVE-2024-56681-d0c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56682",
"url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56682-3219@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56683",
"url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56683-14c3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56684",
"url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56684-55a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56685",
"url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56685-f49e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56686",
"url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56686-b432@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56687",
"url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56687-99e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56688",
"url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56688-4e02@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56689",
"url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56689-69ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56690",
"url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56690-b77f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56691",
"url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56691-c981@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56692",
"url": "https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56692-e6ad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56693",
"url": "https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56693-b3c6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56694",
"url": "https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56694-c701@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56695",
"url": "https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56695-110a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56696",
"url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56696-2b90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56697",
"url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56697-062c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56698",
"url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56698-6b0b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56699",
"url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56699-a3d3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56700",
"url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56700-d3d1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56701",
"url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56701-d424@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56702",
"url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56702-172d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56703",
"url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56703-683a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56704",
"url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56704-881e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56705",
"url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56705-049b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56706",
"url": "https://lore.kernel.org/linux-cve-announce/2024122838-CVE-2024-56706-d292@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56707",
"url": "https://lore.kernel.org/linux-cve-announce/2024122838-CVE-2024-56707-783f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56708",
"url": "https://lore.kernel.org/linux-cve-announce/2024122838-CVE-2024-56708-2702@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56709",
"url": "https://lore.kernel.org/linux-cve-announce/2024122918-CVE-2024-56709-655c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56710",
"url": "https://lore.kernel.org/linux-cve-announce/2024122913-CVE-2024-56710-78af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56711",
"url": "https://lore.kernel.org/linux-cve-announce/2024122913-CVE-2024-56711-d4f9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56712",
"url": "https://lore.kernel.org/linux-cve-announce/2024122914-CVE-2024-56712-d62a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56713",
"url": "https://lore.kernel.org/linux-cve-announce/2024122914-CVE-2024-56713-f78a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56714",
"url": "https://lore.kernel.org/linux-cve-announce/2024122914-CVE-2024-56714-0de2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56715",
"url": "https://lore.kernel.org/linux-cve-announce/2024122915-CVE-2024-56715-7db1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56716",
"url": "https://lore.kernel.org/linux-cve-announce/2024122915-CVE-2024-56716-7a52@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56717",
"url": "https://lore.kernel.org/linux-cve-announce/2024122915-CVE-2024-56717-546c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56718",
"url": "https://lore.kernel.org/linux-cve-announce/2024122915-CVE-2024-56718-be98@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56719",
"url": "https://lore.kernel.org/linux-cve-announce/2024122916-CVE-2024-56719-609b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56720",
"url": "https://lore.kernel.org/linux-cve-announce/2024122920-CVE-2024-56720-614a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56721",
"url": "https://lore.kernel.org/linux-cve-announce/2024122922-CVE-2024-56721-aaac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56722",
"url": "https://lore.kernel.org/linux-cve-announce/2024122923-CVE-2024-56722-5594@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56723",
"url": "https://lore.kernel.org/linux-cve-announce/2024122923-CVE-2024-56723-f74b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56724",
"url": "https://lore.kernel.org/linux-cve-announce/2024122923-CVE-2024-56724-a800@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56725",
"url": "https://lore.kernel.org/linux-cve-announce/2024122923-CVE-2024-56725-af15@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56726",
"url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56726-3a9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56727",
"url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56727-41d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56728",
"url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56728-68d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56729",
"url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56729-8f1c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56730",
"url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56730-3e54@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56739",
"url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56739-0a67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56740",
"url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56740-6b7b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56741",
"url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56741-3dbc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56742",
"url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56742-b3d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56743",
"url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56743-39a5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56744",
"url": "https://lore.kernel.org/linux-cve-announce/2024122926-CVE-2024-56744-fc8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56745",
"url": "https://lore.kernel.org/linux-cve-announce/2024122926-CVE-2024-56745-b06b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56746",
"url": "https://lore.kernel.org/linux-cve-announce/2024122926-CVE-2024-56746-d329@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56747",
"url": "https://lore.kernel.org/linux-cve-announce/2024122926-CVE-2024-56747-7c03@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56748",
"url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56748-eb85@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56749",
"url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56749-14d1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56750",
"url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56750-db4d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56751",
"url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56751-bcf3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56752",
"url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56752-09d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56753",
"url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56753-32df@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56754",
"url": "https://lore.kernel.org/linux-cve-announce/2024122928-CVE-2024-56754-9c9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56755",
"url": "https://lore.kernel.org/linux-cve-announce/2024122928-CVE-2024-56755-b189@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56756",
"url": "https://lore.kernel.org/linux-cve-announce/2024122928-CVE-2024-56756-32fb@gregkh/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20018 vom 2025-01-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20018.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20019 vom 2025-01-14",
"url": "http://linux.oracle.com/errata/ELSA-2025-20019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0152-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0203-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MOWH4UGAPWTJ6YHNMWYKOS2OKUX53GLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7221-1 vom 2025-01-22",
"url": "https://ubuntu.com/security/notices/USN-7221-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0202-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BJBRXAP3YP5FGCBO64GJZN6ZQOUKD53F/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0230-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-061 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-061.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-079 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-079.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0231-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-195 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-195.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-062 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-062.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-197 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-197.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-196 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-196.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5860 vom 2025-02-08",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00023.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0428-1 vom 2025-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20100 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0517-1 vom 2025-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0499-1 vom 2025-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0556-1 vom 2025-02-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0557-1 vom 2025-02-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0555-1 vom 2025-02-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0565-1 vom 2025-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0564-1 vom 2025-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0577-1 vom 2025-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0576-1 vom 2025-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7277-1 vom 2025-02-19",
"url": "https://ubuntu.com/security/notices/USN-7277-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7276-1 vom 2025-02-19",
"url": "https://ubuntu.com/security/notices/USN-7276-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0603-1 vom 2025-02-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0517-2 vom 2025-02-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-094 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-094.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-063 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-063.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7310-1 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7310-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4076 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4075 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0771-1 vom 2025-03-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6X627UISONPV7CQLLHUDVJCDEIODQO4O/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7323-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7323-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7329-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7329-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7327-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7327-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0784-1 vom 2025-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7331-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7331-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7328-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7328-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-201 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-201.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-199 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-199.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7323-2 vom 2025-03-06",
"url": "https://ubuntu.com/security/notices/USN-7323-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-200 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-200.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1961 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/ALAS-2025-1961.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2474 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2474"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2475 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2475"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2476 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2476"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2473 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2473"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2775 vom 2025-03-07",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2775.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2490 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2490"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2489 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2489"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2488 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2488"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2514 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2514"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2501 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2501"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2510 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2510"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2512 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2512"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2517 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2517"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2528 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2528"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2524 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2524"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2525 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2525"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20152 vom 2025-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20152.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2473 vom 2025-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-2473.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2627 vom 2025-03-11",
"url": "https://access.redhat.com/errata/RHSA-2025:2627"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2646 vom 2025-03-11",
"url": "https://access.redhat.com/errata/RHSA-2025:2646"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0833-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020502.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0577-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0833-1 vom 2025-03-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVOTJPDFQQWPNLUFPKTQVNNMK5RQPZGP/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0835-1 vom 2025-03-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LBO7AHILADM6B4UZWMWGQKE6YTZU2AGF/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2627 vom 2025-03-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-2627.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0847-1 vom 2025-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7328-2 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7328-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0855-1 vom 2025-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020509.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-067 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-067.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0855-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OVTPVRIMWEEQPMDTJ24J7EW5NO7I4MQK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0853-1 vom 2025-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020506.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-096 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-096.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-082 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-082.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0855-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OVTPVRIMWEEQPMDTJ24J7EW5NO7I4MQK/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7328-3 vom 2025-03-14",
"url": "https://ubuntu.com/security/notices/USN-7328-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0867-1 vom 2025-03-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0886-1 vom 2025-03-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020529.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1966 vom 2025-03-17",
"url": "https://alas.aws.amazon.com/ALAS-2025-1966.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2705 vom 2025-03-18",
"url": "https://access.redhat.com/errata/RHSA-2025:2705"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0885-1 vom 2025-03-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020530.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0889-1 vom 2025-03-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020527.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0888-1 vom 2025-03-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020528.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0903-1 vom 2025-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020537.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0910-1 vom 2025-03-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PMKGYKPVAMPW4FP63FSEQWWVHEMWJQ4W/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0911-1 vom 2025-03-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OYWTACUZODLJ4QTEQCBEVWO6HSYPFPDZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0919-1 vom 2025-03-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5CDUDOQ553DU7Q7RIVM54ETDEW7FBDXH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0917-1 vom 2025-03-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4QSDDY3MMRA6J6OVKONDM3ZBWSDU7FXC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0906-1 vom 2025-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020539.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2710 vom 2025-03-20",
"url": "https://access.redhat.com/errata/RHSA-2025:2710"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0949-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020555.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0946-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020557.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0945-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020560.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0955-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0937-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020547.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0929-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020549.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0962-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020561.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0920-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020553.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0950-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020556.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0952-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020554.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0922-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020552.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2696 vom 2025-03-19",
"url": "https://access.redhat.com/errata/RHSA-2025:2696"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2701 vom 2025-03-20",
"url": "https://access.redhat.com/errata/RHSA-2025:2701"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20190 vom 2025-03-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-20190.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0983-1 vom 2025-03-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020579.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2800 vom 2025-03-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2800.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3055 vom 2025-03-26",
"url": "https://access.redhat.com/errata/RHSA-2025:3055"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0110-1 vom 2025-03-26",
"url": "https://ubuntu.com/security/notices/LSN-0110-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7388-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7385-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7385-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7383-2 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7383-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7383-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7383-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7382-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7382-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7387-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7381-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7381-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7386-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7386-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7380-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7380-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7384-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7384-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7379-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7379-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7391-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7391-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7389-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7390-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7393-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7387-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7387-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2501 vom 2025-03-31",
"url": "https://linux.oracle.com/errata/ELSA-2025-2501.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4102 vom 2025-04-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7384-2 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7384-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7379-2 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7379-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-4 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-4"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-087 vom 2025-04-02",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-087.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7401-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7402-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7402-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-3 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7402-2 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7402-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7403-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7403-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3301 vom 2025-04-03",
"url": "https://access.redhat.com/errata/RHSA-2025:3301"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7408-2 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7408-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7408-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-3 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7406-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7407-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7406-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-2 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7406-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-4 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7406-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7413-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7415-1 vom 2025-04-04",
"url": "https://ubuntu.com/security/notices/USN-7415-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7402-3 vom 2025-04-04",
"url": "https://ubuntu.com/security/notices/USN-7402-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7420-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7420-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-5 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7406-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7421-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7408-3 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7408-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-6 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7406-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7402-4 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7402-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7408-4 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7408-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7428-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7428-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7428-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7428-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1194-1 vom 2025-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1195-1 vom 2025-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020680.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3573 vom 2025-04-10",
"url": "https://access.redhat.com/errata/RHSA-2025:3573"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1213-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/64D5YFJLDESGQOR3OGPOEV5S4M3DYYAU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1207-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DECHNUXZTJLZSS6KYZ73PAZINXEFVAXW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1225-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMQIDOZZ3LRBGKAI3UWUKDCXNJWRXYGY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1214-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/E5GKFXZBQHJUTREIB4A5EOCW6NL3FDET/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20270 vom 2025-04-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-20270.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1236-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020691.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1232-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020692.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1231-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020693.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1257-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020699.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1259-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020698.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1248-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020697.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1238-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020690.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1252-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020696.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1254-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020695.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1260-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5C772I5KLAAUMXFCSPXGHE5ETFPZGIIY/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20271 vom 2025-04-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-20271.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1276-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HNHWRAKE373CKVYIQLYK32RFAKCWRO3X/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1275-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RNXRVNMFX7NWUIAIFLJ6AM3Z2KVVN44B/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1278-1 vom 2025-04-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020701.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1262-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YQ5OGGLUK4JYNQDMHQJCE7NAM5KWAUQ6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1263-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q4U3LRNKLFTX56NC6NKHFDU35E5WDD75/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0111-1 vom 2025-04-16",
"url": "https://ubuntu.com/security/notices/LSN-0111-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2826 vom 2025-04-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2826.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1970 vom 2025-04-17",
"url": "https://alas.aws.amazon.com/ALAS-2025-1970.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7402-5 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7402-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7450-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7453-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7452-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7451-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7449-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7455-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7455-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7462-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7462-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7449-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7460-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7460-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7459-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7455-3 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7455-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7461-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7462-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7462-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7455-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7455-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7461-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7463-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7458-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7455-4 vom 2025-04-25",
"url": "https://ubuntu.com/security/notices/USN-7455-4"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7231915 vom 2025-04-26",
"url": "https://www.ibm.com/support/pages/node/7231915"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7468-1 vom 2025-04-28",
"url": "https://ubuntu.com/security/notices/USN-7468-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1392-1 vom 2025-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020747.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1385-1 vom 2025-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020749.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1387-1 vom 2025-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020748.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7455-5 vom 2025-04-29",
"url": "https://ubuntu.com/security/notices/USN-7455-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28",
"url": "https://ubuntu.com/security/notices/USN-7459-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1402-1 vom 2025-04-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020751.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-228 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-228.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-226 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-226.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-227 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-227.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1408-1 vom 2025-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020752.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1403-1 vom 2025-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020753.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1416-1 vom 2025-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020756.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1423-1 vom 2025-05-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020762.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1425-1 vom 2025-05-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020761.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1418-1 vom 2025-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020757.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1422-1 vom 2025-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020760.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-3 vom 2025-05-02",
"url": "https://ubuntu.com/security/notices/USN-7461-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7475-1 vom 2025-05-02",
"url": "https://ubuntu.com/security/notices/USN-7475-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1444-1 vom 2025-05-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VYATS2QSLTZMNBKYQXKCWJV5AF5Z5P22/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1445-1 vom 2025-05-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GPMTFUDWFWZSMC6NLZLZHEWKB34AHTSR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1444-1 vom 2025-05-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYATS2QSLTZMNBKYQXKCWJV5AF5Z5P22/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1448-1 vom 2025-05-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/K6HQ3R43TDF2TCZD7MI4L7EGIC7Q62S4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1449-1 vom 2025-05-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7FXV2VJ2RQ3IILO3YRZFLSX7MF3HEXSP/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7492-2 vom 2025-05-06",
"url": "https://ubuntu.com/security/notices/USN-7492-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7492-1 vom 2025-05-06",
"url": "https://ubuntu.com/security/notices/USN-7492-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7498-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7498-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7500-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7500-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7500-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7500-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1467-1 vom 2025-05-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020788.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1468-1 vom 2025-05-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020787.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1463-1 vom 2025-05-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020789.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1454-1 vom 2025-05-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020790.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20320 vom 2025-05-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-20320.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13",
"url": "https://ubuntu.com/security/notices/USN-7506-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:6966"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-091 vom 2025-05-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-091.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7515-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7514-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1574-1 vom 2025-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7516-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7512-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7517-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7518-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7523-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7511-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7516-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7513-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7522-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7515-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7517-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7516-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01633-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
"url": "https://ubuntu.com/security/notices/USN-7516-5"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5925 vom 2025-05-24",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00088.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7517-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7524-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7516-6"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27",
"url": "https://ubuntu.com/security/notices/USN-7510-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-4 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7513-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7510-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20341-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020967.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7510-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-5 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7513-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-9"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0112-1 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/LSN-0112-1"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20369-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021005.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-3 vom 2025-06-03",
"url": "https://ubuntu.com/security/notices/USN-7550-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-1 vom 2025-06-03",
"url": "https://ubuntu.com/security/notices/USN-7550-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-2 vom 2025-06-03",
"url": "https://ubuntu.com/security/notices/USN-7550-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20285-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20284-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021042.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20314-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021026.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20315-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20191-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20215-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021115.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-4 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7550-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7553-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20212-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021119.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20211-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021121.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7553-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20213-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021118.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20214-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021116.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-5 vom 2025-06-05",
"url": "https://ubuntu.com/security/notices/USN-7550-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06",
"url": "https://ubuntu.com/security/notices/USN-7553-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-6 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7550-6"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01918-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-7 vom 2025-06-13",
"url": "https://ubuntu.com/security/notices/USN-7550-7"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01966-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01982-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021539.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-2 vom 2025-06-19",
"url": "https://ubuntu.com/security/notices/USN-7585-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-1 vom 2025-06-19",
"url": "https://ubuntu.com/security/notices/USN-7585-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01995-1 vom 2025-06-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021572.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7592-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7592-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7593-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-3 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02069-1 vom 2025-06-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021622.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02073-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021623.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02072-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021624.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02071-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021625.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02070-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021626.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02096-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021636.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02095-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021637.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7598-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7598-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02077-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021629.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-4 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7597-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7597-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02087-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021628.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02075-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021631.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02076-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021630.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7597-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7597-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02108-1 vom 2025-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021649.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02111-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTV4XGEFYU2GZJS4ZQIBBOKJWQIXDQJJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02108-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCVY72CXQLVJY2VD2EIDSTAZLUFI6CIO/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-3 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7585-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02110-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XSASUFU5IZ24MONOJWS4YJZUGRBEES3R/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02101-1 vom 2025-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021646.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02110-1 vom 2025-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021648.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02107-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DMJTJUWG5IUM6EPLUAS2XU22IPHTBLMK/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-4 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7585-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9584 vom 2025-06-25",
"url": "https://access.redhat.com/errata/RHSA-2025:9584"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02106-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKDDBGC6VTCRFMP6WM6AA5JMRG6RDG4B/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02116-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AAQLUV5OW5RLJANJU3SMJEALS56RYAZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02117-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KCGW37UJYNLW5YSZKM6WHKZJ32OWUQZE/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02112-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5C3JTUDN7WKVOE6UEUI2ASU6GVQEQIR6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02113-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OAB33RMXHG7GA2UKQ5SZBHUE3BNA54QZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02125-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021662.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02127-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021660.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02142-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021685.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02139-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021687.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02126-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021661.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02145-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021689.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02124-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021663.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02138-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021669.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20438-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021671.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02132-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021657.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7602-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02144-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021690.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02136-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021682.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20436-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021673.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20437-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021672.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02145-1 vom 2025-06-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/44Y2SH5QFQ55KDYSCFH7PBEZTUZ6DGOC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02134-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021684.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20434-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021675.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20431-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021676.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02144-1 vom 2025-06-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVSWMKBSSS2LFR3HYHQ3ZFKEJE76ALSX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02140-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021686.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02131-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021658.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02128-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021659.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20435-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02157-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021696.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02156-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021697.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02162-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021702.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02154-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021695.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02155-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021694.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02161-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021703.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7606-1 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7606-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02173-1 vom 2025-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021714.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7605-1 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7605-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20451-1 vom 2025-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021716.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20450-1 vom 2025-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021717.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02171-1 vom 2025-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021711.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20449-1 vom 2025-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021718.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20448-1 vom 2025-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021719.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-5 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7585-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7607-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01",
"url": "https://ubuntu.com/security/notices/USN-7607-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-6 vom 2025-07-03",
"url": "https://ubuntu.com/security/notices/USN-7585-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7605-2 vom 2025-07-04",
"url": "https://ubuntu.com/security/notices/USN-7605-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-5 vom 2025-07-04",
"url": "https://ubuntu.com/security/notices/USN-7591-5"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10536 vom 2025-07-08",
"url": "https://access.redhat.com/errata/RHSA-2025:10536"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10547 vom 2025-07-08",
"url": "https://access.redhat.com/errata/RHSA-2025:10547"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7628-1 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7628-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7627-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08",
"url": "https://ubuntu.com/security/notices/USN-7627-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7607-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10701 vom 2025-07-09",
"url": "https://access.redhat.com/errata/RHSA-2025:10701"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02262-1 vom 2025-07-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B53IHD74IRNJDAOHBW4L7JGWNOM26XE7/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0113-1 vom 2025-07-10",
"url": "https://ubuntu.com/security/notices/LSN-0113-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-7 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7585-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7640-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-6 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7591-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7655-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20480 vom 2025-07-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-20480.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02388-1 vom 2025-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021860.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02387-1 vom 2025-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021861.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02389-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021882.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02400-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFZK6V3WCARPDN2N3X7GFGJTK7UFSP6T/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02399-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76DMKQMABVDV4KDJA6FQ7PDOF7RSG4ZQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02412-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021866.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02411-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DEKG43SVEEUNQXJBCRXWGSWJ6NQ36NUC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02401-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2CTS27REDRGOT26DT2AKNCWHEMLXFPV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02396-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021876.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02391-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021880.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02390-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021881.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02403-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXLF63OLKSA5LWF3BYMVRASA55GHVYJY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02398-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZIQSMDCERQHP4JSQ3YSIO5TMBD637EV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02410-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7JYI4RKW2E7EB4ZJ6UB45TTF2H6PEYR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02419-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021887.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02444-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAPR5ITSSKHG4EAWNWSLSEMDSVTCH3CA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02434-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HM6XIBRQQ4DT55UN4XNTKFRWGXRY73A5/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02449-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOIECZ42HAJGKZ7TVGI4LLLNAG27ZF7L/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02440-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON72ZMOEO6E3K3KZFRVFHX5LUYA6RAXJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02455-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2GXZ2EL5OVKMNFWDPFV7NT367YYOFZO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02445-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYJ3O67PBJST6GKMJJXDEBLGGDV5KJKJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02433-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021883.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02446-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYAKCPI3CQKIWHWVXLDBJMK5CDOB5VRS/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20483-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021917.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02454-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NNLH3GVII5RPJKDTSNRRAF2IHEZBWAO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02451-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22P3K2RHZ424E6JGDSKSXUABXRESY6GY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20475-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021919.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02422-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021884.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02420-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021886.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02436-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOC4XFCSYMATM6FYIQWRDFK5AQF4P2LT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02428-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021889.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02418-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021888.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02416-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021890.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02415-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021891.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02459-1 vom 2025-07-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNBGONL5CBCKJ2ZQN6XVJFDFNJMHMLDW/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7654-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02456-1 vom 2025-07-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCEGUU6PQXBO5WEH74GQ5P4FSONEMFGS/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02467-1 vom 2025-07-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZCR5NTS22PVXMTMTOFQXV2RRHUGOQ4D/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02467-1 vom 2025-07-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021927.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02469-1 vom 2025-07-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021928.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02468-1 vom 2025-07-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7LXLV4ZFW2U2LQ7EL4MR5BCEPMCAILY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02469-1 vom 2025-07-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DKYAAHCQKONWNPOMLWYIWZDCCWMTQKBP/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02470-1 vom 2025-07-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y3SXNMZSQJRSJC7GHMSO7X66MBDIIFEC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02507-1 vom 2025-07-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021949.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20498-1 vom 2025-07-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021965.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-1 vom 2025-07-25",
"url": "https://ubuntu.com/security/notices/USN-7671-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20493-1 vom 2025-07-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021967.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-2 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7671-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7654-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-1 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-2 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-3 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02601-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022048.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02604-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022046.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02607-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOXFW6IMLHSFMN655UONMR2V76DWL7LG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02610-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRIUGMNHYH2DWCCLRZ5NFTLFBXQCRTE6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02618-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022014.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20527-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20526-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022026.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20525-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022027.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20517-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022034.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20519-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022032.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20518-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022033.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02632-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6QW6TXS545RIQWDHD4QUITTGGA4K6MY/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02638-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT3EVLQ3E46O7RVXSFVUBEM6JEJUWQI4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02627-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HNZG2UKJBSDT23RIH4WSPIP5XJJH7AQ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02648-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKXBRO2HUJQNRZTJLJHZC32ZUUQLD7RS/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02673-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPKQ4BU54XGSANMAROPDJAEFKO2OEKKP/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-3 vom 2025-08-04",
"url": "https://ubuntu.com/security/notices/USN-7671-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02636-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CZW4BWHO76REHV7LNO6WHLF4JRL7WMEJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02652-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPV72PULRBVAYNVLOGDPAXEYAOLJPHYQ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02688-1 vom 2025-08-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NCR2KWOE2L5E5ZMBPLRQ3ZRAPKHOJX5/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02691-1 vom 2025-08-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HQYM2FGJQXM5CJJ3L6LDY723WGAYBFPL/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7686-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20545-1 vom 2025-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022099.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20540-1 vom 2025-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022104.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20541-1 vom 2025-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022103.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20544-1 vom 2025-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02697-1 vom 2025-08-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4DC3XA5ITEIHVOJ5XXILV3NMSJPM3PS2/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02698-1 vom 2025-08-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TM2FOPKL26WFLLS5YFPKON7STKP3HL4I/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13598 vom 2025-08-11",
"url": "https://access.redhat.com/errata/RHSA-2025:13598"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20521 vom 2025-08-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20521.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13589 vom 2025-08-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-13589.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4271 vom 2025-08-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-5 vom 2025-08-13",
"url": "https://ubuntu.com/security/notices/USN-7685-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13598 vom 2025-08-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-13598.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7711-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7712-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20576-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022305.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20568-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022313.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20578-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022303.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20584-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022297.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20575-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20579-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20610-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022360.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20611-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022359.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20625-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022347.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20620-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022352.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7712-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15011 vom 2025-09-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-15011.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "Dell Security Update vom 2025-10-02",
"url": "https://www.dell.com/support/kbdoc/000376224"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20663.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17161 vom 2025-10-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-17161.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7249042 vom 2025-10-23",
"url": "https://www.ibm.com/support/pages/node/7249042"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19106 vom 2025-10-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-19106.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19447 vom 2025-11-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-19447.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20095 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20095"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20518 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20518"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:2264-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19930 vom 2025-11-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-19930.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:2173-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-25757.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21492 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21492"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21563 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21563"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4123-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7874-2 vom 2025-11-19",
"url": "https://ubuntu.com/security/notices/USN-7874-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7874-1 vom 2025-11-19",
"url": "https://ubuntu.com/security/notices/USN-7874-1"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:20518 vom 2025-11-21",
"url": "https://errata.build.resf.org/RLSA-2025:20518"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20518 vom 2025-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-20518-0.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:20095 vom 2025-11-27",
"url": "https://errata.build.resf.org/RLSA-2025:20095"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-2 vom 2025-12-03",
"url": "https://ubuntu.com/security/notices/USN-7907-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-1 vom 2025-12-03",
"url": "https://ubuntu.com/security/notices/USN-7907-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7907-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7911-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7911-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-4 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7907-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7874-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7874-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-1 vom 2025-12-10",
"url": "https://ubuntu.com/security/notices/USN-7922-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-3 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7928-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-2 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7922-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-1 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7928-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-2 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7928-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-5 vom 2025-12-12",
"url": "https://ubuntu.com/security/notices/USN-7907-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7930-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7930-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7937-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7937-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7930-2 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7930-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7939-1 vom 2025-12-17",
"url": "https://ubuntu.com/security/notices/USN-7939-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21063 vom 2025-12-17",
"url": "https://linux.oracle.com/errata/ELSA-2025-21063.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7939-2 vom 2025-12-17",
"url": "https://ubuntu.com/security/notices/USN-7939-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7938-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7938-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-3 vom 2025-12-19",
"url": "https://ubuntu.com/security/notices/USN-7922-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-4 vom 2025-12-19",
"url": "https://ubuntu.com/security/notices/USN-7928-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-4 vom 2026-01-06",
"url": "https://ubuntu.com/security/notices/USN-7922-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-5 vom 2026-01-09",
"url": "https://ubuntu.com/security/notices/USN-7928-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-5 vom 2026-01-12",
"url": "https://ubuntu.com/security/notices/USN-7922-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0140-1 vom 2026-01-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0263-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-1 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7988-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0317-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-2 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7988-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7987-2 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7987-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7986-1 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7986-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7987-1 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7987-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22910 vom 2026-01-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-22910.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23947 vom 2026-01-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-23947.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0385-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024056.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-3 vom 2026-02-05",
"url": "https://ubuntu.com/security/notices/USN-7988-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-4 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-7988-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-3 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8034-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-5 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-7988-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-4 vom 2026-02-13",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20329-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20324-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20325-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20305-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20327-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20309-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20330-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20294-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20292-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20300-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8033-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-6 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8033-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8034-2 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8034-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8033-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-8 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8033-8"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8061-1 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8061-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8070-2 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8070-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8070-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8070-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8070-3 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8070-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4011 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4011"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-1 vom 2026-03-16",
"url": "https://ubuntu.com/security/notices/USN-8098-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-2 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8098-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4745 vom 2026-03-17",
"url": "https://access.redhat.com/errata/RHSA-2026:4745"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-3 vom 2026-03-18",
"url": "https://ubuntu.com/security/notices/USN-8098-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8107-1 vom 2026-03-18",
"url": "https://ubuntu.com/security/notices/USN-8107-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-1 vom 2026-03-20",
"url": "https://ubuntu.com/security/notices/USN-8112-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-2 vom 2026-03-20",
"url": "https://ubuntu.com/security/notices/USN-8112-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-4 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8098-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-3 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8112-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-4 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8112-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-6 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8098-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-5 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8112-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-5 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8098-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-8 vom 2026-03-25",
"url": "https://ubuntu.com/security/notices/USN-8098-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-7 vom 2026-03-25",
"url": "https://ubuntu.com/security/notices/USN-8098-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-9 vom 2026-03-27",
"url": "https://ubuntu.com/security/notices/USN-8098-9"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6164 vom 2026-03-30",
"url": "https://access.redhat.com/errata/RHSA-2026:6164"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8141-1 vom 2026-04-01",
"url": "https://ubuntu.com/security/notices/USN-8141-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8163-1 vom 2026-04-10",
"url": "https://ubuntu.com/security/notices/USN-8163-1"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2026-04-09T22:00:00.000+00:00",
"generator": {
"date": "2026-04-10T07:17:22.824+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2024-3762",
"initial_release_date": "2024-12-29T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-29T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-01-15T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-19T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-03T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-09T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-02-11T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-17T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-20T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-27T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-02T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-03T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-04T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-05T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-03-06T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2025-03-09T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat und Amazon aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-03-11T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-13T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-03-16T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-17T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE, Amazon und Red Hat aufgenommen"
},
{
"date": "2025-03-18T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-19T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-03-20T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-03-23T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-25T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-26T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-04-02T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-06T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-07T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-08T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-14T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-16T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-04-21T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-22T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-23T22:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-24T22:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-27T22:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-04-28T22:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-05-04T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-05-06T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-07T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von Red Hat und Amazon aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-25T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von SUSE, Ubuntu und Debian aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Amazon, Debian, SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-05T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-12T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-17T22:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-19T22:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-06-24T22:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von SUSE, Ubuntu und Red Hat aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-03T22:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-06T22:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-07T22:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von Oracle Linux, SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-07-14T22:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-20T22:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-23T22:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "109",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "110",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "111",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "112",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-03T22:00:00.000+00:00",
"number": "113",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "114",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "115",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-08-10T22:00:00.000+00:00",
"number": "116",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-11T22:00:00.000+00:00",
"number": "117",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "118",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-08-17T22:00:00.000+00:00",
"number": "119",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "120",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "121",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "122",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "123",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "124",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "125",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "126",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "127",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "128",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "129",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "130",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "131",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-20T22:00:00.000+00:00",
"number": "132",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "133",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "134",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "135",
"summary": "Neue Updates von Oracle Linux und Dell aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "136",
"summary": "Neue Updates von Red Hat, SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "137",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "138",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "139",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "140",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "141",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "142",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "143",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "144",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "145",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-11T23:00:00.000+00:00",
"number": "146",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "147",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "148",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "149",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-12-21T23:00:00.000+00:00",
"number": "150",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-06T23:00:00.000+00:00",
"number": "151",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "152",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "153",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "154",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "155",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "156",
"summary": "Neue Updates von Ubuntu, SUSE und Oracle Linux aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "157",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "158",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "159",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "160",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "161",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "162",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "163",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "164",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "165",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "166",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "167",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "168",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-03T23:00:00.000+00:00",
"number": "169",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "170",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "171",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-16T23:00:00.000+00:00",
"number": "172",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "173",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "174",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "175",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "176",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "177",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "178",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-26T23:00:00.000+00:00",
"number": "179",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-30T22:00:00.000+00:00",
"number": "180",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-04-01T22:00:00.000+00:00",
"number": "181",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "182",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "182"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T034583",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
"product_id": "T045879"
}
},
{
"category": "product_version",
"name": "8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain 8.4.0.0",
"product_id": "T045879-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
"product_id": "T045881"
}
},
{
"category": "product_version",
"name": "7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain 7.10.1.70",
"product_id": "T045881-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
"product_id": "T047343"
}
},
{
"category": "product_version",
"name": "7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain 7.13.1.40",
"product_id": "T047343-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
"product_id": "T047344"
}
},
{
"category": "product_version",
"name": "8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain 8.3.1.10",
"product_id": "T047344-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
}
}
}
],
"category": "product_name",
"name": "PowerProtect Data Domain"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.5.0.19",
"product": {
"name": "IBM DataPower Gateway \u003c10.5.0.19",
"product_id": "T047864"
}
},
{
"category": "product_version",
"name": "10.5.0.19",
"product": {
"name": "IBM DataPower Gateway 10.5.0.19",
"product_id": "T047864-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:datapower_gateway:10.5.0.19"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.6.0.7",
"product": {
"name": "IBM DataPower Gateway \u003c10.6.0.7",
"product_id": "T047866"
}
},
{
"category": "product_version",
"name": "10.6.0.7",
"product": {
"name": "IBM DataPower Gateway 10.6.0.7",
"product_id": "T047866-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:datapower_gateway:10.6.0.7"
}
}
}
],
"category": "product_name",
"name": "DataPower Gateway"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11 IF04",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF04",
"product_id": "T043169"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11 IF04",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11 IF04",
"product_id": "T043169-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if04"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T046484",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T042774",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "Container Platform \u003c4.13.56",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.13.56",
"product_id": "T042009"
}
},
{
"category": "product_version",
"name": "Container Platform 4.13.56",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13.56",
"product_id": "T042009-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.13.56"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.49",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.49",
"product_id": "T042010"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.49",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.49",
"product_id": "T042010-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.49"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.16.38",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.16.38",
"product_id": "T042315"
}
},
{
"category": "product_version",
"name": "Container Platform 4.16.38",
"product": {
"name": "Red Hat OpenShift Container Platform 4.16.38",
"product_id": "T042315-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.16.38"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.12.75",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.12.75",
"product_id": "T042745"
}
},
{
"category": "product_version",
"name": "Container Platform 4.12.75",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12.75",
"product_id": "T042745-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.12.75"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T042775",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-53172",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53172"
},
{
"cve": "CVE-2024-53176",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53176"
},
{
"cve": "CVE-2024-53178",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53178"
},
{
"cve": "CVE-2024-53179",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53179"
},
{
"cve": "CVE-2024-53180",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53180"
},
{
"cve": "CVE-2024-53181",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53181"
},
{
"cve": "CVE-2024-53182",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53182"
},
{
"cve": "CVE-2024-53183",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53183"
},
{
"cve": "CVE-2024-53184",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53184"
},
{
"cve": "CVE-2024-53185",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53185"
},
{
"cve": "CVE-2024-53186",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53186"
},
{
"cve": "CVE-2024-53187",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53187"
},
{
"cve": "CVE-2024-53188",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53188"
},
{
"cve": "CVE-2024-53189",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53189"
},
{
"cve": "CVE-2024-53191",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53191"
},
{
"cve": "CVE-2024-53194",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53194"
},
{
"cve": "CVE-2024-53195",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53195"
},
{
"cve": "CVE-2024-53196",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53196"
},
{
"cve": "CVE-2024-53197",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53197"
},
{
"cve": "CVE-2024-53198",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53198"
},
{
"cve": "CVE-2024-53199",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53199"
},
{
"cve": "CVE-2024-53200",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53200"
},
{
"cve": "CVE-2024-53201",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53201"
},
{
"cve": "CVE-2024-53202",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53202"
},
{
"cve": "CVE-2024-53203",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53203"
},
{
"cve": "CVE-2024-53204",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53204"
},
{
"cve": "CVE-2024-53205",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53205"
},
{
"cve": "CVE-2024-53206",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53206"
},
{
"cve": "CVE-2024-53207",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53207"
},
{
"cve": "CVE-2024-53208",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53208"
},
{
"cve": "CVE-2024-53209",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53209"
},
{
"cve": "CVE-2024-53210",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53210"
},
{
"cve": "CVE-2024-53211",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53211"
},
{
"cve": "CVE-2024-53212",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53212"
},
{
"cve": "CVE-2024-53213",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53213"
},
{
"cve": "CVE-2024-53214",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53214"
},
{
"cve": "CVE-2024-53215",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53215"
},
{
"cve": "CVE-2024-53216",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53216"
},
{
"cve": "CVE-2024-53217",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53217"
},
{
"cve": "CVE-2024-53218",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53218"
},
{
"cve": "CVE-2024-53219",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53219"
},
{
"cve": "CVE-2024-53220",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53220"
},
{
"cve": "CVE-2024-53221",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53221"
},
{
"cve": "CVE-2024-53222",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53222"
},
{
"cve": "CVE-2024-53223",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53223"
},
{
"cve": "CVE-2024-53224",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53224"
},
{
"cve": "CVE-2024-53225",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53225"
},
{
"cve": "CVE-2024-53226",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53226"
},
{
"cve": "CVE-2024-53227",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53227"
},
{
"cve": "CVE-2024-53228",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53228"
},
{
"cve": "CVE-2024-53229",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53229"
},
{
"cve": "CVE-2024-53230",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53230"
},
{
"cve": "CVE-2024-53231",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53231"
},
{
"cve": "CVE-2024-53232",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53232"
},
{
"cve": "CVE-2024-53233",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53233"
},
{
"cve": "CVE-2024-53234",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53234"
},
{
"cve": "CVE-2024-53235",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53235"
},
{
"cve": "CVE-2024-53236",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53236"
},
{
"cve": "CVE-2024-53237",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53237"
},
{
"cve": "CVE-2024-53238",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53238"
},
{
"cve": "CVE-2024-53239",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53239"
},
{
"cve": "CVE-2024-56531",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56531"
},
{
"cve": "CVE-2024-56532",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56532"
},
{
"cve": "CVE-2024-56533",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56533"
},
{
"cve": "CVE-2024-56534",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56534"
},
{
"cve": "CVE-2024-56535",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56535"
},
{
"cve": "CVE-2024-56536",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56536"
},
{
"cve": "CVE-2024-56537",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56537"
},
{
"cve": "CVE-2024-56538",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56538"
},
{
"cve": "CVE-2024-56539",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56539"
},
{
"cve": "CVE-2024-56540",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56540"
},
{
"cve": "CVE-2024-56541",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56541"
},
{
"cve": "CVE-2024-56542",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56542"
},
{
"cve": "CVE-2024-56543",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56543"
},
{
"cve": "CVE-2024-56544",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56544"
},
{
"cve": "CVE-2024-56545",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56545"
},
{
"cve": "CVE-2024-56546",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56546"
},
{
"cve": "CVE-2024-56547",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56547"
},
{
"cve": "CVE-2024-56548",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56548"
},
{
"cve": "CVE-2024-56549",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56549"
},
{
"cve": "CVE-2024-56550",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56550"
},
{
"cve": "CVE-2024-56551",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56551"
},
{
"cve": "CVE-2024-56552",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56552"
},
{
"cve": "CVE-2024-56553",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56553"
},
{
"cve": "CVE-2024-56554",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56554"
},
{
"cve": "CVE-2024-56555",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56555"
},
{
"cve": "CVE-2024-56556",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56556"
},
{
"cve": "CVE-2024-56557",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56557"
},
{
"cve": "CVE-2024-56558",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56558"
},
{
"cve": "CVE-2024-56559",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56559"
},
{
"cve": "CVE-2024-56560",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56560"
},
{
"cve": "CVE-2024-56561",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56561"
},
{
"cve": "CVE-2024-56562",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56562"
},
{
"cve": "CVE-2024-56563",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56563"
},
{
"cve": "CVE-2024-56564",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56564"
},
{
"cve": "CVE-2024-56565",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56565"
},
{
"cve": "CVE-2024-56566",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56566"
},
{
"cve": "CVE-2024-56567",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56567"
},
{
"cve": "CVE-2024-56568",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56568"
},
{
"cve": "CVE-2024-56569",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56569"
},
{
"cve": "CVE-2024-56570",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56570"
},
{
"cve": "CVE-2024-56571",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56571"
},
{
"cve": "CVE-2024-56572",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56572"
},
{
"cve": "CVE-2024-56573",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56573"
},
{
"cve": "CVE-2024-56574",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56574"
},
{
"cve": "CVE-2024-56575",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56575"
},
{
"cve": "CVE-2024-56576",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56576"
},
{
"cve": "CVE-2024-56577",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56577"
},
{
"cve": "CVE-2024-56578",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56578"
},
{
"cve": "CVE-2024-56579",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56579"
},
{
"cve": "CVE-2024-56580",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56580"
},
{
"cve": "CVE-2024-56581",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56581"
},
{
"cve": "CVE-2024-56582",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56582"
},
{
"cve": "CVE-2024-56583",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56583"
},
{
"cve": "CVE-2024-56584",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56584"
},
{
"cve": "CVE-2024-56585",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56585"
},
{
"cve": "CVE-2024-56586",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56586"
},
{
"cve": "CVE-2024-56587",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56587"
},
{
"cve": "CVE-2024-56588",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56588"
},
{
"cve": "CVE-2024-56589",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56589"
},
{
"cve": "CVE-2024-56590",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56590"
},
{
"cve": "CVE-2024-56591",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56591"
},
{
"cve": "CVE-2024-56592",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56592"
},
{
"cve": "CVE-2024-56593",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56593"
},
{
"cve": "CVE-2024-56594",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56594"
},
{
"cve": "CVE-2024-56595",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56595"
},
{
"cve": "CVE-2024-56596",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56596"
},
{
"cve": "CVE-2024-56597",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56597"
},
{
"cve": "CVE-2024-56598",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56598"
},
{
"cve": "CVE-2024-56599",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56599"
},
{
"cve": "CVE-2024-56600",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56600"
},
{
"cve": "CVE-2024-56601",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56601"
},
{
"cve": "CVE-2024-56602",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56602"
},
{
"cve": "CVE-2024-56603",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56603"
},
{
"cve": "CVE-2024-56604",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56604"
},
{
"cve": "CVE-2024-56605",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56605"
},
{
"cve": "CVE-2024-56606",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56606"
},
{
"cve": "CVE-2024-56607",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56607"
},
{
"cve": "CVE-2024-56608",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56608"
},
{
"cve": "CVE-2024-56609",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56609"
},
{
"cve": "CVE-2024-56610",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56610"
},
{
"cve": "CVE-2024-56611",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56611"
},
{
"cve": "CVE-2024-56612",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56612"
},
{
"cve": "CVE-2024-56613",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56613"
},
{
"cve": "CVE-2024-56614",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56614"
},
{
"cve": "CVE-2024-56615",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56615"
},
{
"cve": "CVE-2024-56616",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56616"
},
{
"cve": "CVE-2024-56617",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56617"
},
{
"cve": "CVE-2024-56618",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56618"
},
{
"cve": "CVE-2024-56619",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56619"
},
{
"cve": "CVE-2024-56620",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56620"
},
{
"cve": "CVE-2024-56621",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56621"
},
{
"cve": "CVE-2024-56622",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56622"
},
{
"cve": "CVE-2024-56623",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56623"
},
{
"cve": "CVE-2024-56624",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56624"
},
{
"cve": "CVE-2024-56625",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56625"
},
{
"cve": "CVE-2024-56626",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56626"
},
{
"cve": "CVE-2024-56627",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56627"
},
{
"cve": "CVE-2024-56628",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56628"
},
{
"cve": "CVE-2024-56629",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56629"
},
{
"cve": "CVE-2024-56630",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56630"
},
{
"cve": "CVE-2024-56631",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56631"
},
{
"cve": "CVE-2024-56632",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56632"
},
{
"cve": "CVE-2024-56633",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56633"
},
{
"cve": "CVE-2024-56634",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56634"
},
{
"cve": "CVE-2024-56635",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56635"
},
{
"cve": "CVE-2024-56636",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56636"
},
{
"cve": "CVE-2024-56637",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56637"
},
{
"cve": "CVE-2024-56638",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56638"
},
{
"cve": "CVE-2024-56639",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56639"
},
{
"cve": "CVE-2024-56640",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56640"
},
{
"cve": "CVE-2024-56641",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56641"
},
{
"cve": "CVE-2024-56642",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56642"
},
{
"cve": "CVE-2024-56643",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56643"
},
{
"cve": "CVE-2024-56644",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56644"
},
{
"cve": "CVE-2024-56645",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56645"
},
{
"cve": "CVE-2024-56646",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56646"
},
{
"cve": "CVE-2024-56647",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56647"
},
{
"cve": "CVE-2024-56648",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56648"
},
{
"cve": "CVE-2024-56649",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56649"
},
{
"cve": "CVE-2024-56650",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56650"
},
{
"cve": "CVE-2024-56651",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56651"
},
{
"cve": "CVE-2024-56652",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56652"
},
{
"cve": "CVE-2024-56653",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56653"
},
{
"cve": "CVE-2024-56654",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56654"
},
{
"cve": "CVE-2024-56655",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56655"
},
{
"cve": "CVE-2024-56656",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56656"
},
{
"cve": "CVE-2024-56657",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56657"
},
{
"cve": "CVE-2024-56658",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56658"
},
{
"cve": "CVE-2024-56659",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56659"
},
{
"cve": "CVE-2024-56660",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56660"
},
{
"cve": "CVE-2024-56661",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56661"
},
{
"cve": "CVE-2024-56662",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56662"
},
{
"cve": "CVE-2024-56663",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56663"
},
{
"cve": "CVE-2024-56664",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56664"
},
{
"cve": "CVE-2024-56665",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56665"
},
{
"cve": "CVE-2024-56666",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56666"
},
{
"cve": "CVE-2024-56667",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56667"
},
{
"cve": "CVE-2024-56668",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56668"
},
{
"cve": "CVE-2024-56669",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56669"
},
{
"cve": "CVE-2024-56670",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56670"
},
{
"cve": "CVE-2024-56671",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56671"
},
{
"cve": "CVE-2024-56672",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56672"
},
{
"cve": "CVE-2024-56673",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56673"
},
{
"cve": "CVE-2024-56674",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56674"
},
{
"cve": "CVE-2024-56675",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56675"
},
{
"cve": "CVE-2024-56676",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56676"
},
{
"cve": "CVE-2024-56677",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56677"
},
{
"cve": "CVE-2024-56678",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56678"
},
{
"cve": "CVE-2024-56679",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56679"
},
{
"cve": "CVE-2024-56680",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56680"
},
{
"cve": "CVE-2024-56681",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56681"
},
{
"cve": "CVE-2024-56682",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56682"
},
{
"cve": "CVE-2024-56683",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56683"
},
{
"cve": "CVE-2024-56684",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56684"
},
{
"cve": "CVE-2024-56685",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56685"
},
{
"cve": "CVE-2024-56686",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56686"
},
{
"cve": "CVE-2024-56687",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56687"
},
{
"cve": "CVE-2024-56688",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56688"
},
{
"cve": "CVE-2024-56689",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56689"
},
{
"cve": "CVE-2024-56690",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56690"
},
{
"cve": "CVE-2024-56691",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56691"
},
{
"cve": "CVE-2024-56692",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56692"
},
{
"cve": "CVE-2024-56693",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56693"
},
{
"cve": "CVE-2024-56694",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56694"
},
{
"cve": "CVE-2024-56695",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56695"
},
{
"cve": "CVE-2024-56696",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56696"
},
{
"cve": "CVE-2024-56697",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56697"
},
{
"cve": "CVE-2024-56698",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56698"
},
{
"cve": "CVE-2024-56699",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56699"
},
{
"cve": "CVE-2024-56700",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56700"
},
{
"cve": "CVE-2024-56701",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56701"
},
{
"cve": "CVE-2024-56702",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56702"
},
{
"cve": "CVE-2024-56703",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56703"
},
{
"cve": "CVE-2024-56704",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56704"
},
{
"cve": "CVE-2024-56705",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56705"
},
{
"cve": "CVE-2024-56706",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56706"
},
{
"cve": "CVE-2024-56707",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56707"
},
{
"cve": "CVE-2024-56708",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56708"
},
{
"cve": "CVE-2024-56709",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56709"
},
{
"cve": "CVE-2024-56710",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56710"
},
{
"cve": "CVE-2024-56711",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56711"
},
{
"cve": "CVE-2024-56712",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56712"
},
{
"cve": "CVE-2024-56713",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56713"
},
{
"cve": "CVE-2024-56714",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56714"
},
{
"cve": "CVE-2024-56715",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56715"
},
{
"cve": "CVE-2024-56716",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56716"
},
{
"cve": "CVE-2024-56717",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56717"
},
{
"cve": "CVE-2024-56718",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56718"
},
{
"cve": "CVE-2024-56719",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56719"
},
{
"cve": "CVE-2024-56720",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56720"
},
{
"cve": "CVE-2024-56721",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56721"
},
{
"cve": "CVE-2024-56722",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56722"
},
{
"cve": "CVE-2024-56723",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56723"
},
{
"cve": "CVE-2024-56724",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56724"
},
{
"cve": "CVE-2024-56725",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56725"
},
{
"cve": "CVE-2024-56726",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56726"
},
{
"cve": "CVE-2024-56727",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56727"
},
{
"cve": "CVE-2024-56728",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56728"
},
{
"cve": "CVE-2024-56729",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56729"
},
{
"cve": "CVE-2024-56730",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56730"
},
{
"cve": "CVE-2024-56739",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56739"
},
{
"cve": "CVE-2024-56740",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56740"
},
{
"cve": "CVE-2024-56741",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56741"
},
{
"cve": "CVE-2024-56742",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56742"
},
{
"cve": "CVE-2024-56743",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56743"
},
{
"cve": "CVE-2024-56744",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56744"
},
{
"cve": "CVE-2024-56745",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56745"
},
{
"cve": "CVE-2024-56746",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56746"
},
{
"cve": "CVE-2024-56747",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56747"
},
{
"cve": "CVE-2024-56748",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56748"
},
{
"cve": "CVE-2024-56749",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56749"
},
{
"cve": "CVE-2024-56750",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56750"
},
{
"cve": "CVE-2024-56751",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56751"
},
{
"cve": "CVE-2024-56752",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56752"
},
{
"cve": "CVE-2024-56753",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56753"
},
{
"cve": "CVE-2024-56754",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56754"
},
{
"cve": "CVE-2024-56755",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56755"
},
{
"cve": "CVE-2024-56756",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56756"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.