Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-26554 (GCVE-0-2023-26554)
Vulnerability from cvelistv5
- n/a
| URL | Tags | ||
|---|---|---|---|
|
|
|||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T11:53:54.436Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-26554",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-11T15:26:09.398238Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-11T15:26:14.067Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-04-13T00:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554"
},
{
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-26554",
"datePublished": "2023-04-11T00:00:00.000Z",
"dateReserved": "2023-02-25T00:00:00.000Z",
"dateUpdated": "2025-02-11T15:26:14.067Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-26554\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-04-11T21:15:21.777\",\"lastModified\":\"2025-02-11T16:15:36.183\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":5.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":3.4},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":5.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p15:*:*:*:*:*:*\",\"matchCriteriaId\":\"D300A755-9809-4469-8C08-20CB451C83A2\"}]}]}],\"references\":[{\"url\":\"https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T11:53:54.436Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-26554\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-11T15:26:09.398238Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-11T15:24:19.501Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554\"}, {\"url\": \"https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-04-13T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-26554\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-11T15:26:14.067Z\", \"dateReserved\": \"2023-02-25T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-04-11T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2024-AVI-0478
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SINEC Traffic Analyzer versions antérieures à 1.2 | ||
| Siemens | N/A | SIPLUS ET 200SP CP 1543SP-1 ISEC versions antérieures à 2.3 | ||
| Siemens | N/A | SITOP UPS1600 EX 20 A Ethernet PROFINET versions antérieures à 2.5.4 | ||
| Siemens | N/A | Teamcenter Visualization 14.3 versions antérieures à 14.3.0.9 | ||
| Siemens | N/A | SITOP UPS1600 40 A Ethernet/ PROFINET versions antérieures à 2.5.4 | ||
| Siemens | N/A | PCCX26 Ax 1703 PE, Contr, Communication Element versions antérieures à 06.05 | ||
| Siemens | N/A | Tecnomatix Plant Simulation 2404 versions antérieures à 2404.0001 | ||
| Siemens | N/A | TIM 1531 IRC versions antérieures à 2.4.8 | ||
| Siemens | N/A | CPCX26 Central Processing/Communication versions antérieures à 06.02 | ||
| Siemens | N/A | SITOP UPS1600 20 A Ethernet/ PROFINET versions antérieures à 2.5.4 | ||
| Siemens | N/A | Teamcenter Visualization 2312 versions antérieures à 2312.0004 | ||
| Siemens | N/A | JT2Go versions antérieures à 2312.0004 | ||
| Siemens | N/A | les applications Mendix utilisant Mendix 10 versions antérieures à 10.11.0 | ||
| Siemens | N/A | Tecnomatix Plant Simulation 2302 versions antérieures à 2302.0012 | ||
| Siemens | N/A | SIPLUS TIM 1531 IRC versions antérieures à 2.4.8 | ||
| Siemens | N/A | ETA5 Ethernet Int. 1x100TX IEC61850 Ed.2 versions antérieures à 03.27 | ||
| Siemens | N/A | SITOP UPS1600 10 A Ethernet/ PROFINET versions antérieures à 2.5.4 | ||
| Siemens | N/A | PowerSys versions antérieures à 3.11 | ||
| Siemens | N/A | ETA4 Ethernet Interface IEC60870-5-104 versions antérieures à 10.46 | ||
| Siemens | N/A | TIA Administrator versions antérieures à 3 SP2 | ||
| Siemens | N/A | les applications Mendix utilisant Mendix 9 versions antérieures à 9.24.22 | ||
| Siemens | N/A | ST7 ScadaConnect versions antérieures à 1.1 | ||
| Siemens | N/A | SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL versions antérieures à 2.3 | ||
| Siemens | N/A | Teamcenter Visualization 14.2 toutes versions, aucun correctif n'est disponible | ||
| Siemens | N/A | les produits SCALANCE, se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) | ||
| Siemens | N/A | SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL versions antérieures à 2.3 | ||
| Siemens | N/A | les applications Mendix utilisant Mendix 10.6 versions antérieures à 10.6.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SINEC Traffic Analyzer versions ant\u00e9rieures \u00e0 1.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CP 1543SP-1 ISEC versions ant\u00e9rieures \u00e0 2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SITOP UPS1600 EX 20 A Ethernet PROFINET versions ant\u00e9rieures \u00e0 2.5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization 14.3 versions ant\u00e9rieures \u00e0 14.3.0.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SITOP UPS1600 40 A Ethernet/ PROFINET versions ant\u00e9rieures \u00e0 2.5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PCCX26 Ax 1703 PE, Contr, Communication Element versions ant\u00e9rieures \u00e0 06.05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Tecnomatix Plant Simulation 2404 versions ant\u00e9rieures \u00e0 2404.0001",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 1531 IRC versions ant\u00e9rieures \u00e0 2.4.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CPCX26 Central Processing/Communication versions ant\u00e9rieures \u00e0 06.02",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SITOP UPS1600 20 A Ethernet/ PROFINET versions ant\u00e9rieures \u00e0 2.5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization 2312 versions ant\u00e9rieures \u00e0 2312.0004",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT2Go versions ant\u00e9rieures \u00e0 2312.0004",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "les applications Mendix utilisant Mendix 10 versions ant\u00e9rieures \u00e0 10.11.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Tecnomatix Plant Simulation 2302 versions ant\u00e9rieures \u00e0 2302.0012",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS TIM 1531 IRC versions ant\u00e9rieures \u00e0 2.4.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "ETA5 Ethernet Int. 1x100TX IEC61850 Ed.2 versions ant\u00e9rieures \u00e0 03.27",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SITOP UPS1600 10 A Ethernet/ PROFINET versions ant\u00e9rieures \u00e0 2.5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PowerSys versions ant\u00e9rieures \u00e0 3.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "ETA4 Ethernet Interface IEC60870-5-104 versions ant\u00e9rieures \u00e0 10.46",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Administrator versions ant\u00e9rieures \u00e0 3 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "les applications Mendix utilisant Mendix 9 versions ant\u00e9rieures \u00e0 9.24.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "ST7 ScadaConnect versions ant\u00e9rieures \u00e0 1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL versions ant\u00e9rieures \u00e0 2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization 14.2 toutes versions, aucun correctif n\u0027est disponible",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "les produits SCALANCE, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL versions ant\u00e9rieures \u00e0 2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "les applications Mendix utilisant Mendix 10.6 versions ant\u00e9rieures \u00e0 10.6.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-24895",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24895"
},
{
"name": "CVE-2023-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49691"
},
{
"name": "CVE-2024-35207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35207"
},
{
"name": "CVE-2023-33135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33135"
},
{
"name": "CVE-2024-33500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33500"
},
{
"name": "CVE-2023-35390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35390"
},
{
"name": "CVE-2023-44317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44317"
},
{
"name": "CVE-2024-35210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35210"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-38380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38380"
},
{
"name": "CVE-2023-36794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36794"
},
{
"name": "CVE-2024-36266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36266"
},
{
"name": "CVE-2023-24897",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24897"
},
{
"name": "CVE-2022-44792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44792"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2024-35206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35206"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-35788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-24936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24936"
},
{
"name": "CVE-2023-36792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36792"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-46144",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46144"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-26277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26277"
},
{
"name": "CVE-2022-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40225"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-35828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35828"
},
{
"name": "CVE-2023-36049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36049"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-44793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44793"
},
{
"name": "CVE-2024-35211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35211"
},
{
"name": "CVE-2023-33127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33127"
},
{
"name": "CVE-2021-47178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47178"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2023-33170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33170"
},
{
"name": "CVE-2023-33128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33128"
},
{
"name": "CVE-2023-41910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41910"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2022-45886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45886"
},
{
"name": "CVE-2022-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1015"
},
{
"name": "CVE-2023-27321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27321"
},
{
"name": "CVE-2024-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31484"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-41742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41742"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-35212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35212"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-21255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21255"
},
{
"name": "CVE-2024-26275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26275"
},
{
"name": "CVE-2023-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38180"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2024-35209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35209"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2023-38178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38178"
},
{
"name": "CVE-2022-45887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
},
{
"name": "CVE-2024-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0775"
},
{
"name": "CVE-2023-44319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44319"
},
{
"name": "CVE-2023-32032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32032"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2023-2269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2269"
},
{
"name": "CVE-2024-35208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35208"
},
{
"name": "CVE-2024-26276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26276"
},
{
"name": "CVE-2023-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1017"
},
{
"name": "CVE-2023-38171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38171"
},
{
"name": "CVE-2023-28260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28260"
},
{
"name": "CVE-2023-50763",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50763"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-29331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29331"
},
{
"name": "CVE-2023-44374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44374"
},
{
"name": "CVE-2023-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38533"
},
{
"name": "CVE-2023-35829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35829"
},
{
"name": "CVE-2023-36038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36038"
},
{
"name": "CVE-2023-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21808"
},
{
"name": "CVE-2023-36799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36799"
},
{
"name": "CVE-2023-36435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36435"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2023-35391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35391"
},
{
"name": "CVE-2023-44373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44373"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-36796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36796"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-35303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35303"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-35292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35292"
},
{
"name": "CVE-2023-36558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36558"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
},
{
"name": "CVE-2023-33126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33126"
},
{
"name": "CVE-2023-52474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52474"
},
{
"name": "CVE-2023-44318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44318"
},
{
"name": "CVE-2023-36793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36793"
}
],
"initial_release_date": "2024-06-11T00:00:00",
"last_revision_date": "2024-06-11T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0478",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-900277",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-900277.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-620338",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-620338.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-540640",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-540640.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-238730",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-238730.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-319319",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-319319.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-879734",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-879734.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-625862",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-625862.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-481506",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-481506.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-024584",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-024584.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-196737",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-337522",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-337522.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-341067",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-341067.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-771940",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-771940.html"
},
{
"published_at": "2024-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-690517",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html"
}
]
}
CERTFR-2023-AVI-0836
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS séries QFX5000 versions antérieures à 20.4R3-S6, 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2, 23.2R1 | ||
| Juniper Networks | Junos OS | Junos OS sur les séries MX versions antérieures à 20.4R3-S7, 21.1R3-S5, 21.2R3-S4, 21.3R3-S4, 21.4R3-S3, 22.1R3-S1, 22.2R2-S1, 22.2R3, 22.3R1-S2, 22.3R2, 22.4R1 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S8-EVO, 21.1R3-S2-EVO, 21.2R3-S6-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 22.1R3-S4-EVO, 22.2R3-S3-EVO, 22.3R3-S1-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-S1-EVO, 23.2R2-EVO, 23.3R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 20.2R3-S6, 20.3R3-S5, 20.4R3-S9, 21.1R3-S5, 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R2-S2, 22.2R3-S2, 22.3R1-S2, 22.3R2-S2, 22.3R3-S1, 22.4R1-S2, 22.4R2-S2, 22.4R3, 23.1R2, 23.2R2, 23.3R1, |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS s\u00e9ries QFX5000 versions ant\u00e9rieures \u00e0 20.4R3-S6, 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2, 23.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur les s\u00e9ries MX versions ant\u00e9rieures \u00e0 20.4R3-S7, 21.1R3-S5, 21.2R3-S4, 21.3R3-S4, 21.4R3-S3, 22.1R3-S1, 22.2R2-S1, 22.2R3, 22.3R1-S2, 22.3R2, 22.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S8-EVO, 21.1R3-S2-EVO, 21.2R3-S6-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 22.1R3-S4-EVO, 22.2R3-S3-EVO, 22.3R3-S1-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-S1-EVO, 23.2R2-EVO, 23.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 20.2R3-S6, 20.3R3-S5, 20.4R3-S9, 21.1R3-S5, 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R2-S2, 22.2R3-S2, 22.3R1-S2, 22.3R2-S2, 22.3R3-S1, 22.4R1-S2, 22.4R2-S2, 22.4R3, 23.1R2, 23.2R2, 23.3R1,",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-44199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44199"
},
{
"name": "CVE-2023-36839",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36839"
},
{
"name": "CVE-2023-44184",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44184"
},
{
"name": "CVE-2023-44195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44195"
},
{
"name": "CVE-2023-44177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44177"
},
{
"name": "CVE-2023-44201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44201"
},
{
"name": "CVE-2023-44193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44193"
},
{
"name": "CVE-2023-44175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44175"
},
{
"name": "CVE-2023-44197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44197"
},
{
"name": "CVE-2023-44202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44202"
},
{
"name": "CVE-2023-36841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36841"
},
{
"name": "CVE-2023-44187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44187"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2023-44186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44186"
},
{
"name": "CVE-2023-44194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44194"
},
{
"name": "CVE-2023-22392",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22392"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-36843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36843"
},
{
"name": "CVE-2023-44182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44182"
},
{
"name": "CVE-2023-44183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44183"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2023-44204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44204"
},
{
"name": "CVE-2022-2274",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2274"
},
{
"name": "CVE-2023-44196",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44196"
},
{
"name": "CVE-2023-44189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44189"
},
{
"name": "CVE-2023-44198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44198"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2023-44203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44203"
},
{
"name": "CVE-2023-44178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44178"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-44192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44192"
},
{
"name": "CVE-2023-44181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44181"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2023-44191",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44191"
},
{
"name": "CVE-2023-44188",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44188"
},
{
"name": "CVE-2023-44190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44190"
},
{
"name": "CVE-2023-44176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44176"
},
{
"name": "CVE-2023-44185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44185"
}
],
"initial_release_date": "2023-10-12T00:00:00",
"last_revision_date": "2023-10-12T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0836",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-10-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73141 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-genuine-PIM-packet-causes-RPD-crash-CVE-2023-44175"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73160 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-Packets-which-are-not-destined-to-the-router-can-reach-the-RE-CVE-2023-44195"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73146 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-scenario-RPD-crashes-upon-receiving-and-processing-a-specific-malformed-ISO-VPN--BGP-UPDATE-packet-CVE-2023-44185"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73169 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-series-EX2300-EX3400-EX4100-EX4400-and-EX4600-Packet-flooding-will-occur-when-IGMP-traffic-is-sent-to-an-isolated-VLAN-CVE-2023-44203"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73164 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-SIP-ALG-doesn-t-drop-specifically-malformed-retransmitted-SIP-packets-CVE-2023-44198"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73168 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-packets-will-bypass-a-control-plane-firewall-filter-CVE-2023-44202"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73167 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-local-attacker-can-retrieve-sensitive-information-and-elevate-privileges-on-the-devices-to-an-authorized-user-CVE-2023-44201"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73153 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-PTX10003-Series-MAC-address-validation-bypass-vulnerability-CVE-2023-44189"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73149 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-Unchecked-Return-Value-in-multiple-users-interfaces-affects-confidentiality-and-integrity-of-device-operations-CVE-2023-44182"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73140 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-Vulnerabilities-in-CLI-command"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73172 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-MX-Series-Receipt-of-malformed-TCP-traffic-will-cause-a-Denial-of-Service-CVE-2023-36841"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73162 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-PTX10003-Series-Packets-which-are-not-destined-to-the-router-can-reach-the-RE-CVE-2023-44196"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73165 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-MX-Series-In-a-PTP-scenario-a-prolonged-routing-protocol-churn-can-trigger-an-FPC-reboot-CVE-2023-44199"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73152 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-jkdsd-crash-due-to-multiple-telemetry-requests-CVE-2023-44188"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73157 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-MX-Series-An-FPC-crash-is-observed-when-CFM-is-enabled-in-a-VPLS-scenario-and-a-specific-LDP-related-command-is-run-CVE-2023-44193"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73154 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-PTX10001-PTX10004-PTX10008-PTX10016-MAC-address-validation-bypass-vulnerability-CVE-2023-44190"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73170 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-will-crash-upon-receiving-a-malformed-BGP-UPDATE-message-CVE-2023-44204"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73150 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-when-attempting-to-send-a-very-long-AS-PATH-to-a-non-4-byte-AS-capable-BGP-neighbor-CVE-2023-44186"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73171 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-l2cpd-crash-will-occur-when-specific-LLDP-packets-are-received-CVE-2023-36839"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73145 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5k-l2-loop-in-the-overlay-impacts-the-stability-in-a-EVPN-VXLAN-environment-CVE-2023-44181"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73174 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-SRX-Series-The-PFE-will-crash-on-receiving-malformed-SSL-traffic-when-ATP-is-enabled-CVE-2023-36843"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73530 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-Received-flow-routes-which-aren-t-installed-as-the-hardware-doesn-t-support-them-lead-to-an-FPC-heap-memory-leak-CVE-2023-22392"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73176 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Vulnerability-fixed-in-OpenSSL"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73156 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-Series-DMA-memory-leak-is-observed-when-specific-DHCP-packets-are-transmitted-over-pseudo-VTEP-CVE-2023-44192"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73148 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-Series-EX4600-Series-In-a-VxLAN-scenario-an-adjacent-attacker-within-the-VxLAN-sending-genuine-packets-may-cause-a-DMA-memory-leak-to-occur-CVE-2023-44183"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73147 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-High-CPU-load-due-to-specific-NETCONF-command-CVE-2023-44184"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73151 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-file-copy-CLI-command-can-disclose-password-to-shell-users-CVE-2023-44187"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73177 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-NTP-vulnerabilities-resolved"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73163 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-crash-may-occur-when-BGP-is-processing-newly-learned-routes-CVE-2023-44197"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73155 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX4000-Series-Denial-of-Service-DoS-on-a-large-scale-VLAN-due-to-PFE-hogging-CVE-2023-44191"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA73158 du 11 octobre 2023",
"url": "https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-An-unauthenticated-attacker-with-local-access-to-the-device-can-create-a-backdoor-with-root-privileges-CVE-2023-44194"
}
]
}
wid-sec-w-2023-0938
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Bei ntp handelt es sich um eine Sammlung von Dienstprogrammen und einem Daemon zur Verwendung des Network Time Protocols auf UNIX-basierten Systemen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in ntp ausnutzen, um nicht n\u00e4her definierte Auswirkungen zu erreichen. Die Ausnutzung erfordert eine bestimmte Konfiguration und ggf. das Mitwirken eines Administrators, beispielsweise durch Social Engineering.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0938 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0938.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0938 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0938"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2396 vom 2024-01-10",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2396.html"
},
{
"category": "external",
"summary": "GitHub Repository ntp-4.2.8p15-cves vom 2023-04-11",
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves"
},
{
"category": "external",
"summary": "Meinberg Statement vom 2023-04-13",
"url": "https://www.meinberg.de/german/news/stellungnahme-zu-den-am-12-04-2023-gemeldeten-schwachstellen-im-ntp-projekt.htm"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2142-1 vom 2023-05-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014820.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2171-1 vom 2023-05-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014847.html"
},
{
"category": "external",
"summary": "Meinberg Security Advisory MBGSA-2023.03 vom 2023-05-23",
"url": "https://www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-2023-03-lantime-firmware-v7-06-014.htm"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-C0762A0E57 vom 2023-06-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-c0762a0e57"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-611A143D5F vom 2023-06-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-611a143d5f"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2608-1 vom 2023-06-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015269.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2609-1 vom 2023-06-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015268.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7047270 vom 2023-10-05",
"url": "https://www.ibm.com/support/pages/node/7047270"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-004 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox%C2%AE-Security-Bulletin-XRX24-004-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-005 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2023-317 vom 2023-11-13",
"url": "https://www.dell.com/support/kbdoc/de-de/000219148/dsa-2023-317-security-update-for-dell-networker-vproxy-multiple-linux-packages-vulnerabilities"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2024-2396 vom 2024-04-30",
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23228"
},
{
"category": "external",
"summary": "Broadcom Security Advisory vom 2024-04-30",
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23299"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04729en_us"
}
],
"source_lang": "en-US",
"title": "ntp: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-11T23:00:00.000+00:00",
"generator": {
"date": "2024-11-12T12:17:24.439+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2023-0938",
"initial_release_date": "2023-04-11T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-04-11T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-04-12T22:00:00.000+00:00",
"number": "2",
"summary": "Beschreibung und Bewertung angepasst"
},
{
"date": "2023-04-13T22:00:00.000+00:00",
"number": "3",
"summary": "Informationen von Meinberg aufgenommen"
},
{
"date": "2023-05-09T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-05-10T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-05-22T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Meinberg aufgenommen"
},
{
"date": "2023-06-04T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-06-21T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-10-05T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-11-12T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-01-09T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-03-03T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-05-01T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von HP aufgenommen"
}
],
"status": "final",
"version": "14"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T022212",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Fabric OS",
"product": {
"name": "Broadcom Fabric OS",
"product_id": "978054",
"product_identification_helper": {
"cpe": "cpe:/o:broadcom:fabric_operating_system:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.1d",
"product": {
"name": "Broadcom Fabric OS \u003c9.1.1d",
"product_id": "T034128"
}
},
{
"category": "product_version",
"name": "9.1.1d",
"product": {
"name": "Broadcom Fabric OS 9.1.1d",
"product_id": "T034128-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:broadcom:fabric_operating_system:9.1.1d"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.0b",
"product": {
"name": "Broadcom Fabric OS \u003c9.2.0b",
"product_id": "T034260"
}
},
{
"category": "product_version",
"name": "9.2.0b",
"product": {
"name": "Broadcom Fabric OS 9.2.0b",
"product_id": "T034260-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:broadcom:fabric_operating_system:9.2.0b"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.2.3e",
"product": {
"name": "Broadcom Fabric OS \u003c8.2.3e",
"product_id": "T034262"
}
},
{
"category": "product_version",
"name": "8.2.3e",
"product": {
"name": "Broadcom Fabric OS 8.2.3e",
"product_id": "T034262-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:broadcom:fabric_operating_system:8.2.3e"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.1",
"product": {
"name": "Broadcom Fabric OS \u003c9.2.1",
"product_id": "T034487"
}
},
{
"category": "product_version",
"name": "9.2.1",
"product": {
"name": "Broadcom Fabric OS 9.2.1",
"product_id": "T034487-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:broadcom:fabric_operating_system:9.2.1"
}
}
}
],
"category": "product_name",
"name": "Fabric OS"
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cvproxy 19.9.0.2",
"product": {
"name": "Dell NetWorker \u003cvproxy 19.9.0.2",
"product_id": "T030173"
}
},
{
"category": "product_version",
"name": "vproxy 19.9.0.2",
"product": {
"name": "Dell NetWorker vproxy 19.9.0.2",
"product_id": "T030173-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy_19.9.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003cvproxy 19.8.0.3",
"product": {
"name": "Dell NetWorker \u003cvproxy 19.8.0.3",
"product_id": "T030174"
}
},
{
"category": "product_version",
"name": "vproxy 19.8.0.3",
"product": {
"name": "Dell NetWorker vproxy 19.8.0.3",
"product_id": "T030174-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy_19.8.0.3"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "NTP \u003cC.4.2.8.7.0",
"product": {
"name": "HPE HP-UX NTP \u003cC.4.2.8.7.0",
"product_id": "T038918"
}
},
{
"category": "product_version",
"name": "NTP C.4.2.8.7.0",
"product": {
"name": "HPE HP-UX NTP C.4.2.8.7.0",
"product_id": "T038918-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:hp:hp-ux:ntp__c.4.2.8.7.0"
}
}
}
],
"category": "product_name",
"name": "HP-UX"
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.2",
"product": {
"name": "IBM AIX 7.2",
"product_id": "434967",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.2"
}
}
},
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM AIX 7.3",
"product_id": "T029653",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"branches": [
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "IBM VIOS 3.1",
"product_id": "1039165",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:3.1"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.06.014",
"product": {
"name": "Meinberg LANTIME \u003cV7.06.014",
"product_id": "T027837"
}
},
{
"category": "product_version",
"name": "V7.06.014",
"product": {
"name": "Meinberg LANTIME V7.06.014",
"product_id": "T027837-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:meinberg:lantime:v7.06.014"
}
}
}
],
"category": "product_name",
"name": "LANTIME"
}
],
"category": "vendor",
"name": "Meinberg"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "4.2.8p15",
"product": {
"name": "Open Source ntp 4.2.8p15",
"product_id": "T016798",
"product_identification_helper": {
"cpe": "cpe:/a:ntp:ntp:4.2.8p15"
}
}
}
],
"category": "product_name",
"name": "ntp"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T015631",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
},
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26551",
"notes": [
{
"category": "description",
"text": "In ntp existieren mehrere Schwachstellen aufgrund von \"out of bounds\" Speicherzugriffen. Betroffen sind die Komponenten in \"libntp/mstolfp.c\" aus \"libntp\" und \"praecis_parse\" in \"ntpd/refclock_palisade.c\". Nach neueren Recherchen ist ein Remote-Angriff auf einen laufenden ntpd unwahrscheinlich, da die Funktion mstolfp(), die die ersten vier CVE\u2019s (CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554) betrifft, zwar in libntp/mstolfp.c definiert, aber von ntpd selbst nicht aufgerufen wird. Verwendet wird die Funktion lediglich im Hilfsprogramm ntpq, welches der Administrator aufrufen kann, um Status-Informationen von ntpd abzurufen und anzuzeigen. Folglich erfordert der Angriff eine lokale Interaktion eines Administrators und die Nutzung eines vom Angreifer kontrollierten NTP Servers. Die letzte CVE (CVE-2023-26555) bezieht sich auf einen Treiber f\u00fcr bestimmte GPS Empf\u00e4nger, die h\u00f6chstwahrscheinlich nur noch vereinzelt in Gebrauch sind. Eine Ausnutzung ist auch hier sehr unwahrscheinlich. Unsere Bewertung dieser Schwachstellen haben wir deshalb deutlich verringert."
}
],
"product_status": {
"known_affected": [
"T034128",
"T038918",
"434967",
"1039165",
"T015632",
"T016798",
"T034262",
"T015631",
"T030174",
"T030173",
"T034487",
"74185",
"978054",
"T002207",
"T034260",
"T027837",
"398363",
"T022212",
"T029653"
]
},
"release_date": "2023-04-11T22:00:00.000+00:00",
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"notes": [
{
"category": "description",
"text": "In ntp existieren mehrere Schwachstellen aufgrund von \"out of bounds\" Speicherzugriffen. Betroffen sind die Komponenten in \"libntp/mstolfp.c\" aus \"libntp\" und \"praecis_parse\" in \"ntpd/refclock_palisade.c\". Nach neueren Recherchen ist ein Remote-Angriff auf einen laufenden ntpd unwahrscheinlich, da die Funktion mstolfp(), die die ersten vier CVE\u2019s (CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554) betrifft, zwar in libntp/mstolfp.c definiert, aber von ntpd selbst nicht aufgerufen wird. Verwendet wird die Funktion lediglich im Hilfsprogramm ntpq, welches der Administrator aufrufen kann, um Status-Informationen von ntpd abzurufen und anzuzeigen. Folglich erfordert der Angriff eine lokale Interaktion eines Administrators und die Nutzung eines vom Angreifer kontrollierten NTP Servers. Die letzte CVE (CVE-2023-26555) bezieht sich auf einen Treiber f\u00fcr bestimmte GPS Empf\u00e4nger, die h\u00f6chstwahrscheinlich nur noch vereinzelt in Gebrauch sind. Eine Ausnutzung ist auch hier sehr unwahrscheinlich. Unsere Bewertung dieser Schwachstellen haben wir deshalb deutlich verringert."
}
],
"product_status": {
"known_affected": [
"T034128",
"T038918",
"434967",
"1039165",
"T015632",
"T016798",
"T034262",
"T015631",
"T030174",
"T030173",
"T034487",
"74185",
"978054",
"T002207",
"T034260",
"T027837",
"398363",
"T022212",
"T029653"
]
},
"release_date": "2023-04-11T22:00:00.000+00:00",
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"notes": [
{
"category": "description",
"text": "In ntp existieren mehrere Schwachstellen aufgrund von \"out of bounds\" Speicherzugriffen. Betroffen sind die Komponenten in \"libntp/mstolfp.c\" aus \"libntp\" und \"praecis_parse\" in \"ntpd/refclock_palisade.c\". Nach neueren Recherchen ist ein Remote-Angriff auf einen laufenden ntpd unwahrscheinlich, da die Funktion mstolfp(), die die ersten vier CVE\u2019s (CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554) betrifft, zwar in libntp/mstolfp.c definiert, aber von ntpd selbst nicht aufgerufen wird. Verwendet wird die Funktion lediglich im Hilfsprogramm ntpq, welches der Administrator aufrufen kann, um Status-Informationen von ntpd abzurufen und anzuzeigen. Folglich erfordert der Angriff eine lokale Interaktion eines Administrators und die Nutzung eines vom Angreifer kontrollierten NTP Servers. Die letzte CVE (CVE-2023-26555) bezieht sich auf einen Treiber f\u00fcr bestimmte GPS Empf\u00e4nger, die h\u00f6chstwahrscheinlich nur noch vereinzelt in Gebrauch sind. Eine Ausnutzung ist auch hier sehr unwahrscheinlich. Unsere Bewertung dieser Schwachstellen haben wir deshalb deutlich verringert."
}
],
"product_status": {
"known_affected": [
"T034128",
"T038918",
"434967",
"1039165",
"T015632",
"T016798",
"T034262",
"T015631",
"T030174",
"T030173",
"T034487",
"74185",
"978054",
"T002207",
"T034260",
"T027837",
"398363",
"T022212",
"T029653"
]
},
"release_date": "2023-04-11T22:00:00.000+00:00",
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"notes": [
{
"category": "description",
"text": "In ntp existieren mehrere Schwachstellen aufgrund von \"out of bounds\" Speicherzugriffen. Betroffen sind die Komponenten in \"libntp/mstolfp.c\" aus \"libntp\" und \"praecis_parse\" in \"ntpd/refclock_palisade.c\". Nach neueren Recherchen ist ein Remote-Angriff auf einen laufenden ntpd unwahrscheinlich, da die Funktion mstolfp(), die die ersten vier CVE\u2019s (CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554) betrifft, zwar in libntp/mstolfp.c definiert, aber von ntpd selbst nicht aufgerufen wird. Verwendet wird die Funktion lediglich im Hilfsprogramm ntpq, welches der Administrator aufrufen kann, um Status-Informationen von ntpd abzurufen und anzuzeigen. Folglich erfordert der Angriff eine lokale Interaktion eines Administrators und die Nutzung eines vom Angreifer kontrollierten NTP Servers. Die letzte CVE (CVE-2023-26555) bezieht sich auf einen Treiber f\u00fcr bestimmte GPS Empf\u00e4nger, die h\u00f6chstwahrscheinlich nur noch vereinzelt in Gebrauch sind. Eine Ausnutzung ist auch hier sehr unwahrscheinlich. Unsere Bewertung dieser Schwachstellen haben wir deshalb deutlich verringert."
}
],
"product_status": {
"known_affected": [
"T034128",
"T038918",
"434967",
"1039165",
"T015632",
"T016798",
"T034262",
"T015631",
"T030174",
"T030173",
"T034487",
"74185",
"978054",
"T002207",
"T034260",
"T027837",
"398363",
"T022212",
"T029653"
]
},
"release_date": "2023-04-11T22:00:00.000+00:00",
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-26555",
"notes": [
{
"category": "description",
"text": "In ntp existieren mehrere Schwachstellen aufgrund von \"out of bounds\" Speicherzugriffen. Betroffen sind die Komponenten in \"libntp/mstolfp.c\" aus \"libntp\" und \"praecis_parse\" in \"ntpd/refclock_palisade.c\". Nach neueren Recherchen ist ein Remote-Angriff auf einen laufenden ntpd unwahrscheinlich, da die Funktion mstolfp(), die die ersten vier CVE\u2019s (CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554) betrifft, zwar in libntp/mstolfp.c definiert, aber von ntpd selbst nicht aufgerufen wird. Verwendet wird die Funktion lediglich im Hilfsprogramm ntpq, welches der Administrator aufrufen kann, um Status-Informationen von ntpd abzurufen und anzuzeigen. Folglich erfordert der Angriff eine lokale Interaktion eines Administrators und die Nutzung eines vom Angreifer kontrollierten NTP Servers. Die letzte CVE (CVE-2023-26555) bezieht sich auf einen Treiber f\u00fcr bestimmte GPS Empf\u00e4nger, die h\u00f6chstwahrscheinlich nur noch vereinzelt in Gebrauch sind. Eine Ausnutzung ist auch hier sehr unwahrscheinlich. Unsere Bewertung dieser Schwachstellen haben wir deshalb deutlich verringert."
}
],
"product_status": {
"known_affected": [
"T034128",
"T038918",
"434967",
"1039165",
"T015632",
"T016798",
"T034262",
"T015631",
"T030174",
"T030173",
"T034487",
"74185",
"978054",
"T002207",
"T034260",
"T027837",
"398363",
"T022212",
"T029653"
]
},
"release_date": "2023-04-11T22:00:00.000+00:00",
"title": "CVE-2023-26555"
}
]
}
WID-SEC-W-2023-0938
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Bei ntp handelt es sich um eine Sammlung von Dienstprogrammen und einem Daemon zur Verwendung des Network Time Protocols auf UNIX-basierten Systemen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in ntp ausnutzen, um nicht n\u00e4her definierte Auswirkungen zu erreichen. Die Ausnutzung erfordert eine bestimmte Konfiguration und ggf. das Mitwirken eines Administrators, beispielsweise durch Social Engineering.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0938 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0938.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0938 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0938"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2396 vom 2024-01-10",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2396.html"
},
{
"category": "external",
"summary": "GitHub Repository ntp-4.2.8p15-cves vom 2023-04-11",
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves"
},
{
"category": "external",
"summary": "Meinberg Statement vom 2023-04-13",
"url": "https://www.meinberg.de/german/news/stellungnahme-zu-den-am-12-04-2023-gemeldeten-schwachstellen-im-ntp-projekt.htm"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2142-1 vom 2023-05-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014820.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2171-1 vom 2023-05-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014847.html"
},
{
"category": "external",
"summary": "Meinberg Security Advisory MBGSA-2023.03 vom 2023-05-23",
"url": "https://www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-2023-03-lantime-firmware-v7-06-014.htm"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-C0762A0E57 vom 2023-06-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-c0762a0e57"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-611A143D5F vom 2023-06-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-611a143d5f"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2608-1 vom 2023-06-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015269.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2609-1 vom 2023-06-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015268.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7047270 vom 2023-10-05",
"url": "https://www.ibm.com/support/pages/node/7047270"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-004 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox%C2%AE-Security-Bulletin-XRX24-004-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-005 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2023-317 vom 2023-11-13",
"url": "https://www.dell.com/support/kbdoc/de-de/000219148/dsa-2023-317-security-update-for-dell-networker-vproxy-multiple-linux-packages-vulnerabilities"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2024-2396 vom 2024-04-30",
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23228"
},
{
"category": "external",
"summary": "Broadcom Security Advisory vom 2024-04-30",
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23299"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04729en_us"
}
],
"source_lang": "en-US",
"title": "ntp: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-11T23:00:00.000+00:00",
"generator": {
"date": "2024-11-12T12:17:24.439+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2023-0938",
"initial_release_date": "2023-04-11T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-04-11T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-04-12T22:00:00.000+00:00",
"number": "2",
"summary": "Beschreibung und Bewertung angepasst"
},
{
"date": "2023-04-13T22:00:00.000+00:00",
"number": "3",
"summary": "Informationen von Meinberg aufgenommen"
},
{
"date": "2023-05-09T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-05-10T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-05-22T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Meinberg aufgenommen"
},
{
"date": "2023-06-04T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-06-21T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-10-05T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-11-12T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-01-09T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-03-03T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-05-01T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von HP aufgenommen"
}
],
"status": "final",
"version": "14"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T022212",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Fabric OS",
"product": {
"name": "Broadcom Fabric OS",
"product_id": "978054",
"product_identification_helper": {
"cpe": "cpe:/o:broadcom:fabric_operating_system:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.1d",
"product": {
"name": "Broadcom Fabric OS \u003c9.1.1d",
"product_id": "T034128"
}
},
{
"category": "product_version",
"name": "9.1.1d",
"product": {
"name": "Broadcom Fabric OS 9.1.1d",
"product_id": "T034128-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:broadcom:fabric_operating_system:9.1.1d"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.0b",
"product": {
"name": "Broadcom Fabric OS \u003c9.2.0b",
"product_id": "T034260"
}
},
{
"category": "product_version",
"name": "9.2.0b",
"product": {
"name": "Broadcom Fabric OS 9.2.0b",
"product_id": "T034260-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:broadcom:fabric_operating_system:9.2.0b"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.2.3e",
"product": {
"name": "Broadcom Fabric OS \u003c8.2.3e",
"product_id": "T034262"
}
},
{
"category": "product_version",
"name": "8.2.3e",
"product": {
"name": "Broadcom Fabric OS 8.2.3e",
"product_id": "T034262-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:broadcom:fabric_operating_system:8.2.3e"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.1",
"product": {
"name": "Broadcom Fabric OS \u003c9.2.1",
"product_id": "T034487"
}
},
{
"category": "product_version",
"name": "9.2.1",
"product": {
"name": "Broadcom Fabric OS 9.2.1",
"product_id": "T034487-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:broadcom:fabric_operating_system:9.2.1"
}
}
}
],
"category": "product_name",
"name": "Fabric OS"
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cvproxy 19.9.0.2",
"product": {
"name": "Dell NetWorker \u003cvproxy 19.9.0.2",
"product_id": "T030173"
}
},
{
"category": "product_version",
"name": "vproxy 19.9.0.2",
"product": {
"name": "Dell NetWorker vproxy 19.9.0.2",
"product_id": "T030173-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy_19.9.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003cvproxy 19.8.0.3",
"product": {
"name": "Dell NetWorker \u003cvproxy 19.8.0.3",
"product_id": "T030174"
}
},
{
"category": "product_version",
"name": "vproxy 19.8.0.3",
"product": {
"name": "Dell NetWorker vproxy 19.8.0.3",
"product_id": "T030174-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy_19.8.0.3"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "NTP \u003cC.4.2.8.7.0",
"product": {
"name": "HPE HP-UX NTP \u003cC.4.2.8.7.0",
"product_id": "T038918"
}
},
{
"category": "product_version",
"name": "NTP C.4.2.8.7.0",
"product": {
"name": "HPE HP-UX NTP C.4.2.8.7.0",
"product_id": "T038918-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:hp:hp-ux:ntp__c.4.2.8.7.0"
}
}
}
],
"category": "product_name",
"name": "HP-UX"
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.2",
"product": {
"name": "IBM AIX 7.2",
"product_id": "434967",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.2"
}
}
},
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM AIX 7.3",
"product_id": "T029653",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"branches": [
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "IBM VIOS 3.1",
"product_id": "1039165",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:3.1"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.06.014",
"product": {
"name": "Meinberg LANTIME \u003cV7.06.014",
"product_id": "T027837"
}
},
{
"category": "product_version",
"name": "V7.06.014",
"product": {
"name": "Meinberg LANTIME V7.06.014",
"product_id": "T027837-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:meinberg:lantime:v7.06.014"
}
}
}
],
"category": "product_name",
"name": "LANTIME"
}
],
"category": "vendor",
"name": "Meinberg"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "4.2.8p15",
"product": {
"name": "Open Source ntp 4.2.8p15",
"product_id": "T016798",
"product_identification_helper": {
"cpe": "cpe:/a:ntp:ntp:4.2.8p15"
}
}
}
],
"category": "product_name",
"name": "ntp"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T015631",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
},
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26551",
"notes": [
{
"category": "description",
"text": "In ntp existieren mehrere Schwachstellen aufgrund von \"out of bounds\" Speicherzugriffen. Betroffen sind die Komponenten in \"libntp/mstolfp.c\" aus \"libntp\" und \"praecis_parse\" in \"ntpd/refclock_palisade.c\". Nach neueren Recherchen ist ein Remote-Angriff auf einen laufenden ntpd unwahrscheinlich, da die Funktion mstolfp(), die die ersten vier CVE\u2019s (CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554) betrifft, zwar in libntp/mstolfp.c definiert, aber von ntpd selbst nicht aufgerufen wird. Verwendet wird die Funktion lediglich im Hilfsprogramm ntpq, welches der Administrator aufrufen kann, um Status-Informationen von ntpd abzurufen und anzuzeigen. Folglich erfordert der Angriff eine lokale Interaktion eines Administrators und die Nutzung eines vom Angreifer kontrollierten NTP Servers. Die letzte CVE (CVE-2023-26555) bezieht sich auf einen Treiber f\u00fcr bestimmte GPS Empf\u00e4nger, die h\u00f6chstwahrscheinlich nur noch vereinzelt in Gebrauch sind. Eine Ausnutzung ist auch hier sehr unwahrscheinlich. Unsere Bewertung dieser Schwachstellen haben wir deshalb deutlich verringert."
}
],
"product_status": {
"known_affected": [
"T034128",
"T038918",
"434967",
"1039165",
"T015632",
"T016798",
"T034262",
"T015631",
"T030174",
"T030173",
"T034487",
"74185",
"978054",
"T002207",
"T034260",
"T027837",
"398363",
"T022212",
"T029653"
]
},
"release_date": "2023-04-11T22:00:00.000+00:00",
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"notes": [
{
"category": "description",
"text": "In ntp existieren mehrere Schwachstellen aufgrund von \"out of bounds\" Speicherzugriffen. Betroffen sind die Komponenten in \"libntp/mstolfp.c\" aus \"libntp\" und \"praecis_parse\" in \"ntpd/refclock_palisade.c\". Nach neueren Recherchen ist ein Remote-Angriff auf einen laufenden ntpd unwahrscheinlich, da die Funktion mstolfp(), die die ersten vier CVE\u2019s (CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554) betrifft, zwar in libntp/mstolfp.c definiert, aber von ntpd selbst nicht aufgerufen wird. Verwendet wird die Funktion lediglich im Hilfsprogramm ntpq, welches der Administrator aufrufen kann, um Status-Informationen von ntpd abzurufen und anzuzeigen. Folglich erfordert der Angriff eine lokale Interaktion eines Administrators und die Nutzung eines vom Angreifer kontrollierten NTP Servers. Die letzte CVE (CVE-2023-26555) bezieht sich auf einen Treiber f\u00fcr bestimmte GPS Empf\u00e4nger, die h\u00f6chstwahrscheinlich nur noch vereinzelt in Gebrauch sind. Eine Ausnutzung ist auch hier sehr unwahrscheinlich. Unsere Bewertung dieser Schwachstellen haben wir deshalb deutlich verringert."
}
],
"product_status": {
"known_affected": [
"T034128",
"T038918",
"434967",
"1039165",
"T015632",
"T016798",
"T034262",
"T015631",
"T030174",
"T030173",
"T034487",
"74185",
"978054",
"T002207",
"T034260",
"T027837",
"398363",
"T022212",
"T029653"
]
},
"release_date": "2023-04-11T22:00:00.000+00:00",
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"notes": [
{
"category": "description",
"text": "In ntp existieren mehrere Schwachstellen aufgrund von \"out of bounds\" Speicherzugriffen. Betroffen sind die Komponenten in \"libntp/mstolfp.c\" aus \"libntp\" und \"praecis_parse\" in \"ntpd/refclock_palisade.c\". Nach neueren Recherchen ist ein Remote-Angriff auf einen laufenden ntpd unwahrscheinlich, da die Funktion mstolfp(), die die ersten vier CVE\u2019s (CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554) betrifft, zwar in libntp/mstolfp.c definiert, aber von ntpd selbst nicht aufgerufen wird. Verwendet wird die Funktion lediglich im Hilfsprogramm ntpq, welches der Administrator aufrufen kann, um Status-Informationen von ntpd abzurufen und anzuzeigen. Folglich erfordert der Angriff eine lokale Interaktion eines Administrators und die Nutzung eines vom Angreifer kontrollierten NTP Servers. Die letzte CVE (CVE-2023-26555) bezieht sich auf einen Treiber f\u00fcr bestimmte GPS Empf\u00e4nger, die h\u00f6chstwahrscheinlich nur noch vereinzelt in Gebrauch sind. Eine Ausnutzung ist auch hier sehr unwahrscheinlich. Unsere Bewertung dieser Schwachstellen haben wir deshalb deutlich verringert."
}
],
"product_status": {
"known_affected": [
"T034128",
"T038918",
"434967",
"1039165",
"T015632",
"T016798",
"T034262",
"T015631",
"T030174",
"T030173",
"T034487",
"74185",
"978054",
"T002207",
"T034260",
"T027837",
"398363",
"T022212",
"T029653"
]
},
"release_date": "2023-04-11T22:00:00.000+00:00",
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"notes": [
{
"category": "description",
"text": "In ntp existieren mehrere Schwachstellen aufgrund von \"out of bounds\" Speicherzugriffen. Betroffen sind die Komponenten in \"libntp/mstolfp.c\" aus \"libntp\" und \"praecis_parse\" in \"ntpd/refclock_palisade.c\". Nach neueren Recherchen ist ein Remote-Angriff auf einen laufenden ntpd unwahrscheinlich, da die Funktion mstolfp(), die die ersten vier CVE\u2019s (CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554) betrifft, zwar in libntp/mstolfp.c definiert, aber von ntpd selbst nicht aufgerufen wird. Verwendet wird die Funktion lediglich im Hilfsprogramm ntpq, welches der Administrator aufrufen kann, um Status-Informationen von ntpd abzurufen und anzuzeigen. Folglich erfordert der Angriff eine lokale Interaktion eines Administrators und die Nutzung eines vom Angreifer kontrollierten NTP Servers. Die letzte CVE (CVE-2023-26555) bezieht sich auf einen Treiber f\u00fcr bestimmte GPS Empf\u00e4nger, die h\u00f6chstwahrscheinlich nur noch vereinzelt in Gebrauch sind. Eine Ausnutzung ist auch hier sehr unwahrscheinlich. Unsere Bewertung dieser Schwachstellen haben wir deshalb deutlich verringert."
}
],
"product_status": {
"known_affected": [
"T034128",
"T038918",
"434967",
"1039165",
"T015632",
"T016798",
"T034262",
"T015631",
"T030174",
"T030173",
"T034487",
"74185",
"978054",
"T002207",
"T034260",
"T027837",
"398363",
"T022212",
"T029653"
]
},
"release_date": "2023-04-11T22:00:00.000+00:00",
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-26555",
"notes": [
{
"category": "description",
"text": "In ntp existieren mehrere Schwachstellen aufgrund von \"out of bounds\" Speicherzugriffen. Betroffen sind die Komponenten in \"libntp/mstolfp.c\" aus \"libntp\" und \"praecis_parse\" in \"ntpd/refclock_palisade.c\". Nach neueren Recherchen ist ein Remote-Angriff auf einen laufenden ntpd unwahrscheinlich, da die Funktion mstolfp(), die die ersten vier CVE\u2019s (CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554) betrifft, zwar in libntp/mstolfp.c definiert, aber von ntpd selbst nicht aufgerufen wird. Verwendet wird die Funktion lediglich im Hilfsprogramm ntpq, welches der Administrator aufrufen kann, um Status-Informationen von ntpd abzurufen und anzuzeigen. Folglich erfordert der Angriff eine lokale Interaktion eines Administrators und die Nutzung eines vom Angreifer kontrollierten NTP Servers. Die letzte CVE (CVE-2023-26555) bezieht sich auf einen Treiber f\u00fcr bestimmte GPS Empf\u00e4nger, die h\u00f6chstwahrscheinlich nur noch vereinzelt in Gebrauch sind. Eine Ausnutzung ist auch hier sehr unwahrscheinlich. Unsere Bewertung dieser Schwachstellen haben wir deshalb deutlich verringert."
}
],
"product_status": {
"known_affected": [
"T034128",
"T038918",
"434967",
"1039165",
"T015632",
"T016798",
"T034262",
"T015631",
"T030174",
"T030173",
"T034487",
"74185",
"978054",
"T002207",
"T034260",
"T027837",
"398363",
"T022212",
"T029653"
]
},
"release_date": "2023-04-11T22:00:00.000+00:00",
"title": "CVE-2023-26555"
}
]
}
cnvd-2023-32182
Vulnerability from cnvd
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法: https://www.ntppool.org/zh/
| Name | Ntp Ntp 4.2.8 p15 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2023-26554",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2023-26554"
}
},
"description": "NTP\u662fnwtime\u5f00\u6e90\u7684\u4e00\u4e2a\u7f51\u7edc\u65f6\u95f4\u534f\u8bae\u3002\n\nNTP 4.2.8p15\u7248\u672c\u5b58\u5728\u7f13\u51b2\u533a\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8elibntp/mstolfp.c\u7684mstolfp\u5728\u6dfb\u52a0\u7279\u6b8a\u5b57\u7b26\u65f6\u51fa\u73b0\u8d8a\u754c\u5199\u5165\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u6682\u672a\u53d1\u5e03\u4fee\u590d\u63aa\u65bd\u89e3\u51b3\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u5efa\u8bae\u4f7f\u7528\u6b64\u8f6f\u4ef6\u7684\u7528\u6237\u968f\u65f6\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u6216\u53c2\u8003\u7f51\u5740\u4ee5\u83b7\u53d6\u89e3\u51b3\u529e\u6cd5\uff1a \r\nhttps://www.ntppool.org/zh/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2023-32182",
"openTime": "2023-04-27",
"products": {
"product": "Ntp Ntp 4.2.8 p15"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2023-26554",
"serverity": "\u4e2d",
"submitTime": "2023-04-25",
"title": "NTP\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2023-32182\uff09"
}
ICSA-24-165-05
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple out-of-bounds vulnerabilities in third-party components are affecting SITOP UPS1600 before V2.5.4. Attackers could exploit these vulnerabilities and cause limited impact in the affected systems.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-238730.json"
},
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-238730.html"
},
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-238730.pdf"
},
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-238730.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-165-05 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-165-05.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-165-05 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-05"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SITOP UPS1600",
"tracking": {
"current_release_date": "2024-06-11T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-165-05",
"initial_release_date": "2024-06-11T00:00:00.000000Z",
"revision_history": [
{
"date": "2024-06-11T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 10 A Ethernet/ PROFINET (6EP4134-3AB00-2AY0)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6EP4134-3AB00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 10 A Ethernet/ PROFINET (6EP4134-3AB00-2AY0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 20 A Ethernet/ PROFINET (6EP4136-3AB00-2AY0)",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"model_numbers": [
"6EP4136-3AB00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 20 A Ethernet/ PROFINET (6EP4136-3AB00-2AY0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 40 A Ethernet/ PROFINET (6EP4137-3AB00-2AY0)",
"product_id": "CSAFPID-0003",
"product_identification_helper": {
"model_numbers": [
"6EP4137-3AB00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 40 A Ethernet/ PROFINET (6EP4137-3AB00-2AY0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 EX 20 A Ethernet PROFINET (6EP4136-3AC00-2AY0)",
"product_id": "CSAFPID-0004",
"product_identification_helper": {
"model_numbers": [
"6EP4136-3AC00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 EX 20 A Ethernet PROFINET (6EP4136-3AC00-2AY0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.5.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/79207181/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.5.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/79207181/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.5.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/79207181/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2023-26554"
}
]
}
icsa-24-165-05
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple out-of-bounds vulnerabilities in third-party components are affecting SITOP UPS1600 before V2.5.4. Attackers could exploit these vulnerabilities and cause limited impact in the affected systems.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-238730.json"
},
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-238730.html"
},
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-238730.pdf"
},
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-238730.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-165-05 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-165-05.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-165-05 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-05"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SITOP UPS1600",
"tracking": {
"current_release_date": "2024-06-11T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-165-05",
"initial_release_date": "2024-06-11T00:00:00.000000Z",
"revision_history": [
{
"date": "2024-06-11T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 10 A Ethernet/ PROFINET (6EP4134-3AB00-2AY0)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6EP4134-3AB00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 10 A Ethernet/ PROFINET (6EP4134-3AB00-2AY0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 20 A Ethernet/ PROFINET (6EP4136-3AB00-2AY0)",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"model_numbers": [
"6EP4136-3AB00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 20 A Ethernet/ PROFINET (6EP4136-3AB00-2AY0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 40 A Ethernet/ PROFINET (6EP4137-3AB00-2AY0)",
"product_id": "CSAFPID-0003",
"product_identification_helper": {
"model_numbers": [
"6EP4137-3AB00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 40 A Ethernet/ PROFINET (6EP4137-3AB00-2AY0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 EX 20 A Ethernet PROFINET (6EP4136-3AC00-2AY0)",
"product_id": "CSAFPID-0004",
"product_identification_helper": {
"model_numbers": [
"6EP4136-3AC00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 EX 20 A Ethernet PROFINET (6EP4136-3AC00-2AY0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.5.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/79207181/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.5.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/79207181/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.5.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/79207181/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2023-26554"
}
]
}
NCSC-2024-0246
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten, zoals SCALANCE, SICAM, Tecnomatix, SITOP en PowerSys.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van beveiligingsmaatregel\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.\n",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "general",
"text": "Write-what-where Condition",
"title": "CWE-123"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improper Null Termination",
"title": "CWE-170"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Use of Insufficiently Random Values",
"title": "CWE-330"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Creation of Temporary File in Directory with Insecure Permissions",
"title": "CWE-379"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "general",
"text": "Unsynchronized Access to Shared Data in a Multithreaded Context",
"title": "CWE-567"
},
{
"category": "general",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
},
{
"category": "general",
"text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute",
"title": "CWE-614"
},
{
"category": "general",
"text": "Improper Control of a Resource Through its Lifetime",
"title": "CWE-664"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Incorrect Type Conversion or Cast",
"title": "CWE-704"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Exposed Dangerous Method or Function",
"title": "CWE-749"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Deadlock",
"title": "CWE-833"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-024584.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-196737.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-238730.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-319319.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-337522.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-341067.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-481506.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-540640.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620338.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-625862.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-690517.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-879734.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-900277.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2024-06-11T13:29:25.912614Z",
"id": "NCSC-2024-0246",
"initial_release_date": "2024-06-11T13:29:25.912614Z",
"revision_history": [
{
"date": "2024-06-11T13:29:25.912614Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mendix",
"product": {
"name": "mendix",
"product_id": "CSAFPID-538452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic",
"product": {
"name": "simatic",
"product_id": "CSAFPID-166121",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec-nms",
"product": {
"name": "sinec-nms",
"product_id": "CSAFPID-163798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec-nms:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-166120",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_administrator",
"product": {
"name": "tia_administrator",
"product_id": "CSAFPID-766096",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_administrator:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_w700",
"product": {
"name": "scalance_w700",
"product_id": "CSAFPID-1009262",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:scalance_w700:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xm-400",
"product": {
"name": "scalance_xm-400",
"product_id": "CSAFPID-1014214",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:scalance_xm-400:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr-500",
"product": {
"name": "scalance_xr-500",
"product_id": "CSAFPID-1014213",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:scalance_xr-500:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sicam_ak_3",
"product": {
"name": "sicam_ak_3",
"product_id": "CSAFPID-1007975",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:sicam_ak_3:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sicam_bc",
"product": {
"name": "sicam_bc",
"product_id": "CSAFPID-1007979",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:sicam_bc:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sicam_tm",
"product": {
"name": "sicam_tm",
"product_id": "CSAFPID-1007978",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:sicam_tm:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_tim_1531_irc",
"product": {
"name": "siplus_tim_1531_irc",
"product_id": "CSAFPID-1326635",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:siplus_tim_1531_irc:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sitop_ups1600",
"product": {
"name": "sitop_ups1600",
"product_id": "CSAFPID-1037908",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:sitop_ups1600:-:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-28319",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-28319",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28319.json"
}
],
"title": "CVE-2023-28319"
},
{
"cve": "CVE-2023-28484",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-28484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json"
}
],
"title": "CVE-2023-28484"
},
{
"cve": "CVE-2023-29331",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-29331",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29331.json"
}
],
"title": "CVE-2023-29331"
},
{
"cve": "CVE-2023-29469",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-29469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json"
}
],
"title": "CVE-2023-29469"
},
{
"cve": "CVE-2023-32032",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-32032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32032.json"
}
],
"title": "CVE-2023-32032"
},
{
"cve": "CVE-2023-33126",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-33126",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33126.json"
}
],
"title": "CVE-2023-33126"
},
{
"cve": "CVE-2023-33127",
"cwe": {
"id": "CWE-1220",
"name": "Insufficient Granularity of Access Control"
},
"notes": [
{
"category": "other",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-33127",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33127.json"
}
],
"title": "CVE-2023-33127"
},
{
"cve": "CVE-2023-33128",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-33128",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33128.json"
}
],
"title": "CVE-2023-33128"
},
{
"cve": "CVE-2023-33135",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-33135",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33135.json"
}
],
"title": "CVE-2023-33135"
},
{
"cve": "CVE-2023-33170",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-33170",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33170.json"
}
],
"title": "CVE-2023-33170"
},
{
"cve": "CVE-2023-35390",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35390",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35390.json"
}
],
"title": "CVE-2023-35390"
},
{
"cve": "CVE-2023-35391",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35391",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35391.json"
}
],
"title": "CVE-2023-35391"
},
{
"cve": "CVE-2023-35788",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35788",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35788.json"
}
],
"title": "CVE-2023-35788"
},
{
"cve": "CVE-2023-35823",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35823",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35823.json"
}
],
"title": "CVE-2023-35823"
},
{
"cve": "CVE-2023-35824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35824",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35824.json"
}
],
"title": "CVE-2023-35824"
},
{
"cve": "CVE-2023-35828",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35828",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35828.json"
}
],
"title": "CVE-2023-35828"
},
{
"cve": "CVE-2023-35829",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35829",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35829.json"
}
],
"title": "CVE-2023-35829"
},
{
"cve": "CVE-2023-36038",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36038",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36038.json"
}
],
"title": "CVE-2023-36038"
},
{
"cve": "CVE-2023-36049",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36049",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36049.json"
}
],
"title": "CVE-2023-36049"
},
{
"cve": "CVE-2023-36435",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36435",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36435.json"
}
],
"title": "CVE-2023-36435"
},
{
"cve": "CVE-2023-36558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36558",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36558.json"
}
],
"title": "CVE-2023-36558"
},
{
"cve": "CVE-2023-36792",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36792",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36792.json"
}
],
"title": "CVE-2023-36792"
},
{
"cve": "CVE-2023-36793",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36793",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36793.json"
}
],
"title": "CVE-2023-36793"
},
{
"cve": "CVE-2023-36794",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36794",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36794.json"
}
],
"title": "CVE-2023-36794"
},
{
"cve": "CVE-2023-36796",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36796",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36796.json"
}
],
"title": "CVE-2023-36796"
},
{
"cve": "CVE-2023-36799",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36799",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36799.json"
}
],
"title": "CVE-2023-36799"
},
{
"cve": "CVE-2023-38171",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38171",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38171.json"
}
],
"title": "CVE-2023-38171"
},
{
"cve": "CVE-2023-38178",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38178",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38178.json"
}
],
"title": "CVE-2023-38178"
},
{
"cve": "CVE-2023-38180",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38180",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38180.json"
}
],
"title": "CVE-2023-38180"
},
{
"cve": "CVE-2023-38380",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38380",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38380.json"
}
],
"title": "CVE-2023-38380"
},
{
"cve": "CVE-2023-38533",
"cwe": {
"id": "CWE-379",
"name": "Creation of Temporary File in Directory with Insecure Permissions"
},
"notes": [
{
"category": "other",
"text": "Creation of Temporary File in Directory with Insecure Permissions",
"title": "CWE-379"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38533",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38533.json"
}
],
"title": "CVE-2023-38533"
},
{
"cve": "CVE-2023-39615",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39615",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39615.json"
}
],
"title": "CVE-2023-39615"
},
{
"cve": "CVE-2023-41910",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-41910",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41910.json"
}
],
"title": "CVE-2023-41910"
},
{
"cve": "CVE-2023-44317",
"cwe": {
"id": "CWE-349",
"name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
},
"notes": [
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-44317",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44317.json"
}
],
"title": "CVE-2023-44317"
},
{
"cve": "CVE-2023-44318",
"cwe": {
"id": "CWE-321",
"name": "Use of Hard-coded Cryptographic Key"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-44318",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44318.json"
}
],
"title": "CVE-2023-44318"
},
{
"cve": "CVE-2023-44319",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-44319",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44319.json"
}
],
"title": "CVE-2023-44319"
},
{
"cve": "CVE-2023-44373",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-44373",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44373.json"
}
],
"title": "CVE-2023-44373"
},
{
"cve": "CVE-2023-44374",
"cwe": {
"id": "CWE-567",
"name": "Unsynchronized Access to Shared Data in a Multithreaded Context"
},
"notes": [
{
"category": "other",
"text": "Unsynchronized Access to Shared Data in a Multithreaded Context",
"title": "CWE-567"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-44374",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44374.json"
}
],
"title": "CVE-2023-44374"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-49691",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-49691",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49691.json"
}
],
"title": "CVE-2023-49691"
},
{
"cve": "CVE-2023-50763",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50763",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50763.json"
}
],
"title": "CVE-2023-50763"
},
{
"cve": "CVE-2023-52474",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52474.json"
}
],
"title": "CVE-2023-52474"
},
{
"cve": "CVE-2024-0775",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-0775",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0775.json"
}
],
"title": "CVE-2024-0775"
},
{
"cve": "CVE-2024-31484",
"cwe": {
"id": "CWE-170",
"name": "Improper Null Termination"
},
"notes": [
{
"category": "other",
"text": "Improper Null Termination",
"title": "CWE-170"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-31484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31484.json"
}
],
"title": "CVE-2024-31484"
},
{
"cve": "CVE-2024-33500",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33500",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33500.json"
}
],
"title": "CVE-2024-33500"
},
{
"cve": "CVE-2024-35206",
"cwe": {
"id": "CWE-613",
"name": "Insufficient Session Expiration"
},
"notes": [
{
"category": "other",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35206",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35206.json"
}
],
"title": "CVE-2024-35206"
},
{
"cve": "CVE-2024-35207",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"notes": [
{
"category": "other",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35207",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35207.json"
}
],
"title": "CVE-2024-35207"
},
{
"cve": "CVE-2024-35208",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "other",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35208",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35208.json"
}
],
"title": "CVE-2024-35208"
},
{
"cve": "CVE-2024-35209",
"cwe": {
"id": "CWE-749",
"name": "Exposed Dangerous Method or Function"
},
"notes": [
{
"category": "other",
"text": "Exposed Dangerous Method or Function",
"title": "CWE-749"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35209",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35209.json"
}
],
"title": "CVE-2024-35209"
},
{
"cve": "CVE-2024-35210",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35210",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35210.json"
}
],
"title": "CVE-2024-35210"
},
{
"cve": "CVE-2024-35211",
"cwe": {
"id": "CWE-614",
"name": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute"
},
"notes": [
{
"category": "other",
"text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute",
"title": "CWE-614"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35211",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35211.json"
}
],
"title": "CVE-2024-35211"
},
{
"cve": "CVE-2024-35212",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35212",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35212.json"
}
],
"title": "CVE-2024-35212"
},
{
"cve": "CVE-2024-35292",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "other",
"text": "Use of Insufficiently Random Values",
"title": "CWE-330"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35292",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35292.json"
}
],
"title": "CVE-2024-35292"
},
{
"cve": "CVE-2024-35303",
"cwe": {
"id": "CWE-704",
"name": "Incorrect Type Conversion or Cast"
},
"notes": [
{
"category": "other",
"text": "Incorrect Type Conversion or Cast",
"title": "CWE-704"
}
],
"product_status": {
"known_affected": [
"CSAFPID-166120"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35303",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35303.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-166120"
]
}
],
"title": "CVE-2024-35303"
},
{
"cve": "CVE-2024-36266",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-36266",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36266.json"
}
],
"title": "CVE-2024-36266"
},
{
"cve": "CVE-2021-47178",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-47178",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-47178.json"
}
],
"title": "CVE-2021-47178"
},
{
"cve": "CVE-2022-1015",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-1015",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1015.json"
}
],
"title": "CVE-2022-1015"
},
{
"cve": "CVE-2022-2097",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-2097",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2097.json"
}
],
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-3435",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3435",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3435.json"
}
],
"title": "CVE-2022-3435"
},
{
"cve": "CVE-2022-3545",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3545",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3545.json"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3623",
"cwe": {
"id": "CWE-123",
"name": "Write-what-where Condition"
},
"notes": [
{
"category": "other",
"text": "Write-what-where Condition",
"title": "CWE-123"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3623",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3623.json"
}
],
"title": "CVE-2022-3623"
},
{
"cve": "CVE-2022-3643",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3643",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3643.json"
}
],
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-4304",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-4304",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4304.json"
}
],
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-4450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4450.json"
}
],
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-36323",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-36323",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36323.json"
}
],
"title": "CVE-2022-36323"
},
{
"cve": "CVE-2022-39189",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-39189",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-39189.json"
}
],
"title": "CVE-2022-39189"
},
{
"cve": "CVE-2022-40225",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"notes": [
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-40225",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40225.json"
}
],
"title": "CVE-2022-40225"
},
{
"cve": "CVE-2022-40303",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-40303",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40303.json"
}
],
"title": "CVE-2022-40303"
},
{
"cve": "CVE-2022-40304",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-40304",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40304.json"
}
],
"title": "CVE-2022-40304"
},
{
"cve": "CVE-2022-41742",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-41742",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41742.json"
}
],
"title": "CVE-2022-41742"
},
{
"cve": "CVE-2022-42328",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-42328",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42328.json"
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-42329",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42329.json"
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-44792",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-44792",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-44792.json"
}
],
"title": "CVE-2022-44792"
},
{
"cve": "CVE-2022-44793",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-44793",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-44793.json"
}
],
"title": "CVE-2022-44793"
},
{
"cve": "CVE-2022-45886",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-45886",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45886.json"
}
],
"title": "CVE-2022-45886"
},
{
"cve": "CVE-2022-45887",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-45887",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45887.json"
}
],
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45919",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-45919",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45919.json"
}
],
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-46144",
"cwe": {
"id": "CWE-664",
"name": "Improper Control of a Resource Through its Lifetime"
},
"notes": [
{
"category": "other",
"text": "Improper Control of a Resource Through its Lifetime",
"title": "CWE-664"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-46144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46144.json"
}
],
"title": "CVE-2022-46144"
},
{
"cve": "CVE-2023-0160",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "other",
"text": "Deadlock",
"title": "CWE-833"
},
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0160",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0160.json"
}
],
"title": "CVE-2023-0160"
},
{
"cve": "CVE-2023-0215",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0215",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0215.json"
}
],
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"cwe": {
"id": "CWE-704",
"name": "Incorrect Type Conversion or Cast"
},
"notes": [
{
"category": "other",
"text": "Incorrect Type Conversion or Cast",
"title": "CWE-704"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0286",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0286.json"
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0464",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0464",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0464.json"
}
],
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0465",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0465.json"
}
],
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0466.json"
}
],
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-1017",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-1017",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-1017.json"
}
],
"title": "CVE-2023-1017"
},
{
"cve": "CVE-2023-2124",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-2124",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2124.json"
}
],
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2269",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-2269",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2269.json"
}
],
"title": "CVE-2023-2269"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-3446",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json"
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3817",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-3817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json"
}
],
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-21255",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-21255",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-21255.json"
}
],
"title": "CVE-2023-21255"
},
{
"cve": "CVE-2023-21808",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-21808",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-21808.json"
}
],
"title": "CVE-2023-21808"
},
{
"cve": "CVE-2023-24895",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-24895",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24895.json"
}
],
"title": "CVE-2023-24895"
},
{
"cve": "CVE-2023-24897",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-24897",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24897.json"
}
],
"title": "CVE-2023-24897"
},
{
"cve": "CVE-2023-24936",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-24936",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24936.json"
}
],
"title": "CVE-2023-24936"
},
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-26552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json"
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-26553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json"
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-26554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json"
}
],
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-27321",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-27321",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27321.json"
}
],
"title": "CVE-2023-27321"
},
{
"cve": "CVE-2023-28260",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-28260",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28260.json"
}
],
"title": "CVE-2023-28260"
}
]
}
NCSC-2024-0411
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CWE-18",
"title": "CWE-18"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database producten",
"tracking": {
"current_release_date": "2024-10-17T13:15:19.595269Z",
"id": "NCSC-2024-0411",
"initial_release_date": "2024-10-17T13:15:19.595269Z",
"revision_history": [
{
"date": "2024-10-17T13:15:19.595269Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673509",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673508",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph_mapviewer",
"product": {
"name": "spatial_and_graph_mapviewer",
"product_id": "CSAFPID-912561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-764250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673512",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-816800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673529",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning_-_micronaut",
"product": {
"name": "fleet_patching_and_provisioning_-_micronaut",
"product_id": "CSAFPID-1673492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning",
"product": {
"name": "fleet_patching_and_provisioning",
"product_id": "CSAFPID-1503603",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673451",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673450",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-1673525",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816361",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503302",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-816801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-1673405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_administration",
"product": {
"name": "application_express_administration",
"product_id": "CSAFPID-764731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_customers_plugin",
"product": {
"name": "application_express_customers_plugin",
"product_id": "CSAFPID-764732",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_team_calendar_plugin",
"product": {
"name": "application_express_team_calendar_plugin",
"product_id": "CSAFPID-764733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-266119",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1503575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-764779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-89587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-765259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-187448",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-94075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-220886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-611394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-816317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-912567",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1503612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1673479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_essbase",
"product": {
"name": "oracle_essbase",
"product_id": "CSAFPID-1650506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-816845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1673404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data",
"product": {
"name": "goldengate_big_data",
"product_id": "CSAFPID-764274",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-764752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-1673384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-816846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-611390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-764803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_veridata",
"product": {
"name": "goldengate_veridata",
"product_id": "CSAFPID-764275",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-342816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-485902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-219912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_stream_analytics",
"product": {
"name": "oracle_goldengate_stream_analytics",
"product_id": "CSAFPID-1650515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-764861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-1503640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_studio",
"product": {
"name": "oracle_goldengate_studio",
"product_id": "CSAFPID-1650835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate",
"product": {
"name": "oracle_goldengate",
"product_id": "CSAFPID-1650575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_nosql_database",
"product": {
"name": "oracle_nosql_database",
"product_id": "CSAFPID-1650584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_secure_backup",
"product": {
"name": "oracle_secure_backup",
"product_id": "CSAFPID-1650563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-667692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-345049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-611417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-1673422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_sql_developer",
"product": {
"name": "oracle_sql_developer",
"product_id": "CSAFPID-1650638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-764822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-220643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-1673397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "oracle_application_express",
"product": {
"name": "oracle_application_express",
"product_id": "CSAFPID-1673144",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle_corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-220886",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764822",
"CSAFPID-1650515",
"CSAFPID-1650638",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-89587",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json"
}
],
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-34169",
"cwe": {
"id": "CWE-192",
"name": "Integer Coercion Error"
},
"notes": [
{
"category": "other",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34169",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-36033",
"cwe": {
"id": "CWE-87",
"name": "Improper Neutralization of Alternate XSS Syntax"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36033",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-36033"
},
{
"cve": "CVE-2022-37454",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
}
],
"title": "CVE-2022-37454"
},
{
"cve": "CVE-2022-38136",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-38136",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json"
}
],
"title": "CVE-2022-38136"
},
{
"cve": "CVE-2022-40196",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json"
}
],
"title": "CVE-2022-40196"
},
{
"cve": "CVE-2022-41342",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41342",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json"
}
],
"title": "CVE-2022-41342"
},
{
"cve": "CVE-2022-42919",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-42919",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-45061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
}
],
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-46337",
"product_status": {
"known_affected": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-46337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
}
],
"title": "CVE-2022-46337"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2976",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-4043",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-4759",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4759",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-4759"
},
{
"cve": "CVE-2023-4863",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4863",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json"
}
],
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5072",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-5072"
},
{
"cve": "CVE-2023-26031",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26031",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-26031"
},
{
"cve": "CVE-2023-26551",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26551",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-26555",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2023-28484",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-28484"
},
{
"cve": "CVE-2023-29469",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-29469"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-33201"
},
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-37920",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
}
],
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-39410",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39410",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-39410"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-44981",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
}
],
"title": "CVE-2023-44981"
},
{
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45288",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49083",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49083",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"category": "other",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51384",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51385",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-52425",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52426",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52426",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2024-1874",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-2408",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-2408"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5458",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5458"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5585"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-21131",
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json"
}
],
"title": "CVE-2024-21131"
},
{
"cve": "CVE-2024-21138",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json"
}
],
"title": "CVE-2024-21138"
},
{
"cve": "CVE-2024-21140",
"product_status": {
"known_affected": [
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21140",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json"
}
],
"title": "CVE-2024-21140"
},
{
"cve": "CVE-2024-21144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json"
}
],
"title": "CVE-2024-21144"
},
{
"cve": "CVE-2024-21145",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21145",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json"
}
],
"title": "CVE-2024-21145"
},
{
"cve": "CVE-2024-21147",
"product_status": {
"known_affected": [
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21147",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json"
}
],
"title": "CVE-2024-21147"
},
{
"cve": "CVE-2024-21233",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-21233"
},
{
"cve": "CVE-2024-21242",
"product_status": {
"known_affected": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21242",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
}
],
"title": "CVE-2024-21242"
},
{
"cve": "CVE-2024-21251",
"product_status": {
"known_affected": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21251",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
}
],
"title": "CVE-2024-21251"
},
{
"cve": "CVE-2024-21261",
"product_status": {
"known_affected": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21261",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-21261"
},
{
"cve": "CVE-2024-22018",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22018",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22018"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22201",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-22201"
},
{
"cve": "CVE-2024-23807",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23807"
},
{
"cve": "CVE-2024-23944",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23944",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23944"
},
{
"cve": "CVE-2024-24989",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24989",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json"
}
],
"title": "CVE-2024-24989"
},
{
"cve": "CVE-2024-24990",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24990",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-24990"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26130",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27983",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-27983"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-28887",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28887",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-28887"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-31079",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-31079"
},
{
"cve": "CVE-2024-32760",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-34161",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34161",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-34161"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35200",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-35200"
},
{
"cve": "CVE-2024-36137",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-36137"
},
{
"cve": "CVE-2024-36138",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json"
}
],
"title": "CVE-2024-36138"
},
{
"cve": "CVE-2024-36387",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-36387"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37372",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37372",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-37372"
},
{
"cve": "CVE-2024-38356",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38356",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38356"
},
{
"cve": "CVE-2024-38357",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38357",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38357"
},
{
"cve": "CVE-2024-38472",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38472",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38472"
},
{
"cve": "CVE-2024-38473",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38474",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38474"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38476",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38476"
},
{
"cve": "CVE-2024-38477",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38477",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38477"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-39573",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39573",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-39884",
"cwe": {
"id": "CWE-18",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-18",
"title": "CWE-18"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39884",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39884"
},
{
"cve": "CVE-2024-40725",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40725",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40725"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-45801",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45801",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-45801"
}
]
}
ncsc-2024-0411
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CWE-18",
"title": "CWE-18"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database producten",
"tracking": {
"current_release_date": "2024-10-17T13:15:19.595269Z",
"id": "NCSC-2024-0411",
"initial_release_date": "2024-10-17T13:15:19.595269Z",
"revision_history": [
{
"date": "2024-10-17T13:15:19.595269Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673509",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673508",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph_mapviewer",
"product": {
"name": "spatial_and_graph_mapviewer",
"product_id": "CSAFPID-912561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-764250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673512",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-816800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673529",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning_-_micronaut",
"product": {
"name": "fleet_patching_and_provisioning_-_micronaut",
"product_id": "CSAFPID-1673492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning",
"product": {
"name": "fleet_patching_and_provisioning",
"product_id": "CSAFPID-1503603",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673451",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673450",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-1673525",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816361",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503302",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-816801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-1673405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_administration",
"product": {
"name": "application_express_administration",
"product_id": "CSAFPID-764731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_customers_plugin",
"product": {
"name": "application_express_customers_plugin",
"product_id": "CSAFPID-764732",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_team_calendar_plugin",
"product": {
"name": "application_express_team_calendar_plugin",
"product_id": "CSAFPID-764733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-266119",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1503575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-764779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-89587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-765259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-187448",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-94075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-220886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-611394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-816317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-912567",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1503612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1673479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_essbase",
"product": {
"name": "oracle_essbase",
"product_id": "CSAFPID-1650506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-816845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1673404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data",
"product": {
"name": "goldengate_big_data",
"product_id": "CSAFPID-764274",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-764752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-1673384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-816846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-611390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-764803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_veridata",
"product": {
"name": "goldengate_veridata",
"product_id": "CSAFPID-764275",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-342816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-485902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-219912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_stream_analytics",
"product": {
"name": "oracle_goldengate_stream_analytics",
"product_id": "CSAFPID-1650515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-764861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-1503640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_studio",
"product": {
"name": "oracle_goldengate_studio",
"product_id": "CSAFPID-1650835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate",
"product": {
"name": "oracle_goldengate",
"product_id": "CSAFPID-1650575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_nosql_database",
"product": {
"name": "oracle_nosql_database",
"product_id": "CSAFPID-1650584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_secure_backup",
"product": {
"name": "oracle_secure_backup",
"product_id": "CSAFPID-1650563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-667692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-345049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-611417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-1673422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_sql_developer",
"product": {
"name": "oracle_sql_developer",
"product_id": "CSAFPID-1650638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-764822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-220643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-1673397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "oracle_application_express",
"product": {
"name": "oracle_application_express",
"product_id": "CSAFPID-1673144",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle_corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-220886",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764822",
"CSAFPID-1650515",
"CSAFPID-1650638",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-89587",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json"
}
],
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-34169",
"cwe": {
"id": "CWE-192",
"name": "Integer Coercion Error"
},
"notes": [
{
"category": "other",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34169",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-36033",
"cwe": {
"id": "CWE-87",
"name": "Improper Neutralization of Alternate XSS Syntax"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36033",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-36033"
},
{
"cve": "CVE-2022-37454",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
}
],
"title": "CVE-2022-37454"
},
{
"cve": "CVE-2022-38136",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-38136",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json"
}
],
"title": "CVE-2022-38136"
},
{
"cve": "CVE-2022-40196",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json"
}
],
"title": "CVE-2022-40196"
},
{
"cve": "CVE-2022-41342",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41342",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json"
}
],
"title": "CVE-2022-41342"
},
{
"cve": "CVE-2022-42919",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-42919",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-45061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
}
],
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-46337",
"product_status": {
"known_affected": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-46337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
}
],
"title": "CVE-2022-46337"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2976",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-4043",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-4759",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4759",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-4759"
},
{
"cve": "CVE-2023-4863",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4863",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json"
}
],
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5072",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-5072"
},
{
"cve": "CVE-2023-26031",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26031",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-26031"
},
{
"cve": "CVE-2023-26551",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26551",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-26555",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2023-28484",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-28484"
},
{
"cve": "CVE-2023-29469",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-29469"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-33201"
},
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-37920",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
}
],
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-39410",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39410",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-39410"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-44981",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
}
],
"title": "CVE-2023-44981"
},
{
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45288",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49083",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49083",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"category": "other",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51384",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51385",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-52425",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52426",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52426",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2024-1874",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-2408",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-2408"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5458",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5458"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5585"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-21131",
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json"
}
],
"title": "CVE-2024-21131"
},
{
"cve": "CVE-2024-21138",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json"
}
],
"title": "CVE-2024-21138"
},
{
"cve": "CVE-2024-21140",
"product_status": {
"known_affected": [
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21140",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json"
}
],
"title": "CVE-2024-21140"
},
{
"cve": "CVE-2024-21144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json"
}
],
"title": "CVE-2024-21144"
},
{
"cve": "CVE-2024-21145",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21145",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json"
}
],
"title": "CVE-2024-21145"
},
{
"cve": "CVE-2024-21147",
"product_status": {
"known_affected": [
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21147",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json"
}
],
"title": "CVE-2024-21147"
},
{
"cve": "CVE-2024-21233",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-21233"
},
{
"cve": "CVE-2024-21242",
"product_status": {
"known_affected": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21242",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
}
],
"title": "CVE-2024-21242"
},
{
"cve": "CVE-2024-21251",
"product_status": {
"known_affected": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21251",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
}
],
"title": "CVE-2024-21251"
},
{
"cve": "CVE-2024-21261",
"product_status": {
"known_affected": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21261",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-21261"
},
{
"cve": "CVE-2024-22018",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22018",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22018"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22201",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-22201"
},
{
"cve": "CVE-2024-23807",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23807"
},
{
"cve": "CVE-2024-23944",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23944",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23944"
},
{
"cve": "CVE-2024-24989",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24989",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json"
}
],
"title": "CVE-2024-24989"
},
{
"cve": "CVE-2024-24990",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24990",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-24990"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26130",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27983",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-27983"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-28887",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28887",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-28887"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-31079",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-31079"
},
{
"cve": "CVE-2024-32760",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-34161",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34161",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-34161"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35200",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-35200"
},
{
"cve": "CVE-2024-36137",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-36137"
},
{
"cve": "CVE-2024-36138",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json"
}
],
"title": "CVE-2024-36138"
},
{
"cve": "CVE-2024-36387",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-36387"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37372",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37372",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-37372"
},
{
"cve": "CVE-2024-38356",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38356",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38356"
},
{
"cve": "CVE-2024-38357",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38357",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38357"
},
{
"cve": "CVE-2024-38472",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38472",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38472"
},
{
"cve": "CVE-2024-38473",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38474",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38474"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38476",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38476"
},
{
"cve": "CVE-2024-38477",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38477",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38477"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-39573",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39573",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-39884",
"cwe": {
"id": "CWE-18",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-18",
"title": "CWE-18"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39884",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39884"
},
{
"cve": "CVE-2024-40725",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40725",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40725"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-45801",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45801",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-45801"
}
]
}
ncsc-2024-0246
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten, zoals SCALANCE, SICAM, Tecnomatix, SITOP en PowerSys.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van beveiligingsmaatregel\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.\n",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "general",
"text": "Write-what-where Condition",
"title": "CWE-123"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improper Null Termination",
"title": "CWE-170"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Use of Insufficiently Random Values",
"title": "CWE-330"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Creation of Temporary File in Directory with Insecure Permissions",
"title": "CWE-379"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "general",
"text": "Unsynchronized Access to Shared Data in a Multithreaded Context",
"title": "CWE-567"
},
{
"category": "general",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
},
{
"category": "general",
"text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute",
"title": "CWE-614"
},
{
"category": "general",
"text": "Improper Control of a Resource Through its Lifetime",
"title": "CWE-664"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Incorrect Type Conversion or Cast",
"title": "CWE-704"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Exposed Dangerous Method or Function",
"title": "CWE-749"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Deadlock",
"title": "CWE-833"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-024584.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-196737.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-238730.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-319319.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-337522.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-341067.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-481506.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-540640.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620338.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-625862.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-690517.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-879734.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-900277.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2024-06-11T13:29:25.912614Z",
"id": "NCSC-2024-0246",
"initial_release_date": "2024-06-11T13:29:25.912614Z",
"revision_history": [
{
"date": "2024-06-11T13:29:25.912614Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mendix",
"product": {
"name": "mendix",
"product_id": "CSAFPID-538452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic",
"product": {
"name": "simatic",
"product_id": "CSAFPID-166121",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec-nms",
"product": {
"name": "sinec-nms",
"product_id": "CSAFPID-163798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec-nms:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-166120",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_administrator",
"product": {
"name": "tia_administrator",
"product_id": "CSAFPID-766096",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_administrator:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_w700",
"product": {
"name": "scalance_w700",
"product_id": "CSAFPID-1009262",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:scalance_w700:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xm-400",
"product": {
"name": "scalance_xm-400",
"product_id": "CSAFPID-1014214",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:scalance_xm-400:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr-500",
"product": {
"name": "scalance_xr-500",
"product_id": "CSAFPID-1014213",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:scalance_xr-500:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sicam_ak_3",
"product": {
"name": "sicam_ak_3",
"product_id": "CSAFPID-1007975",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:sicam_ak_3:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sicam_bc",
"product": {
"name": "sicam_bc",
"product_id": "CSAFPID-1007979",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:sicam_bc:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sicam_tm",
"product": {
"name": "sicam_tm",
"product_id": "CSAFPID-1007978",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:sicam_tm:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_tim_1531_irc",
"product": {
"name": "siplus_tim_1531_irc",
"product_id": "CSAFPID-1326635",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:siplus_tim_1531_irc:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sitop_ups1600",
"product": {
"name": "sitop_ups1600",
"product_id": "CSAFPID-1037908",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:sitop_ups1600:-:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-28319",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-28319",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28319.json"
}
],
"title": "CVE-2023-28319"
},
{
"cve": "CVE-2023-28484",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-28484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json"
}
],
"title": "CVE-2023-28484"
},
{
"cve": "CVE-2023-29331",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-29331",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29331.json"
}
],
"title": "CVE-2023-29331"
},
{
"cve": "CVE-2023-29469",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-29469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json"
}
],
"title": "CVE-2023-29469"
},
{
"cve": "CVE-2023-32032",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-32032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32032.json"
}
],
"title": "CVE-2023-32032"
},
{
"cve": "CVE-2023-33126",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-33126",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33126.json"
}
],
"title": "CVE-2023-33126"
},
{
"cve": "CVE-2023-33127",
"cwe": {
"id": "CWE-1220",
"name": "Insufficient Granularity of Access Control"
},
"notes": [
{
"category": "other",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-33127",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33127.json"
}
],
"title": "CVE-2023-33127"
},
{
"cve": "CVE-2023-33128",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-33128",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33128.json"
}
],
"title": "CVE-2023-33128"
},
{
"cve": "CVE-2023-33135",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-33135",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33135.json"
}
],
"title": "CVE-2023-33135"
},
{
"cve": "CVE-2023-33170",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-33170",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33170.json"
}
],
"title": "CVE-2023-33170"
},
{
"cve": "CVE-2023-35390",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35390",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35390.json"
}
],
"title": "CVE-2023-35390"
},
{
"cve": "CVE-2023-35391",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35391",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35391.json"
}
],
"title": "CVE-2023-35391"
},
{
"cve": "CVE-2023-35788",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35788",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35788.json"
}
],
"title": "CVE-2023-35788"
},
{
"cve": "CVE-2023-35823",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35823",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35823.json"
}
],
"title": "CVE-2023-35823"
},
{
"cve": "CVE-2023-35824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35824",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35824.json"
}
],
"title": "CVE-2023-35824"
},
{
"cve": "CVE-2023-35828",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35828",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35828.json"
}
],
"title": "CVE-2023-35828"
},
{
"cve": "CVE-2023-35829",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-35829",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35829.json"
}
],
"title": "CVE-2023-35829"
},
{
"cve": "CVE-2023-36038",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36038",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36038.json"
}
],
"title": "CVE-2023-36038"
},
{
"cve": "CVE-2023-36049",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36049",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36049.json"
}
],
"title": "CVE-2023-36049"
},
{
"cve": "CVE-2023-36435",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36435",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36435.json"
}
],
"title": "CVE-2023-36435"
},
{
"cve": "CVE-2023-36558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36558",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36558.json"
}
],
"title": "CVE-2023-36558"
},
{
"cve": "CVE-2023-36792",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36792",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36792.json"
}
],
"title": "CVE-2023-36792"
},
{
"cve": "CVE-2023-36793",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36793",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36793.json"
}
],
"title": "CVE-2023-36793"
},
{
"cve": "CVE-2023-36794",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36794",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36794.json"
}
],
"title": "CVE-2023-36794"
},
{
"cve": "CVE-2023-36796",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36796",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36796.json"
}
],
"title": "CVE-2023-36796"
},
{
"cve": "CVE-2023-36799",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-36799",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36799.json"
}
],
"title": "CVE-2023-36799"
},
{
"cve": "CVE-2023-38171",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38171",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38171.json"
}
],
"title": "CVE-2023-38171"
},
{
"cve": "CVE-2023-38178",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38178",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38178.json"
}
],
"title": "CVE-2023-38178"
},
{
"cve": "CVE-2023-38180",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38180",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38180.json"
}
],
"title": "CVE-2023-38180"
},
{
"cve": "CVE-2023-38380",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38380",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38380.json"
}
],
"title": "CVE-2023-38380"
},
{
"cve": "CVE-2023-38533",
"cwe": {
"id": "CWE-379",
"name": "Creation of Temporary File in Directory with Insecure Permissions"
},
"notes": [
{
"category": "other",
"text": "Creation of Temporary File in Directory with Insecure Permissions",
"title": "CWE-379"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38533",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38533.json"
}
],
"title": "CVE-2023-38533"
},
{
"cve": "CVE-2023-39615",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39615",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39615.json"
}
],
"title": "CVE-2023-39615"
},
{
"cve": "CVE-2023-41910",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-41910",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41910.json"
}
],
"title": "CVE-2023-41910"
},
{
"cve": "CVE-2023-44317",
"cwe": {
"id": "CWE-349",
"name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
},
"notes": [
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-44317",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44317.json"
}
],
"title": "CVE-2023-44317"
},
{
"cve": "CVE-2023-44318",
"cwe": {
"id": "CWE-321",
"name": "Use of Hard-coded Cryptographic Key"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-44318",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44318.json"
}
],
"title": "CVE-2023-44318"
},
{
"cve": "CVE-2023-44319",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-44319",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44319.json"
}
],
"title": "CVE-2023-44319"
},
{
"cve": "CVE-2023-44373",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-44373",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44373.json"
}
],
"title": "CVE-2023-44373"
},
{
"cve": "CVE-2023-44374",
"cwe": {
"id": "CWE-567",
"name": "Unsynchronized Access to Shared Data in a Multithreaded Context"
},
"notes": [
{
"category": "other",
"text": "Unsynchronized Access to Shared Data in a Multithreaded Context",
"title": "CWE-567"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-44374",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44374.json"
}
],
"title": "CVE-2023-44374"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-49691",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-49691",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49691.json"
}
],
"title": "CVE-2023-49691"
},
{
"cve": "CVE-2023-50763",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50763",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50763.json"
}
],
"title": "CVE-2023-50763"
},
{
"cve": "CVE-2023-52474",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52474.json"
}
],
"title": "CVE-2023-52474"
},
{
"cve": "CVE-2024-0775",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-0775",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0775.json"
}
],
"title": "CVE-2024-0775"
},
{
"cve": "CVE-2024-31484",
"cwe": {
"id": "CWE-170",
"name": "Improper Null Termination"
},
"notes": [
{
"category": "other",
"text": "Improper Null Termination",
"title": "CWE-170"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-31484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31484.json"
}
],
"title": "CVE-2024-31484"
},
{
"cve": "CVE-2024-33500",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33500",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33500.json"
}
],
"title": "CVE-2024-33500"
},
{
"cve": "CVE-2024-35206",
"cwe": {
"id": "CWE-613",
"name": "Insufficient Session Expiration"
},
"notes": [
{
"category": "other",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35206",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35206.json"
}
],
"title": "CVE-2024-35206"
},
{
"cve": "CVE-2024-35207",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"notes": [
{
"category": "other",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35207",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35207.json"
}
],
"title": "CVE-2024-35207"
},
{
"cve": "CVE-2024-35208",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "other",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35208",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35208.json"
}
],
"title": "CVE-2024-35208"
},
{
"cve": "CVE-2024-35209",
"cwe": {
"id": "CWE-749",
"name": "Exposed Dangerous Method or Function"
},
"notes": [
{
"category": "other",
"text": "Exposed Dangerous Method or Function",
"title": "CWE-749"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35209",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35209.json"
}
],
"title": "CVE-2024-35209"
},
{
"cve": "CVE-2024-35210",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35210",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35210.json"
}
],
"title": "CVE-2024-35210"
},
{
"cve": "CVE-2024-35211",
"cwe": {
"id": "CWE-614",
"name": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute"
},
"notes": [
{
"category": "other",
"text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute",
"title": "CWE-614"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35211",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35211.json"
}
],
"title": "CVE-2024-35211"
},
{
"cve": "CVE-2024-35212",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35212",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35212.json"
}
],
"title": "CVE-2024-35212"
},
{
"cve": "CVE-2024-35292",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "other",
"text": "Use of Insufficiently Random Values",
"title": "CWE-330"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35292",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35292.json"
}
],
"title": "CVE-2024-35292"
},
{
"cve": "CVE-2024-35303",
"cwe": {
"id": "CWE-704",
"name": "Incorrect Type Conversion or Cast"
},
"notes": [
{
"category": "other",
"text": "Incorrect Type Conversion or Cast",
"title": "CWE-704"
}
],
"product_status": {
"known_affected": [
"CSAFPID-166120"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35303",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35303.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-166120"
]
}
],
"title": "CVE-2024-35303"
},
{
"cve": "CVE-2024-36266",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-36266",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36266.json"
}
],
"title": "CVE-2024-36266"
},
{
"cve": "CVE-2021-47178",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-47178",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-47178.json"
}
],
"title": "CVE-2021-47178"
},
{
"cve": "CVE-2022-1015",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-1015",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1015.json"
}
],
"title": "CVE-2022-1015"
},
{
"cve": "CVE-2022-2097",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-2097",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2097.json"
}
],
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-3435",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3435",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3435.json"
}
],
"title": "CVE-2022-3435"
},
{
"cve": "CVE-2022-3545",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3545",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3545.json"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3623",
"cwe": {
"id": "CWE-123",
"name": "Write-what-where Condition"
},
"notes": [
{
"category": "other",
"text": "Write-what-where Condition",
"title": "CWE-123"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3623",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3623.json"
}
],
"title": "CVE-2022-3623"
},
{
"cve": "CVE-2022-3643",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3643",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3643.json"
}
],
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-4304",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-4304",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4304.json"
}
],
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-4450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4450.json"
}
],
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-36323",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-36323",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36323.json"
}
],
"title": "CVE-2022-36323"
},
{
"cve": "CVE-2022-39189",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-39189",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-39189.json"
}
],
"title": "CVE-2022-39189"
},
{
"cve": "CVE-2022-40225",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"notes": [
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-40225",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40225.json"
}
],
"title": "CVE-2022-40225"
},
{
"cve": "CVE-2022-40303",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-40303",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40303.json"
}
],
"title": "CVE-2022-40303"
},
{
"cve": "CVE-2022-40304",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-40304",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40304.json"
}
],
"title": "CVE-2022-40304"
},
{
"cve": "CVE-2022-41742",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-41742",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41742.json"
}
],
"title": "CVE-2022-41742"
},
{
"cve": "CVE-2022-42328",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-42328",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42328.json"
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-42329",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42329.json"
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-44792",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-44792",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-44792.json"
}
],
"title": "CVE-2022-44792"
},
{
"cve": "CVE-2022-44793",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-44793",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-44793.json"
}
],
"title": "CVE-2022-44793"
},
{
"cve": "CVE-2022-45886",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-45886",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45886.json"
}
],
"title": "CVE-2022-45886"
},
{
"cve": "CVE-2022-45887",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-45887",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45887.json"
}
],
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45919",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-45919",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45919.json"
}
],
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-46144",
"cwe": {
"id": "CWE-664",
"name": "Improper Control of a Resource Through its Lifetime"
},
"notes": [
{
"category": "other",
"text": "Improper Control of a Resource Through its Lifetime",
"title": "CWE-664"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-46144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46144.json"
}
],
"title": "CVE-2022-46144"
},
{
"cve": "CVE-2023-0160",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "other",
"text": "Deadlock",
"title": "CWE-833"
},
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0160",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0160.json"
}
],
"title": "CVE-2023-0160"
},
{
"cve": "CVE-2023-0215",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0215",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0215.json"
}
],
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"cwe": {
"id": "CWE-704",
"name": "Incorrect Type Conversion or Cast"
},
"notes": [
{
"category": "other",
"text": "Incorrect Type Conversion or Cast",
"title": "CWE-704"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0286",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0286.json"
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0464",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0464",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0464.json"
}
],
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0465",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0465.json"
}
],
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-0466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0466.json"
}
],
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-1017",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-1017",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-1017.json"
}
],
"title": "CVE-2023-1017"
},
{
"cve": "CVE-2023-2124",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-2124",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2124.json"
}
],
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2269",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-2269",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2269.json"
}
],
"title": "CVE-2023-2269"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-3446",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json"
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3817",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-3817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json"
}
],
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-21255",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-21255",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-21255.json"
}
],
"title": "CVE-2023-21255"
},
{
"cve": "CVE-2023-21808",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-21808",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-21808.json"
}
],
"title": "CVE-2023-21808"
},
{
"cve": "CVE-2023-24895",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-24895",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24895.json"
}
],
"title": "CVE-2023-24895"
},
{
"cve": "CVE-2023-24897",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-24897",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24897.json"
}
],
"title": "CVE-2023-24897"
},
{
"cve": "CVE-2023-24936",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-24936",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24936.json"
}
],
"title": "CVE-2023-24936"
},
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-26552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json"
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-26553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json"
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-26554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json"
}
],
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-27321",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-27321",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27321.json"
}
],
"title": "CVE-2023-27321"
},
{
"cve": "CVE-2023-28260",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-28260",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28260.json"
}
],
"title": "CVE-2023-28260"
}
]
}
fkie_cve-2023-26554
Vulnerability from fkie_nvd
5.6 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554 | Third Party Advisory | |
| cve@mitre.org | https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321 | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p15:*:*:*:*:*:*",
"matchCriteriaId": "D300A755-9809-4469-8C08-20CB451C83A2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd."
}
],
"id": "CVE-2023-26554",
"lastModified": "2025-02-11T16:15:36.183",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.4,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-04-11T21:15:21.777",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
SSA-238730
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple out-of-bounds vulnerabilities in third-party components are affecting SITOP UPS1600 before V2.5.4. Attackers could exploit these vulnerabilities and cause limited impact in the affected systems.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-238730.html"
},
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-238730.json"
},
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-238730.pdf"
},
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-238730.txt"
}
],
"title": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4",
"tracking": {
"current_release_date": "2024-06-11T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-238730",
"initial_release_date": "2024-06-11T00:00:00Z",
"revision_history": [
{
"date": "2024-06-11T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "interim",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 10 A Ethernet/ PROFINET (6EP4134-3AB00-2AY0)",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"6EP4134-3AB00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 10 A Ethernet/ PROFINET (6EP4134-3AB00-2AY0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 20 A Ethernet/ PROFINET (6EP4136-3AB00-2AY0)",
"product_id": "2",
"product_identification_helper": {
"model_numbers": [
"6EP4136-3AB00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 20 A Ethernet/ PROFINET (6EP4136-3AB00-2AY0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 40 A Ethernet/ PROFINET (6EP4137-3AB00-2AY0)",
"product_id": "3",
"product_identification_helper": {
"model_numbers": [
"6EP4137-3AB00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 40 A Ethernet/ PROFINET (6EP4137-3AB00-2AY0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 EX 20 A Ethernet PROFINET (6EP4136-3AC00-2AY0)",
"product_id": "4",
"product_identification_helper": {
"model_numbers": [
"6EP4136-3AC00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 EX 20 A Ethernet PROFINET (6EP4136-3AC00-2AY0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.5.4 or later version",
"product_ids": [
"1",
"2",
"3",
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/79207181/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.5.4 or later version",
"product_ids": [
"1",
"2",
"3",
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/79207181/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.5.4 or later version",
"product_ids": [
"1",
"2",
"3",
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/79207181/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2023-26554"
}
]
}
ssa-238730
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple out-of-bounds vulnerabilities in third-party components are affecting SITOP UPS1600 before V2.5.4. Attackers could exploit these vulnerabilities and cause limited impact in the affected systems.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-238730.html"
},
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-238730.json"
},
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-238730.pdf"
},
{
"category": "self",
"summary": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-238730.txt"
}
],
"title": "SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4",
"tracking": {
"current_release_date": "2024-06-11T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-238730",
"initial_release_date": "2024-06-11T00:00:00Z",
"revision_history": [
{
"date": "2024-06-11T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "interim",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 10 A Ethernet/ PROFINET (6EP4134-3AB00-2AY0)",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"6EP4134-3AB00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 10 A Ethernet/ PROFINET (6EP4134-3AB00-2AY0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 20 A Ethernet/ PROFINET (6EP4136-3AB00-2AY0)",
"product_id": "2",
"product_identification_helper": {
"model_numbers": [
"6EP4136-3AB00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 20 A Ethernet/ PROFINET (6EP4136-3AB00-2AY0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 40 A Ethernet/ PROFINET (6EP4137-3AB00-2AY0)",
"product_id": "3",
"product_identification_helper": {
"model_numbers": [
"6EP4137-3AB00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 40 A Ethernet/ PROFINET (6EP4137-3AB00-2AY0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.5.4",
"product": {
"name": "SITOP UPS1600 EX 20 A Ethernet PROFINET (6EP4136-3AC00-2AY0)",
"product_id": "4",
"product_identification_helper": {
"model_numbers": [
"6EP4136-3AC00-2AY0"
]
}
}
}
],
"category": "product_name",
"name": "SITOP UPS1600 EX 20 A Ethernet PROFINET (6EP4136-3AC00-2AY0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.5.4 or later version",
"product_ids": [
"1",
"2",
"3",
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/79207181/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.5.4 or later version",
"product_ids": [
"1",
"2",
"3",
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/79207181/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.5.4 or later version",
"product_ids": [
"1",
"2",
"3",
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/79207181/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2023-26554"
}
]
}
suse-su-2023:2171-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ntp",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ntp fixes the following issues:\n\nFixed multiple out of bound writes:\n\nCVE-2023-26551 (bsc#1210386), CVE-2023-26552 (bsc#1210388), CVE-2023-26553 (bsc#1210387), CVE-2023-26554 (bsc#1210389).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-2171,SUSE-SLE-SERVER-12-SP5-2023-2171",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2171-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:2171-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232171-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:2171-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014847.html"
},
{
"category": "self",
"summary": "SUSE Bug 1210386",
"url": "https://bugzilla.suse.com/1210386"
},
{
"category": "self",
"summary": "SUSE Bug 1210387",
"url": "https://bugzilla.suse.com/1210387"
},
{
"category": "self",
"summary": "SUSE Bug 1210388",
"url": "https://bugzilla.suse.com/1210388"
},
{
"category": "self",
"summary": "SUSE Bug 1210389",
"url": "https://bugzilla.suse.com/1210389"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26551 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26551/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26552 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26552/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26553 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26553/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26554 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26554/"
}
],
"title": "Security update for ntp",
"tracking": {
"current_release_date": "2023-05-11T07:51:50Z",
"generator": {
"date": "2023-05-11T07:51:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:2171-1",
"initial_release_date": "2023-05-11T07:51:50Z",
"revision_history": [
{
"date": "2023-05-11T07:51:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ntp-4.2.8p15-100.1.aarch64",
"product": {
"name": "ntp-4.2.8p15-100.1.aarch64",
"product_id": "ntp-4.2.8p15-100.1.aarch64"
}
},
{
"category": "product_version",
"name": "ntp-doc-4.2.8p15-100.1.aarch64",
"product": {
"name": "ntp-doc-4.2.8p15-100.1.aarch64",
"product_id": "ntp-doc-4.2.8p15-100.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ntp-4.2.8p15-100.1.i586",
"product": {
"name": "ntp-4.2.8p15-100.1.i586",
"product_id": "ntp-4.2.8p15-100.1.i586"
}
},
{
"category": "product_version",
"name": "ntp-doc-4.2.8p15-100.1.i586",
"product": {
"name": "ntp-doc-4.2.8p15-100.1.i586",
"product_id": "ntp-doc-4.2.8p15-100.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ntp-4.2.8p15-100.1.ppc64le",
"product": {
"name": "ntp-4.2.8p15-100.1.ppc64le",
"product_id": "ntp-4.2.8p15-100.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ntp-doc-4.2.8p15-100.1.ppc64le",
"product": {
"name": "ntp-doc-4.2.8p15-100.1.ppc64le",
"product_id": "ntp-doc-4.2.8p15-100.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ntp-4.2.8p15-100.1.s390",
"product": {
"name": "ntp-4.2.8p15-100.1.s390",
"product_id": "ntp-4.2.8p15-100.1.s390"
}
},
{
"category": "product_version",
"name": "ntp-doc-4.2.8p15-100.1.s390",
"product": {
"name": "ntp-doc-4.2.8p15-100.1.s390",
"product_id": "ntp-doc-4.2.8p15-100.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ntp-4.2.8p15-100.1.s390x",
"product": {
"name": "ntp-4.2.8p15-100.1.s390x",
"product_id": "ntp-4.2.8p15-100.1.s390x"
}
},
{
"category": "product_version",
"name": "ntp-doc-4.2.8p15-100.1.s390x",
"product": {
"name": "ntp-doc-4.2.8p15-100.1.s390x",
"product_id": "ntp-doc-4.2.8p15-100.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ntp-4.2.8p15-100.1.x86_64",
"product": {
"name": "ntp-4.2.8p15-100.1.x86_64",
"product_id": "ntp-4.2.8p15-100.1.x86_64"
}
},
{
"category": "product_version",
"name": "ntp-doc-4.2.8p15-100.1.x86_64",
"product": {
"name": "ntp-doc-4.2.8p15-100.1.x86_64",
"product_id": "ntp-doc-4.2.8p15-100.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-100.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64"
},
"product_reference": "ntp-4.2.8p15-100.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-100.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le"
},
"product_reference": "ntp-4.2.8p15-100.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-100.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x"
},
"product_reference": "ntp-4.2.8p15-100.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-100.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64"
},
"product_reference": "ntp-4.2.8p15-100.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-doc-4.2.8p15-100.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64"
},
"product_reference": "ntp-doc-4.2.8p15-100.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-doc-4.2.8p15-100.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le"
},
"product_reference": "ntp-doc-4.2.8p15-100.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-doc-4.2.8p15-100.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x"
},
"product_reference": "ntp-doc-4.2.8p15-100.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-doc-4.2.8p15-100.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
},
"product_reference": "ntp-doc-4.2.8p15-100.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-100.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64"
},
"product_reference": "ntp-4.2.8p15-100.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-100.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le"
},
"product_reference": "ntp-4.2.8p15-100.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-100.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x"
},
"product_reference": "ntp-4.2.8p15-100.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-100.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64"
},
"product_reference": "ntp-4.2.8p15-100.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-doc-4.2.8p15-100.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64"
},
"product_reference": "ntp-doc-4.2.8p15-100.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-doc-4.2.8p15-100.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le"
},
"product_reference": "ntp-doc-4.2.8p15-100.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-doc-4.2.8p15-100.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x"
},
"product_reference": "ntp-doc-4.2.8p15-100.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-doc-4.2.8p15-100.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
},
"product_reference": "ntp-doc-4.2.8p15-100.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26551",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26551"
}
],
"notes": [
{
"category": "general",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write in the cp\u003ccpdec while loop. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26551",
"url": "https://www.suse.com/security/cve/CVE-2023-26551"
},
{
"category": "external",
"summary": "SUSE Bug 1210386 for CVE-2023-26551",
"url": "https://bugzilla.suse.com/1210386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-11T07:51:50Z",
"details": "moderate"
}
],
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26552"
}
],
"notes": [
{
"category": "general",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26552",
"url": "https://www.suse.com/security/cve/CVE-2023-26552"
},
{
"category": "external",
"summary": "SUSE Bug 1210388 for CVE-2023-26552",
"url": "https://bugzilla.suse.com/1210388"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-11T07:51:50Z",
"details": "moderate"
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26553"
}
],
"notes": [
{
"category": "general",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26553",
"url": "https://www.suse.com/security/cve/CVE-2023-26553"
},
{
"category": "external",
"summary": "SUSE Bug 1210387 for CVE-2023-26553",
"url": "https://bugzilla.suse.com/1210387"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-11T07:51:50Z",
"details": "moderate"
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26554"
}
],
"notes": [
{
"category": "general",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26554",
"url": "https://www.suse.com/security/cve/CVE-2023-26554"
},
{
"category": "external",
"summary": "SUSE Bug 1210389 for CVE-2023-26554",
"url": "https://bugzilla.suse.com/1210389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-4.2.8p15-100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ntp-doc-4.2.8p15-100.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-11T07:51:50Z",
"details": "moderate"
}
],
"title": "CVE-2023-26554"
}
]
}
suse-su-2023:2142-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ntp",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ntp fixes the following issues:\n\nFixed multiple out of bound writes:\nCVE-2023-26551 (bsc#1210386), CVE-2023-26552 (bsc#1210388), CVE-2023-26553 (bsc#1210387), CVE-2023-26554 (bsc#1210389).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-2142,SUSE-SLE-Module-Legacy-15-SP4-2023-2142,openSUSE-SLE-15.4-2023-2142",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2142-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:2142-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232142-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:2142-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-May/029305.html"
},
{
"category": "self",
"summary": "SUSE Bug 1210386",
"url": "https://bugzilla.suse.com/1210386"
},
{
"category": "self",
"summary": "SUSE Bug 1210387",
"url": "https://bugzilla.suse.com/1210387"
},
{
"category": "self",
"summary": "SUSE Bug 1210388",
"url": "https://bugzilla.suse.com/1210388"
},
{
"category": "self",
"summary": "SUSE Bug 1210389",
"url": "https://bugzilla.suse.com/1210389"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26551 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26551/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26552 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26552/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26553 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26553/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26554 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26554/"
}
],
"title": "Security update for ntp",
"tracking": {
"current_release_date": "2023-05-09T12:36:06Z",
"generator": {
"date": "2023-05-09T12:36:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:2142-1",
"initial_release_date": "2023-05-09T12:36:06Z",
"revision_history": [
{
"date": "2023-05-09T12:36:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ntp-4.2.8p15-150000.4.22.1.aarch64",
"product": {
"name": "ntp-4.2.8p15-150000.4.22.1.aarch64",
"product_id": "ntp-4.2.8p15-150000.4.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"product": {
"name": "ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"product_id": "ntp-doc-4.2.8p15-150000.4.22.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ntp-4.2.8p15-150000.4.22.1.i586",
"product": {
"name": "ntp-4.2.8p15-150000.4.22.1.i586",
"product_id": "ntp-4.2.8p15-150000.4.22.1.i586"
}
},
{
"category": "product_version",
"name": "ntp-doc-4.2.8p15-150000.4.22.1.i586",
"product": {
"name": "ntp-doc-4.2.8p15-150000.4.22.1.i586",
"product_id": "ntp-doc-4.2.8p15-150000.4.22.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ntp-4.2.8p15-150000.4.22.1.ppc64le",
"product": {
"name": "ntp-4.2.8p15-150000.4.22.1.ppc64le",
"product_id": "ntp-4.2.8p15-150000.4.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"product": {
"name": "ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"product_id": "ntp-doc-4.2.8p15-150000.4.22.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ntp-4.2.8p15-150000.4.22.1.s390x",
"product": {
"name": "ntp-4.2.8p15-150000.4.22.1.s390x",
"product_id": "ntp-4.2.8p15-150000.4.22.1.s390x"
}
},
{
"category": "product_version",
"name": "ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"product": {
"name": "ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"product_id": "ntp-doc-4.2.8p15-150000.4.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ntp-4.2.8p15-150000.4.22.1.x86_64",
"product": {
"name": "ntp-4.2.8p15-150000.4.22.1.x86_64",
"product_id": "ntp-4.2.8p15-150000.4.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "ntp-doc-4.2.8p15-150000.4.22.1.x86_64",
"product": {
"name": "ntp-doc-4.2.8p15-150000.4.22.1.x86_64",
"product_id": "ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-150000.4.22.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64"
},
"product_reference": "ntp-4.2.8p15-150000.4.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-150000.4.22.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le"
},
"product_reference": "ntp-4.2.8p15-150000.4.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-150000.4.22.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x"
},
"product_reference": "ntp-4.2.8p15-150000.4.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-150000.4.22.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64"
},
"product_reference": "ntp-4.2.8p15-150000.4.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-150000.4.22.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64"
},
"product_reference": "ntp-4.2.8p15-150000.4.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-150000.4.22.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le"
},
"product_reference": "ntp-4.2.8p15-150000.4.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-150000.4.22.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x"
},
"product_reference": "ntp-4.2.8p15-150000.4.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-4.2.8p15-150000.4.22.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64"
},
"product_reference": "ntp-4.2.8p15-150000.4.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-doc-4.2.8p15-150000.4.22.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64"
},
"product_reference": "ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-doc-4.2.8p15-150000.4.22.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le"
},
"product_reference": "ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-doc-4.2.8p15-150000.4.22.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x"
},
"product_reference": "ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntp-doc-4.2.8p15-150000.4.22.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
},
"product_reference": "ntp-doc-4.2.8p15-150000.4.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26551",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26551"
}
],
"notes": [
{
"category": "general",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write in the cp\u003ccpdec while loop. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26551",
"url": "https://www.suse.com/security/cve/CVE-2023-26551"
},
{
"category": "external",
"summary": "SUSE Bug 1210386 for CVE-2023-26551",
"url": "https://bugzilla.suse.com/1210386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T12:36:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26552"
}
],
"notes": [
{
"category": "general",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26552",
"url": "https://www.suse.com/security/cve/CVE-2023-26552"
},
{
"category": "external",
"summary": "SUSE Bug 1210388 for CVE-2023-26552",
"url": "https://bugzilla.suse.com/1210388"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T12:36:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26553"
}
],
"notes": [
{
"category": "general",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26553",
"url": "https://www.suse.com/security/cve/CVE-2023-26553"
},
{
"category": "external",
"summary": "SUSE Bug 1210387 for CVE-2023-26553",
"url": "https://bugzilla.suse.com/1210387"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T12:36:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26554"
}
],
"notes": [
{
"category": "general",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26554",
"url": "https://www.suse.com/security/cve/CVE-2023-26554"
},
{
"category": "external",
"summary": "SUSE Bug 1210389 for CVE-2023-26554",
"url": "https://bugzilla.suse.com/1210389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-4.2.8p15-150000.4.22.1.x86_64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.aarch64",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.ppc64le",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.s390x",
"openSUSE Leap 15.4:ntp-doc-4.2.8p15-150000.4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T12:36:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-26554"
}
]
}
ghsa-p43r-r5fw-2w5x
Vulnerability from github
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a '\0' character.
{
"affected": [],
"aliases": [
"CVE-2023-26554"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-04-11T21:15:00Z",
"severity": "MODERATE"
},
"details": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character.",
"id": "GHSA-p43r-r5fw-2w5x",
"modified": "2024-04-04T03:24:47Z",
"published": "2023-04-11T21:31:01Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26554"
},
{
"type": "WEB",
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321"
},
{
"type": "WEB",
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
}
]
}
gsd-2023-26554
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2023-26554",
"id": "GSD-2023-26554"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-26554"
],
"details": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"id": "GSD-2023-26554",
"modified": "2023-12-13T01:20:53.531855Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2023-26554",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554",
"refsource": "MISC",
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554"
},
{
"name": "https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321",
"refsource": "MISC",
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2023-26554"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554"
},
{
"name": "https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.4
}
},
"lastModifiedDate": "2023-04-20T14:37Z",
"publishedDate": "2023-04-11T21:15Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.