Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-28074 (GCVE-0-2023-28074)
Vulnerability from cvelistv5 – Published: 2024-07-31 07:56 – Updated: 2024-08-20 16:31
VLAI?
EPSS
Summary
Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information exposure.
Severity ?
6.2 (Medium)
CWE
- CWE-125 - Out-of-bounds Read
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dell | Dell BSAFE Micro Edition Suite |
Affected:
5.0
|
||||||||||||
|
||||||||||||||
Date Public ?
2023-04-13 06:30
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28074",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-01T17:45:55.850147Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-01T17:46:14.672Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Dell BSAFE Micro Edition Suite",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "5.0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Dell BSAFE Micro Edition Suite",
"vendor": "Dell",
"versions": [
{
"lessThanOrEqual": "4.6.1",
"status": "affected",
"version": "4.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Dell BSAFE Crypto-C Micro Edition",
"vendor": "Dell",
"versions": [
{
"lessThanOrEqual": "4.1.5",
"status": "affected",
"version": "4.0",
"versionType": "semver"
}
]
}
],
"datePublic": "2023-04-13T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information exposure."
}
],
"value": "Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information exposure."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125: Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-20T16:31:10.234Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update"
}
],
"source": {
"discovery": "UNKNOWN"
},
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue can be mitigated by a workaround, if customer\u2019s implementations are deemed to be vulnerable. Customers with an active maintenance contract can contact BSAFE Support for details about the workaround.\u003cbr\u003e"
}
],
"value": "This issue can be mitigated by a workaround, if customer\u2019s implementations are deemed to be vulnerable. Customers with an active maintenance contract can contact BSAFE Support for details about the workaround."
}
],
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28074",
"datePublished": "2024-07-31T07:56:01.652Z",
"dateReserved": "2023-03-10T05:07:55.140Z",
"dateUpdated": "2024-08-20T16:31:10.234Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2023-28074",
"date": "2026-04-15",
"epss": "0.00053",
"percentile": "0.16399"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-28074\",\"sourceIdentifier\":\"security_alert@emc.com\",\"published\":\"2024-07-31T08:15:02.243\",\"lastModified\":\"2024-08-20T17:15:10.200\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information exposure.\"},{\"lang\":\"es\",\"value\":\"Dell BSAFE Crypto-C Micro Edition 4.1.5 y Dell BSAFE Micro Edition Suite, versiones 4.0 a 4.6.1 y versi\u00f3n 5.0 contienen una vulnerabilidad de sobrelectura de b\u00fafer.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security_alert@emc.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.2,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"security_alert@emc.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:bsafe_crypto-c-micro-edition:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndIncluding\":\"4.1.5\",\"matchCriteriaId\":\"016B6D4C-062E-4D93-B3EA-CF5FFCB34ED4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:bsafe_micro-edition-suite:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.6.2\",\"matchCriteriaId\":\"C631A71E-7BA9-4375-ADA3-6AB91A737A30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:bsafe_micro-edition-suite:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21C6A56D-8CAF-45D5-A1E1-FE70F2584DF5\"}]}]}],\"references\":[{\"url\":\"https://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-28074\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-01T17:45:55.850147Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-01T17:46:02.992Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.2, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Dell\", \"product\": \"Dell BSAFE Micro Edition Suite\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.0\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Dell\", \"product\": \"Dell BSAFE Micro Edition Suite\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.6.1\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Dell\", \"product\": \"Dell BSAFE Crypto-C Micro Edition\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.1.5\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2023-04-13T06:30:00.000Z\", \"references\": [{\"url\": \"https://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update\", \"tags\": [\"vendor-advisory\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"This issue can be mitigated by a workaround, if customer\\u2019s implementations are deemed to be vulnerable. Customers with an active maintenance contract can contact BSAFE Support for details about the workaround.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"This issue can be mitigated by a workaround, if customer\\u2019s implementations are deemed to be vulnerable. Customers with an active maintenance contract can contact BSAFE Support for details about the workaround.\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information exposure.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information exposure.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125: Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"c550e75a-17ff-4988-97f0-544cde3820fe\", \"shortName\": \"dell\", \"dateUpdated\": \"2024-08-20T16:31:10.234Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-28074\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-20T16:31:10.234Z\", \"dateReserved\": \"2023-03-10T05:07:55.140Z\", \"assignerOrgId\": \"c550e75a-17ff-4988-97f0-544cde3820fe\", \"datePublished\": \"2024-07-31T07:56:01.652Z\", \"assignerShortName\": \"dell\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-75G8-QQ4F-VWX8
Vulnerability from github – Published: 2024-07-31 09:30 – Updated: 2024-07-31 09:30
VLAI?
Details
Dell BSAFE Crypto-C Micro Edition 4.1.5 and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0 contain a buffer over-read vulnerability.
Severity ?
6.2 (Medium)
{
"affected": [],
"aliases": [
"CVE-2023-28074"
],
"database_specific": {
"cwe_ids": [
"CWE-125",
"CWE-190"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-31T08:15:02Z",
"severity": "MODERATE"
},
"details": "Dell BSAFE Crypto-C Micro Edition 4.1.5 and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0 contain a buffer over-read vulnerability.",
"id": "GHSA-75g8-qq4f-vwx8",
"modified": "2024-07-31T09:30:49Z",
"published": "2024-07-31T09:30:49Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28074"
},
{
"type": "WEB",
"url": "https://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
CNVD-2024-34484
Vulnerability from cnvd - Published: 2024-08-05
VLAI Severity ?
Title
Dell BSAFE Micro Edition Suite和Dell BSAFE Crypto-C Micro Edition缓冲区过读漏洞
Description
Dell BSAFE Micro Edition Suite和Dell BSAFE Crypto-C Micro Edition都是美国戴尔(Dell)公司的产品。Dell BSAFE Micro Edition Suite是一个可为c/c++应用、设备、系统提供加密、证书和传输层安全性的开发工具包。Dell BSAFE Crypto-C Micro Edition是一套加密算法。
Dell BSAFE Micro Edition Suite和Dell BSAFE Crypto-C Micro Edition存在缓冲区过读漏洞。目前没有详细漏洞细节提供。
Severity
中
Patch Name
Dell BSAFE Micro Edition Suite和Dell BSAFE Crypto-C Micro Edition缓冲区过读漏洞的补丁
Patch Description
Dell BSAFE Micro Edition Suite和Dell BSAFE Crypto-C Micro Edition都是美国戴尔(Dell)公司的产品。Dell BSAFE Micro Edition Suite是一个可为c/c++应用、设备、系统提供加密、证书和传输层安全性的开发工具包。Dell BSAFE Crypto-C Micro Edition是一套加密算法。
Dell BSAFE Micro Edition Suite和Dell BSAFE Crypto-C Micro Edition存在缓冲区过读漏洞。目前没有详细漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update
Reference
https://cxsecurity.com/cveshow/CVE-2023-28074/
Impacted products
| Name | ['Dell BSAFE Crypto-C Micro Edition 4.1.5', 'DELL BSAFE Micro Edition Suite >=4.0,<=4.6.1', 'DELL BSAFE Micro Edition Suite 5.0'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2023-28074"
}
},
"description": "Dell BSAFE Micro Edition Suite\u548cDell BSAFE Crypto-C Micro Edition\u90fd\u662f\u7f8e\u56fd\u6234\u5c14\uff08Dell\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Dell BSAFE Micro Edition Suite\u662f\u4e00\u4e2a\u53ef\u4e3ac/c++\u5e94\u7528\u3001\u8bbe\u5907\u3001\u7cfb\u7edf\u63d0\u4f9b\u52a0\u5bc6\u3001\u8bc1\u4e66\u548c\u4f20\u8f93\u5c42\u5b89\u5168\u6027\u7684\u5f00\u53d1\u5de5\u5177\u5305\u3002Dell BSAFE Crypto-C Micro Edition\u662f\u4e00\u5957\u52a0\u5bc6\u7b97\u6cd5\u3002\n\nDell BSAFE Micro Edition Suite\u548cDell BSAFE Crypto-C Micro Edition\u5b58\u5728\u7f13\u51b2\u533a\u8fc7\u8bfb\u6f0f\u6d1e\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2024-34484",
"openTime": "2024-08-05",
"patchDescription": "Dell BSAFE Micro Edition Suite\u548cDell BSAFE Crypto-C Micro Edition\u90fd\u662f\u7f8e\u56fd\u6234\u5c14\uff08Dell\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Dell BSAFE Micro Edition Suite\u662f\u4e00\u4e2a\u53ef\u4e3ac/c++\u5e94\u7528\u3001\u8bbe\u5907\u3001\u7cfb\u7edf\u63d0\u4f9b\u52a0\u5bc6\u3001\u8bc1\u4e66\u548c\u4f20\u8f93\u5c42\u5b89\u5168\u6027\u7684\u5f00\u53d1\u5de5\u5177\u5305\u3002Dell BSAFE Crypto-C Micro Edition\u662f\u4e00\u5957\u52a0\u5bc6\u7b97\u6cd5\u3002\r\n\r\nDell BSAFE Micro Edition Suite\u548cDell BSAFE Crypto-C Micro Edition\u5b58\u5728\u7f13\u51b2\u533a\u8fc7\u8bfb\u6f0f\u6d1e\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Dell BSAFE Micro Edition Suite\u548cDell BSAFE Crypto-C Micro Edition\u7f13\u51b2\u533a\u8fc7\u8bfb\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Dell BSAFE Crypto-C Micro Edition 4.1.5",
"DELL BSAFE Micro Edition Suite \u003e=4.0\uff0c\u003c=4.6.1",
"DELL BSAFE Micro Edition Suite 5.0"
]
},
"referenceLink": "https://cxsecurity.com/cveshow/CVE-2023-28074/",
"serverity": "\u4e2d",
"submitTime": "2024-08-01",
"title": "Dell BSAFE Micro Edition Suite\u548cDell BSAFE Crypto-C Micro Edition\u7f13\u51b2\u533a\u8fc7\u8bfb\u6f0f\u6d1e"
}
WID-SEC-W-2024-1742
Vulnerability from csaf_certbund - Published: 2024-07-31 22:00 - Updated: 2024-07-31 22:00Summary
Dell BSAFE: Schwachstelle ermöglicht Denial of Service
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Dell BSAFE ist eine Sicherheitssoftware, die Entwicklern ermöglicht weitreichende Sicherheitsziele ihrer Applikationen zu erreichen.
Angriff: Ein lokaler Angreifer kann eine Schwachstelle in Dell BSAFE Micro Edition Suite und in Crypto-C Micro Edition ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme: - Sonstiges
- Windows
Es besteht eine Schwachstelle in Dell BSAFE Micro Edition Suite und in Crypto-C Micro Edition aufgrund eines Buffer-Over-Read-Problems. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.
References
| URL | Category | |
|---|---|---|
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell BSAFE ist eine Sicherheitssoftware, die Entwicklern erm\u00f6glicht weitreichende Sicherheitsziele ihrer Applikationen zu erreichen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in Dell BSAFE Micro Edition Suite und in Crypto-C Micro Edition ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1742 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1742.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1742 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1742"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-07-31",
"url": "https://github.com/advisories/GHSA-75g8-qq4f-vwx8"
},
{
"category": "external",
"summary": "Dell Security Update vom 2024-07-31",
"url": "https://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2024-07-31",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28074"
}
],
"source_lang": "en-US",
"title": "Dell BSAFE: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-07-31T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:11:53.296+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-1742",
"initial_release_date": "2024-07-31T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Micro Edition Suite \u003c5.0.1",
"product": {
"name": "Dell BSAFE Micro Edition Suite \u003c5.0.1",
"product_id": "T036545"
}
},
{
"category": "product_version_range",
"name": "Micro Edition Suite \u003c5.0.2.1",
"product": {
"name": "Dell BSAFE Micro Edition Suite \u003c5.0.2.1",
"product_id": "T036546"
}
},
{
"category": "product_version_range",
"name": "Micro Edition Suite \u003c4.6.2",
"product": {
"name": "Dell BSAFE Micro Edition Suite \u003c4.6.2",
"product_id": "T036547"
}
},
{
"category": "product_version_range",
"name": "Crypto-C Micro Edition \u003cMES 4.6.2",
"product": {
"name": "Dell BSAFE Crypto-C Micro Edition \u003cMES 4.6.2",
"product_id": "T036548"
}
},
{
"category": "product_version_range",
"name": "Crypto-C Micro Edition \u003cMES 5.0.1",
"product": {
"name": "Dell BSAFE Crypto-C Micro Edition \u003cMES 5.0.1",
"product_id": "T036549"
}
}
],
"category": "product_name",
"name": "BSAFE"
}
],
"category": "vendor",
"name": "Dell"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-28074",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in Dell BSAFE Micro Edition Suite und in Crypto-C Micro Edition aufgrund eines Buffer-Over-Read-Problems. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen."
}
],
"release_date": "2024-07-31T22:00:00.000+00:00",
"title": "CVE-2023-28074"
}
]
}
WID-SEC-W-2025-0225
Vulnerability from csaf_certbund - Published: 2025-01-30 23:00 - Updated: 2025-10-01 22:00Summary
Dell PowerProtect Data Domain: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Dell PowerProtect Data Domain Appliances sind speziell für Backup und Daten-Deduplizierung ausgelegte Systeme.
Angriff: Ein Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um erhöhte Rechte zu erlangen, einen Denial-of-Service-Zustand herbeizuführen und einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme: - Sonstiges
References
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um erh\u00f6hte Rechte zu erlangen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0225 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0225.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0225 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0225"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-022 vom 2025-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000279157/dsa-2025-022-security-update-for-dell-powerprotect-dd-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2804 vom 2025-04-02",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2804.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-1"
},
{
"category": "external",
"summary": "Security Update for Dell PowerProtect Data Domain",
"url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Dell Security Update vom 2025-10-02",
"url": "https://www.dell.com/support/kbdoc/000376224"
}
],
"source_lang": "en-US",
"title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-01T22:00:00.000+00:00",
"generator": {
"date": "2025-10-02T09:05:49.217+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-0225",
"initial_release_date": "2025-01-30T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.3.0.0",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.3.0.0",
"product_id": "T040718"
}
},
{
"category": "product_version",
"name": "8.3.0.0",
"product": {
"name": "Dell PowerProtect Data Domain 8.3.0.0",
"product_id": "T040718-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.13.1.20",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.13.1.20",
"product_id": "T040719"
}
},
{
"category": "product_version",
"name": "7.13.1.20",
"product": {
"name": "Dell PowerProtect Data Domain 7.13.1.20",
"product_id": "T040719-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.20"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.1.50",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.10.1.50",
"product_id": "T040721"
}
},
{
"category": "product_version",
"name": "7.10.1.50",
"product": {
"name": "Dell PowerProtect Data Domain 7.10.1.50",
"product_id": "T040721-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.50"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain",
"product": {
"name": "Dell PowerProtect Data Domain",
"product_id": "T045852",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
"product_id": "T045879"
}
},
{
"category": "product_version",
"name": "8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain 8.4.0.0",
"product_id": "T045879-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
"product_id": "T045881"
}
},
{
"category": "product_version",
"name": "7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain 7.10.1.70",
"product_id": "T045881-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
"product_id": "T047343"
}
},
{
"category": "product_version",
"name": "7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain 7.13.1.40",
"product_id": "T047343-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
"product_id": "T047344"
}
},
{
"category": "product_version",
"name": "8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain 8.3.1.10",
"product_id": "T047344-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
}
}
}
],
"category": "product_name",
"name": "PowerProtect Data Domain"
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain Management Center",
"product": {
"name": "Dell PowerProtect Data Domain Management Center",
"product_id": "T045853",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain OS",
"product": {
"name": "Dell PowerProtect Data Domain OS",
"product_id": "T045854",
"product_identification_helper": {
"cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4235",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2013-4235"
},
{
"cve": "CVE-2015-8100",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2015-8100"
},
{
"cve": "CVE-2017-9271",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2017-9271"
},
{
"cve": "CVE-2018-6798",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2018-6798"
},
{
"cve": "CVE-2018-6913",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2018-6913"
},
{
"cve": "CVE-2019-20633",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2019-20633"
},
{
"cve": "CVE-2019-20892",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2020-12762",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-15861",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2020-15861"
},
{
"cve": "CVE-2020-15862",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2020-15862"
},
{
"cve": "CVE-2021-3521",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-3521"
},
{
"cve": "CVE-2021-37750",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-37750"
},
{
"cve": "CVE-2021-46933",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-46933"
},
{
"cve": "CVE-2021-46955",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-46955"
},
{
"cve": "CVE-2021-47074",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47074"
},
{
"cve": "CVE-2021-47113",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47113"
},
{
"cve": "CVE-2021-47131",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47131"
},
{
"cve": "CVE-2021-47162",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47162"
},
{
"cve": "CVE-2021-47171",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47171"
},
{
"cve": "CVE-2021-47188",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47188"
},
{
"cve": "CVE-2021-47206",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47206"
},
{
"cve": "CVE-2021-47220",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47220"
},
{
"cve": "CVE-2021-47229",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47229"
},
{
"cve": "CVE-2021-47231",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47231"
},
{
"cve": "CVE-2021-47235",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47235"
},
{
"cve": "CVE-2022-2601",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-2601"
},
{
"cve": "CVE-2022-3775",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-3775"
},
{
"cve": "CVE-2022-44792",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-44792"
},
{
"cve": "CVE-2022-44793",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-44793"
},
{
"cve": "CVE-2022-48566",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-48566"
},
{
"cve": "CVE-2023-27043",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-28074",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-28074"
},
{
"cve": "CVE-2023-3164",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-3164"
},
{
"cve": "CVE-2023-36632",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-36632"
},
{
"cve": "CVE-2023-4421",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-4421"
},
{
"cve": "CVE-2023-44487",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45288",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-45733",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45733"
},
{
"cve": "CVE-2023-45745",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45745"
},
{
"cve": "CVE-2023-45918",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45918"
},
{
"cve": "CVE-2023-46103",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-46103"
},
{
"cve": "CVE-2023-4692",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-4692"
},
{
"cve": "CVE-2023-47233",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-47233"
},
{
"cve": "CVE-2023-47855",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-47855"
},
{
"cve": "CVE-2023-49083",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-50782",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-50782"
},
{
"cve": "CVE-2023-52425",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52426",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2023-52428",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52428"
},
{
"cve": "CVE-2023-52527",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52527"
},
{
"cve": "CVE-2023-52586",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52586"
},
{
"cve": "CVE-2023-52591",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52591"
},
{
"cve": "CVE-2023-52646",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52646"
},
{
"cve": "CVE-2023-52653",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52653"
},
{
"cve": "CVE-2023-52655",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52655"
},
{
"cve": "CVE-2023-52664",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52664"
},
{
"cve": "CVE-2023-52685",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52685"
},
{
"cve": "CVE-2023-52686",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52686"
},
{
"cve": "CVE-2023-52691",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52691"
},
{
"cve": "CVE-2023-52696",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52696"
},
{
"cve": "CVE-2023-52698",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52698"
},
{
"cve": "CVE-2023-52703",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52703"
},
{
"cve": "CVE-2023-52730",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52730"
},
{
"cve": "CVE-2023-52732",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52732"
},
{
"cve": "CVE-2023-52741",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52741"
},
{
"cve": "CVE-2023-52742",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52742"
},
{
"cve": "CVE-2023-52747",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52747"
},
{
"cve": "CVE-2023-52759",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52759"
},
{
"cve": "CVE-2023-52774",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52774"
},
{
"cve": "CVE-2023-52781",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52781"
},
{
"cve": "CVE-2023-52796",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52803",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52803"
},
{
"cve": "CVE-2023-52821",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52821"
},
{
"cve": "CVE-2023-52864",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52865",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52865"
},
{
"cve": "CVE-2023-52867",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52867"
},
{
"cve": "CVE-2023-52875",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52875"
},
{
"cve": "CVE-2023-52880",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52880"
},
{
"cve": "CVE-2023-5388",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-5388"
},
{
"cve": "CVE-2023-5752",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-5752"
},
{
"cve": "CVE-2023-5992",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-5992"
},
{
"cve": "CVE-2023-6597",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2024-0397",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-0450",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-0639",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0639"
},
{
"cve": "CVE-2024-0727",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-1737",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-1737"
},
{
"cve": "CVE-2024-1975",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-1975"
},
{
"cve": "CVE-2024-2004",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-20696",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-20696"
},
{
"cve": "CVE-2024-22195",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-2398",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-24577",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-24577"
},
{
"cve": "CVE-2024-24790",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-24790"
},
{
"cve": "CVE-2024-2511",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-25710",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26130",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-26458",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26458"
},
{
"cve": "CVE-2024-26461",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26461"
},
{
"cve": "CVE-2024-26625",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26625"
},
{
"cve": "CVE-2024-26739",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26739"
},
{
"cve": "CVE-2024-26752",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26752"
},
{
"cve": "CVE-2024-26775",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26775"
},
{
"cve": "CVE-2024-26791",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26791"
},
{
"cve": "CVE-2024-26828",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26828"
},
{
"cve": "CVE-2024-26846",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26846"
},
{
"cve": "CVE-2024-26874",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26874"
},
{
"cve": "CVE-2024-26876",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26876"
},
{
"cve": "CVE-2024-26900",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26900"
},
{
"cve": "CVE-2024-26915",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26915"
},
{
"cve": "CVE-2024-26920",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26920"
},
{
"cve": "CVE-2024-26921",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26921"
},
{
"cve": "CVE-2024-26929",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26929"
},
{
"cve": "CVE-2024-26930",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26930"
},
{
"cve": "CVE-2024-26931",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26931"
},
{
"cve": "CVE-2024-26934",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26934"
},
{
"cve": "CVE-2024-26957",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26957"
},
{
"cve": "CVE-2024-26958",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26958"
},
{
"cve": "CVE-2024-26984",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26984"
},
{
"cve": "CVE-2024-26996",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26996"
},
{
"cve": "CVE-2024-27008",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27008"
},
{
"cve": "CVE-2024-27054",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27054"
},
{
"cve": "CVE-2024-27059",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27059"
},
{
"cve": "CVE-2024-27062",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27062"
},
{
"cve": "CVE-2024-27388",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27388"
},
{
"cve": "CVE-2024-27396",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27396"
},
{
"cve": "CVE-2024-27398",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27398"
},
{
"cve": "CVE-2024-27401",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27401"
},
{
"cve": "CVE-2024-27419",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27419"
},
{
"cve": "CVE-2024-27436",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27436"
},
{
"cve": "CVE-2024-28085",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-28085"
},
{
"cve": "CVE-2024-28182",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-2961",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-32487",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-32487"
},
{
"cve": "CVE-2024-33599",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-33871",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33871"
},
{
"cve": "CVE-2024-34062",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-34062"
},
{
"cve": "CVE-2024-34064",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-34459",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-34459"
},
{
"cve": "CVE-2024-35195",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-35235",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35235"
},
{
"cve": "CVE-2024-35789",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35791",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35791"
},
{
"cve": "CVE-2024-35809",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35809"
},
{
"cve": "CVE-2024-35811",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35811"
},
{
"cve": "CVE-2024-35830",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35830"
},
{
"cve": "CVE-2024-35849",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35849"
},
{
"cve": "CVE-2024-35877",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35877"
},
{
"cve": "CVE-2024-35878",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35878"
},
{
"cve": "CVE-2024-35887",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35887"
},
{
"cve": "CVE-2024-35895",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35895"
},
{
"cve": "CVE-2024-35914",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35914"
},
{
"cve": "CVE-2024-35932",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35932"
},
{
"cve": "CVE-2024-35935",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35935"
},
{
"cve": "CVE-2024-35936",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35936"
},
{
"cve": "CVE-2024-35944",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35944"
},
{
"cve": "CVE-2024-35955",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35955"
},
{
"cve": "CVE-2024-35969",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35969"
},
{
"cve": "CVE-2024-35982",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35982"
},
{
"cve": "CVE-2024-36015",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-36015"
},
{
"cve": "CVE-2024-36029",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-36029"
},
{
"cve": "CVE-2024-3651",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-3651"
},
{
"cve": "CVE-2024-36954",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-36954"
},
{
"cve": "CVE-2024-37370",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38428",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-38428"
},
{
"cve": "CVE-2024-39689",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-39689"
},
{
"cve": "CVE-2024-4032",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-41110",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-41110"
},
{
"cve": "CVE-2024-4317",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-4317"
},
{
"cve": "CVE-2024-4741",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5206",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-5206"
},
{
"cve": "CVE-2024-5535",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6232",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6345",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-6345"
},
{
"cve": "CVE-2024-6655",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-6655"
},
{
"cve": "CVE-2024-7264",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-7592",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-53295",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-53295"
},
{
"cve": "CVE-2024-51534",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-51534"
},
{
"cve": "CVE-2024-53296",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-53296"
}
]
}
GSD-2023-28074
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2023-28074",
"id": "GSD-2023-28074"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-28074"
],
"id": "GSD-2023-28074",
"modified": "2023-12-13T01:20:46.784614Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2023-28074",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
FKIE_CVE-2023-28074
Vulnerability from fkie_nvd - Published: 2024-07-31 08:15 - Updated: 2024-08-20 17:15
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Summary
Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information exposure.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dell | bsafe_crypto-c-micro-edition | * | |
| dell | bsafe_micro-edition-suite | * | |
| dell | bsafe_micro-edition-suite | 5.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dell:bsafe_crypto-c-micro-edition:*:*:*:*:*:*:*:*",
"matchCriteriaId": "016B6D4C-062E-4D93-B3EA-CF5FFCB34ED4",
"versionEndIncluding": "4.1.5",
"versionStartIncluding": "4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dell:bsafe_micro-edition-suite:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C631A71E-7BA9-4375-ADA3-6AB91A737A30",
"versionEndExcluding": "4.6.2",
"versionStartIncluding": "4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dell:bsafe_micro-edition-suite:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21C6A56D-8CAF-45D5-A1E1-FE70F2584DF5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information exposure."
},
{
"lang": "es",
"value": "Dell BSAFE Crypto-C Micro Edition 4.1.5 y Dell BSAFE Micro Edition Suite, versiones 4.0 a 4.6.1 y versi\u00f3n 5.0 contienen una vulnerabilidad de sobrelectura de b\u00fafer."
}
],
"id": "CVE-2023-28074",
"lastModified": "2024-08-20T17:15:10.200",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6,
"source": "security_alert@emc.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-07-31T08:15:02.243",
"references": [
{
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "security_alert@emc.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…