Critical
Third-party Component | CVEs | More Information |
Apache HTTP Server |
CVE-2006-20001, CVE-2022-26377, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404, CVE-2022-30522, CVE-2022-30556, CVE-2022-31813, CVE-2022-36760, CVE-2022-37436, CVE-2022-48566, CVE-2023-25690, CVE-2023-27522, CVE-2023-31122, CVE-2023-38709, CVE-2023-39709, CVE-2023-44487, CVE-2023-45802, CVE-2024-24795, CVE-2024-27316, CVE-2024-38472, CVE-2024-38473, CVE-2024-38474, CVE-2024-38475, CVE-2024-38476, CVE-2024-38477, CVE-2024-39573, CVE-2024-39884, CVE-2024-40725 |
https://nvd.nist.gov/vuln/search |
Apache Tomcat | CVE-2024-23672, CVE-2024-24549 | https://nvd.nist.gov/vuln/search |
Apache Xerces-C | CVE-2018-1311 | https://nvd.nist.gov/vuln/search |
apr_base64 | CVE-2022-25147 | https://nvd.nist.gov/vuln/search |
Artifex Ghostscript | CVE-2023-28879, CVE-2023-36664 | https://nvd.nist.gov/vuln/search |
Avahi | CVE-2023-1981, CVE-2023-38470, CVE-2023-38472, CVE-2023-38473 | https://nvd.nist.gov/vuln/search |
BIND 9 | CVE-2022-2795, CVE-2022-3080, CVE-2022-3094, CVE-2022-3736, CVE-2022-3924, CVE-2022-38177, CVE-2022-38178, CVE-2023-2828, CVE-2023-2911, CVE-2023-3341, CVE-2023-4408, CVE-2023-5388, CVE-2023-5517, CVE-2023-5679, CVE-2023-6004, CVE-2023-6516, CVE-2023-6918, CVE-2023-50387, CVE-2023-50868, CVE-2024-1737, CVE-2024-1975, CVE-2024-4076 | https://nvd.nist.gov/vuln/search |
BIND DNS | CVE-2022-2795, CVE-2022-3094, CVE-2022-38177, CVE-2022-38178, CVE-2023-2828 | https://nvd.nist.gov/vuln/search |
binutils | CVE-2019-1010204, CVE-2020-19726, CVE-2021-3648, CVE-2021-45078, CVE-2022-4285, CVE-2022-35206, CVE-2022-38126, CVE-2022-38127, CVE-2022-38533, CVE-2022-44840, CVE-2022-45703, CVE-2022-47695, CVE-2022-47696, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-1972, CVE-2023-2222, CVE-2023-25585, CVE-2023-25587, CVE-2023-25588 | https://nvd.nist.gov/vuln/search |
Blink XSLT | CVE-2021-30560 | https://nvd.nist.gov/vuln/search |
BuildKit | CVE-2024-23651, CVE-2024-23652, CVE-2024-23653 | https://nvd.nist.gov/vuln/search |
BusyBox | CVE-2011-5325, CVE-2014-9645, CVE-2015-9261, CVE-2016-2147, CVE-2016-2148, CVE-2016-6301, CVE-2017-15873, CVE-2017-15874, CVE-2017-16544, CVE-2018-20679, CVE-2018-1000500, CVE-2018-1000517, CVE-2019-5747, CVE-2021-28831, CVE-2021-42376, CVE-2021-42380, CVE-2021-42384, CVE-2021-42386, CVE-2022-30065, CVE-2022-39253 | https://nvd.nist.gov/vuln/search |
c-ares | CVE-2022-4904, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067 | https://nvd.nist.gov/vuln/search |
Certifi | CVE-2022-23491 | https://nvd.nist.gov/vuln/search |
chkstat | CVE-2022-31252 | https://nvd.nist.gov/vuln/search |
containerd | CVE-2022-23471, CVE-2022-31030, CVE-2023-25153, CVE-2023-25173, CVE-2023-45288 | https://nvd.nist.gov/vuln/search |
cpio | CVE-2023-7207 | https://nvd.nist.gov/vuln/search |
CPython | CVE-2023-27043, CVE-2024-0397, CVE-2024-0450, CVE-2024-4032, CVE-2024-5642, CVE-2024-6232, CVE-2024-6923, CVE-2024-7592 | https://nvd.nist.gov/vuln/search |
cryptography | CVE-2023-23931 | https://nvd.nist.gov/vuln/search |
CUPS | CVE-2022-26691, CVE-2023-4504, CVE-2023-32324, CVE-2023-32360, CVE-2023-34241, CVE-2024-35235 | https://nvd.nist.gov/vuln/search |
curl | CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-32001, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-2004, CVE-2024-2398, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681 | https://nvd.nist.gov/vuln/search |
D-Bus | CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969 | https://nvd.nist.gov/vuln/search |
Dell BSAFE™ Micro Edition Suite | CVE-2019-3728, CVE-2019-3729, CVE-2019-3730, CVE-2019-3731, CVE-2019-3732, CVE-2019-3733, CVE-2020-5359, CVE-2020-5360, CVE-2020-26184, CVE-2020-26185, CVE-2020-29504, CVE-2020-29505, CVE-2020-29506, CVE-2020-29507, CVE-2020-29508, CVE-2020-35163, CVE-2020-35164, CVE-2020-35165, CVE-2020-35166, CVE-2020-35167, CVE-2020-35168, CVE-2020-35169, CVE-2021-21575, CVE-2023-28074 | https://nvd.nist.gov/vuln/search |
Dmidecode | CVE-2023-30630 | https://nvd.nist.gov/vuln/search |
Docker | CVE-2024-41110 | https://nvd.nist.gov/vuln/search |
Document Foundation LibreOffice | CVE-2023-0950, CVE-2023-2255 | https://nvd.nist.gov/vuln/search |
e2fsprogs | CVE-2022-1304 | https://nvd.nist.gov/vuln/search |
Envoy | CVE-2023-35945 | https://nvd.nist.gov/vuln/search |
Erlang/OTP | CVE-2022-37026 | https://nvd.nist.gov/vuln/search |
FreeType commit | CVE-2022-27404, CVE-2022-27405, CVE-2022-27406 | https://nvd.nist.gov/vuln/search |
Fribidi | CVE-2022-25308, CVE-2022-25309, CVE-2022-25310 | https://nvd.nist.gov/vuln/search |
gawk | CVE-2023-4156 | https://nvd.nist.gov/vuln/search |
Genivia gSOAP | CVE-2017-9765, CVE-2019-7659, CVE-2021-21783 | https://nvd.nist.gov/vuln/search |
Git | CVE-2022-23521, CVE-2022-29187, CVE-2022-39260, CVE-2022-41903, CVE-2023-22490, CVE-2023-25652, CVE-2023-25815, CVE-2023-29007, CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465 | https://nvd.nist.gov/vuln/search |
glibc | CVE-2023-4813 | https://nvd.nist.gov/vuln/search |
GNOME gdk-pixbuf | CVE-2021-44648, CVE-2021-46829, CVE-2022-48622 | https://nvd.nist.gov/vuln/search |
GNOME GLib | CVE-2024-52533 | https://nvd.nist.gov/vuln/search |
GNU C Library (aka glibc or libc6) |
CVE-2017-15670, CVE-2017-15804, CVE-2017-18269, CVE-2018-11236, CVE-2018-6485, CVE-2018-6551, CVE-2019-9169, CVE-2021-35942, CVE-2022-23219, CVE-2023-0687, CVE-2023-25180, CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 | https://nvd.nist.gov/vuln/search |
GNU Less | CVE-2022-46663 | https://nvd.nist.gov/vuln/search |
GNU patch | CVE-2018-6952, CVE-2019-13636 | https://nvd.nist.gov/vuln/search |
GNU tar |
CVE-2023-39804, CVE-2022-48303 |
https://nvd.nist.gov/vuln/search |
GNU Wget | CVE-2024-38428 | https://nvd.nist.gov/vuln/search |
GnuPG | CVE-2022-34903 | https://nvd.nist.gov/vuln/search |
GnuTLS | CVE-2022-2509, CVE-2023-0361, CVE-2023-5981, CVE-2024-0553, CVE-2024-0567, CVE-2024-28834, CVE-2024-28835 | https://nvd.nist.gov/vuln/search |
golang.org/x/crypto/ssh package | CVE-2022-27191 | https://nvd.nist.gov/vuln/search |
go-restful | CVE-2022-1996 | https://nvd.nist.gov/vuln/search |
GTK library | CVE-2024-6655 | https://nvd.nist.gov/vuln/search |
gzip | CVE-2022-1271 | https://nvd.nist.gov/vuln/search |
Harfbuzz | CVE-2022-33068, CVE-2023-25193 | https://nvd.nist.gov/vuln/search |
hwmon | CVE-2020-12912 | https://nvd.nist.gov/vuln/search |
ICU | CVE-2020-10531, CVE-2020-21913 | https://nvd.nist.gov/vuln/search |
ISC DHCP | CVE-2022-2928, CVE-2022-2929 | https://nvd.nist.gov/vuln/search |
json-c | CVE-2020-12762 | https://nvd.nist.gov/vuln/search |
Keccak XKCP SHA-3 | CVE-2022-37454 | https://nvd.nist.gov/vuln/search |
less | CVE-2024-32487, CVE-2022-48624 | https://nvd.nist.gov/vuln/search |
libarchive | CVE-2017-5601, CVE-2021-23177, CVE-2021-31566, CVE-2021-36976, CVE-2022-26280, CVE-2022-36227 | https://nvd.nist.gov/vuln/search |
libcap | CVE-2023-2602, CVE-2023-2603 | https://nvd.nist.gov/vuln/search |
libdb | CVE-2019-2708 | https://nvd.nist.gov/vuln/search |
libexpat | CVE-2022-1622, CVE-2022-25236, CVE-2022-40090, CVE-2022-40674, CVE-2022-43680, CVE-2023-1916, CVE-2023-2908, CVE-2023-3316, CVE-2023-3576, CVE-2023-3618, CVE-2023-25433, CVE-2023-26965, CVE-2023-26966, CVE-2023-37536, CVE-2023-38289, CVE-2023-52425, CVE-2024-28757 | https://nvd.nist.gov/vuln/search |
libfastjson | CVE-2023-2004 | https://nvd.nist.gov/vuln/search |
libgcc | CVE-2023-4039 | https://nvd.nist.gov/vuln/search |
libgit2 | CVE-2024-24577 | https://nvd.nist.gov/vuln/search |
libiberty | CVE-2021-32256, CVE-2021-3826, CVE-2021-46195, CVE-2022-27943, CVE-2022-35205, CVE-2022-47673, CVE-2023-1579 | https://nvd.nist.gov/vuln/search |
libjpeg | CVE-2018-11813 | https://nvd.nist.gov/vuln/search |
libjpeg-turbo | CVE-2014-9092, CVE-2017-15232, CVE-2018-1152, CVE-2018-19644, CVE-2018-19664, CVE-2018-20330, CVE-2020-13790, CVE-2020-17541, CVE-2020-18768 | https://nvd.nist.gov/vuln/search |
Libksba | CVE-2022-3515, CVE-2022-47629 | https://nvd.nist.gov/vuln/search |
libpcap | CVE-2023-7256, CVE-2024-8006 | https://nvd.nist.gov/vuln/search |
libpixman | CVE-2022-44638 | https://nvd.nist.gov/vuln/search |
libppd | CVE-2023-4504 | https://nvd.nist.gov/vuln/search |
libssh | CVE-2023-1667, CVE-2023-2283 | https://nvd.nist.gov/vuln/search |
libssh2 | CVE-2020-22218, CVE-2023-48795 | https://nvd.nist.gov/vuln/search |
Libtasn1 | CVE-2021-46848 | https://nvd.nist.gov/vuln/search |
libtiff | CVE-2022-0561, CVE-2022-0562, CVE-2022-0865, CVE-2022-0891, CVE-2022-0908, CVE-2022-0909, CVE-2022-0924, CVE-2022-1056, CVE-2022-2056, CVE-2022-2057, CVE-2022-2058, CVE-2022-2519, CVE-2022-2520, CVE-2022-2521, CVE-2022-2867, CVE-2022-2868, CVE-2022-2869, CVE-2022-34266, CVE-2022-34526, CVE-2022-3570, CVE-2022-3597, CVE-2022-3598, CVE-2022-3599, CVE-2022-3626, CVE-2022-3627, CVE-2022-3970, CVE-2022-48281, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0799, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804 | https://nvd.nist.gov/vuln/search |
libtirpc | CVE-2021-46828 | https://nvd.nist.gov/vuln/search |
libwayland | CVE-2021-3782 | https://nvd.nist.gov/vuln/search |
libX11 | CVE-2022-3554, CVE-2022-3555, CVE-2023-3138, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787 | https://nvd.nist.gov/vuln/search |
libxml2 | CVE-2022-29824, CVE-2022-40303, CVE-2022-40304, CVE-2023-2731, CVE-2023-28484, CVE-2023-29469, CVE-2023-39615, CVE-2023-45322, CVE-2024-25062 | https://nvd.nist.gov/vuln/search |
Linux Kernel | CVE-2022-48879, CVE-2022-48956, CVE-2022-48959, CVE-2022-48960, CVE-2022-48962, CVE-2022-48991, CVE-2022-49015, CVE-2024-43854, CVE-2024-45013, CVE-2024-45016, CVE-2024-45026, CVE-2024-46716, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46849, CVE-2024-47668, CVE-2024-47674, CVE-2024-47684, CVE-2024-47706, CVE-2024-47747, CVE-2024-47748, CVE-2024-49860, CVE-2024-49925, CVE-2024-49930, CVE-2024-49936, CVE-2024-49945, CVE-2024-49960, CVE-2024-49969, CVE-2024-49974, CVE-2024-49991, CVE-2024-49995, CVE-2024-50047, CVE-2024-50208 | https://nvd.nist.gov/vuln/search |
logrotate | CVE-2021-3864, CVE-2022-1348 | https://nvd.nist.gov/vuln/search |
lxml | CVE-2022-2309 | https://nvd.nist.gov/vuln/search |
MIT Kerberos 5 (aka krb5) | CVE-2022-42898, CVE-2023-36054, CVE-2024-26458, CVE-2024-26461, CVE-2024-37370, CVE-2024-37371 | https://nvd.nist.gov/vuln/search |
Moby | CVE-2022-24769, CVE-2023-28842, CVE-2022-36109, CVE-2023-28840, CVE-2023-28841 | https://nvd.nist.gov/vuln/search |
multipath-tools | CVE-2022-41974 | https://nvd.nist.gov/vuln/search |
ncurses | CVE-2022-29458, CVE-2023-29491, CVE-2023-45918, CVE-2023-50495 | https://nvd.nist.gov/vuln/search |
net-snmp | CVE-2022-24805, CVE-2022-24806, CVE-2022-24807, CVE-2022-24808, CVE-2022-24809, CVE-2022-24810, CVE-2022-44792 | https://nvd.nist.gov/vuln/search |
nghttp2 | CVE-2024-28182 | https://nvd.nist.gov/vuln/search |
NSS (Network Security Services) | CVE-2022-3479, CVE-2023-5388 | https://nvd.nist.gov/vuln/search |
NTP | CVE-2023-26555 | https://nvd.nist.gov/vuln/search |
openldap | CVE-2022-29155, CVE-2022-3515, CVE-2022-47629, CVE-2023-2953 | https://nvd.nist.gov/vuln/search |
OpenSSH | CVE-2022-40897, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2023-23583, CVE-2023-38408, CVE-2023-45803, CVE-2023-46246, CVE-2023-46316, CVE-2023-48795, CVE-2023-49083, CVE-2023-51385 | https://nvd.nist.gov/vuln/search |
OpenSSL | CVE-2022-1292, CVE-2022-2068, CVE-2022-2097, CVE-2022-4203, CVE-2022-4304, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0286, CVE-2023-0401, CVE-2023-0464, CVE-2023-0465, CVE-2023-0466, CVE-2023-2650, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2023-6597, CVE-2023-38288, CVE-2024-0727, CVE-2024-2511, CVE-2024-4741, CVE-2024-5535 | https://nvd.nist.gov/vuln/search |
openSUSE libecon | CVE-2023-32181, CVE-2023-22652 | https://nvd.nist.gov/vuln/search |
OpenTelemetry-Go Contrib | CVE-2023-45142, CVE-2023-47108 | https://nvd.nist.gov/vuln/search |
Oracle Java SE | CVE-2023-32643, CVE-2023-41993, CVE-2023-42950, CVE-2024-20918, CVE-2024-20932, CVE-2024-20952, CVE-2024-21002, CVE-2024-21003, CVE-2024-21004, CVE-2024-21005, CVE-2024-21011, CVE-2024-21068, CVE-2024-21085, CVE-2024-21094, CVE-2024-21147, CVE-2024-21892, CVE-2024-25062 | https://nvd.nist.gov/vuln/search |
PCRE | CVE-2022-41409 | https://nvd.nist.gov/vuln/search |
PCRE2 | CVE-2022-1586, CVE-2022-1587 | https://nvd.nist.gov/vuln/search |
Perl | CVE-2017-6512, CVE-2018-6798, CVE-2018-6913, CVE-2022-31081, CVE-2023-31484 | https://nvd.nist.gov/vuln/search |
PKCS | CVE-2023-0767 | https://nvd.nist.gov/vuln/search |
PostgreSQL | CVE-2022-1552, CVE-2022-2625, CVE-2022-41862, CVE-2023-2454, CVE-2023-2455, CVE-2023-39417, CVE-2023-39418, CVE-2024-0985, CVE-2024-4317, CVE-2024-7348, CVE-2024-10976, CVE-2024-10977, CVE-2024-10978, CVE-2024-10979 | https://nvd.nist.gov/vuln/search |
ppm2tiff | CVE-2012-4564 | https://nvd.nist.gov/vuln/search |
procps | CVE-2023-4016 | https://nvd.nist.gov/vuln/search |
py | CVE-2022-42969 | https://nvd.nist.gov/vuln/search |
pypa/setuptools | CVE-2024-6345 | https://nvd.nist.gov/vuln/search |
Python | CVE-2007-4559, CVE-2015-20107, CVE-2020-10735, CVE-2021-28861, CVE-2022-25236, CVE-2022-45061, CVE-2023-24329, CVE-2023-40217 | https://nvd.nist.gov/vuln/search |
Python Charmers Future | CVE-2022-40899 | https://nvd.nist.gov/vuln/search |
python3-urllib3 | CVE-2024-37891 | https://nvd.nist.gov/vuln/search |
python-cryptography | CVE-2023-50782 | https://nvd.nist.gov/vuln/search |
RAPL | CVE-2020-8694, CVE-2020-8695 | https://nvd.nist.gov/vuln/search |
Requests | CVE-2023-32681, CVE-2024-35195 | https://nvd.nist.gov/vuln/search |
rsync | CVE-2022-29154 | https://nvd.nist.gov/vuln/search |
runc | CVE-2022-29162, CVE-2023-25809, CVE-2023-27561, CVE-2023-28642, CVE-2024-21626, CVE-2024-45310 | https://nvd.nist.gov/vuln/search |
SBM | CVE-2018-19644 | https://nvd.nist.gov/vuln/search |
shadow | CVE-2013-4235, CVE-2023-29383 | https://nvd.nist.gov/vuln/search |
shadow-utils | CVE-2023-4641 | https://nvd.nist.gov/vuln/search |
SourceCodester Prison Management System 1.0 | CVE-2024-3439 | https://nvd.nist.gov/vuln/search |
Spring Framework | CVE-2015-5211 | https://nvd.nist.gov/vuln/search |
Spring Security | CVE-2014-3527 | https://nvd.nist.gov/vuln/search |
SQLite | CVE-2022-35737, CVE-2021-36690, CVE-2022-46908, CVE-2023-2137 | https://nvd.nist.gov/vuln/search |
Sudo | CVE-2022-43995, CVE-2023-22809, CVE-2023-27320, CVE-2023-28486, CVE-2023-28487, CVE-2023-42465 | https://nvd.nist.gov/vuln/search |
supportutils | CVE-2022-45154 | https://nvd.nist.gov/vuln/search |
systemd | CVE-2022-3821, CVE-2022-4415 | https://nvd.nist.gov/vuln/search |
telnet | CVE-2022-39028 | https://nvd.nist.gov/vuln/search |
ucode-intel | CVE-2022-21151, CVE-2022-21216, CVE-2022-21233, CVE-2022-33196, CVE-2022-33972, CVE-2022-38090, CVE-2022-40982, CVE-2022-41804, CVE-2023-22655, CVE-2023-23908, CVE-2023-28746, CVE-2023-38575, CVE-2023-39368, CVE-2023-45733, CVE-2023-46103, CVE-2023-47855, CVE-2024-21820, CVE-2024-21853, CVE-2024-23918, CVE-2024-23984, CVE-2024-24968 | https://nvd.nist.gov/vuln/search |
Unzip utility | CVE-2022-0529, CVE-2022-0530 | https://nvd.nist.gov/vuln/search |
urllib3 | CVE-2023-43804 | https://nvd.nist.gov/vuln/search |
util-linux | CVE-2024-28085 | https://nvd.nist.gov/vuln/search |
Vim |
CVE-2017-17087, CVE-2021-3875, CVE-2021-3903, CVE-2021-3968, CVE-2021-3973, CVE-2021-3974, CVE-2021-4069, CVE-2021-4136, CVE-2021-4166, CVE-2021-4192, CVE-2022-0128, CVE-2022-0213, CVE-2022-0261, CVE-2022-0359, CVE-2022-0392, CVE-2022-0407, CVE-2022-0696, CVE-2022-1381, CVE-2022-1420, CVE-2022-1616, CVE-2022-1619, CVE-2022-1620, CVE-2022-1720, CVE-2022-1733, CVE-2022-1735, CVE-2022-1771, CVE-2022-1785, CVE-2022-1796, CVE-2022-1851, CVE-2022-1897, CVE-2022-1898, CVE-2022-1927, CVE-2022-1968, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2129, CVE-2022-2175, CVE-2022-2182, CVE-2022-2183, CVE-2022-2206, CVE-2022-2207, CVE-2022-2208, CVE-2022-2210, CVE-2022-2231, CVE-2022-2257, CVE-2022-2264, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2304, CVE-2022-2343, CVE-2022-2344, CVE-2022-2345, CVE-2022-2522, CVE-2022-2571, CVE-2022-2580, CVE-2022-2581, CVE-2022-2598, CVE-2022-2816, CVE-2022-2817, CVE-2022-2819, CVE-2022-2845, CVE-2022-2849, CVE-2022-2862, CVE-2022-2874, CVE-2022-2889, CVE-2022-2923, CVE-2022-2946, CVE-2022-2980, CVE-2022-2982, CVE-2022-3016, CVE-2022-3037, CVE-2022-3099, CVE-2022-3134, CVE-2022-3153, CVE-2022-3234, CVE-2022-3235, CVE-2022-3278, CVE-2022-3296, CVE-2022-3297, CVE-2022-3324, CVE-2022-3352, CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2023-0512, CVE-2023-1127, CVE-2023-1170, CVE-2023-1175, CVE-2023-1264, CVE-2023-1355, CVE-2023-23946, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2023-4750, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2024-22667 |
https://nvd.nist.gov/vuln/search |
XMLBeans | CVE-2021-23926 | https://nvd.nist.gov/vuln/search |
xterm | CVE-2022-24130, CVE-2022-45063 | https://nvd.nist.gov/vuln/search |
zlib | CVE-2022-37434 | https://nvd.nist.gov/vuln/search |
zstd | CVE-2022-4899 | https://nvd.nist.gov/vuln/search |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2025-22398 | Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution as root. Exploitation may lead to a system take over by an attacker. This vulnerability is considered critical as it can be leveraged to completely compromise the operating system. Dell recommends customers to upgrade at the earliest opportunity. | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24383 | Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability to delete arbitrary files. This vulnerability is considered critical as it can be leveraged to delete critical system files as root. Dell recommends customers to upgrade at the earliest opportunity. | 9.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
CVE-2025-24381 | Dell Unity, version(s) 5.4 and prior, contain(s) an URL Redirection to Untrusted Site ('Open Redirect') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to a targeted application user being redirected to arbitrary web URLs. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information. Exploitation may allow for session theft. | 8.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2024-49563 | Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges and elevation of privileges. | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-49564 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges and elevation of privileges. |
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-49565 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-49566 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command Vulnerability. A low-privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-23383 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24377 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24378 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24379 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24380 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24385 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24386 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-49601 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Command execution.
|
7.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
CVE-2025-24382 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Command execution.
|
7.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2025-22398 | Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution as root. Exploitation may lead to a system take over by an attacker. This vulnerability is considered critical as it can be leveraged to completely compromise the operating system. Dell recommends customers to upgrade at the earliest opportunity. | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24383 | Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability to delete arbitrary files. This vulnerability is considered critical as it can be leveraged to delete critical system files as root. Dell recommends customers to upgrade at the earliest opportunity. | 9.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
CVE-2025-24381 | Dell Unity, version(s) 5.4 and prior, contain(s) an URL Redirection to Untrusted Site ('Open Redirect') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to a targeted application user being redirected to arbitrary web URLs. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information. Exploitation may allow for session theft. | 8.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2024-49563 | Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges and elevation of privileges. | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-49564 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges and elevation of privileges. |
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-49565 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-49566 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command Vulnerability. A low-privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-23383 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24377 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24378 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24379 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24380 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24385 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2025-24386 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-49601 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Command execution.
|
7.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
CVE-2025-24382 |
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Command execution.
|
7.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
Dell Unity | Dell Unity Operating Environment (OE) | Versions prior to 5.5.0.0.5.259 | Version 5.5.0.0.5.259 or later | https://www.dell.com/support/product-details/product/unity-all-flash-family/drivers |
Dell UnityVSA | Dell Unity Operating Environment (OE) | Versions prior to 5.5.0.0.5.259 | Version 5.5.0.0.5.259 or later | https://www.dell.com/support/product-details/product/unity-all-flash-family/drivers |
Dell Unity XT | Dell Unity Operating Environment (OE) | Versions prior to 5.5.0.0.5.259 | Version 5.5.0.0.5.259 or later | https://www.dell.com/support/product-details/product/unity-all-flash-family/drivers |
Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
Dell Unity | Dell Unity Operating Environment (OE) | Versions prior to 5.5.0.0.5.259 | Version 5.5.0.0.5.259 or later | https://www.dell.com/support/product-details/product/unity-all-flash-family/drivers |
Dell UnityVSA | Dell Unity Operating Environment (OE) | Versions prior to 5.5.0.0.5.259 | Version 5.5.0.0.5.259 or later | https://www.dell.com/support/product-details/product/unity-all-flash-family/drivers |
Dell Unity XT | Dell Unity Operating Environment (OE) | Versions prior to 5.5.0.0.5.259 | Version 5.5.0.0.5.259 or later | https://www.dell.com/support/product-details/product/unity-all-flash-family/drivers |
Revision | Date | Description |
1.0 | 2025-03-27 | Initial Release |
2.0 | 2025-04-01 | Updated Affected Products and Remediation Section for additional clarity. |
3.0 | 2025-04-07 | Updated the category section for additional clarity. |