High
|
Third-party Component |
CVEs |
More Information |
| Apache | CVE-2023-46589, CVE-2022-42252, CVE-2022-29885, CVE-2022-23181, CVE-2024-23672, CVE-2023-45648, CVE-2023-42795, CVE-2023-41080, CVE-2023-28708, CVE-2023-45802, CVE-2023-31122 | https://nvd.nist.gov/vuln/search |
| Oracle Java SE | CVE-2024-21217, CVE-2024-21210, CVE-2024-21208, CVE-2024-21147, CVE-2024-21144, CVE-2024-21138, CVE-2024-21131, CVE-2024-21094, CVE-2024-21085, CVE-2024-21068, CVE-2024-21011, CVE-2023-22049, CVE-2023-22045, CVE-2023-22044, CVE-2023-22036, CVE-2023-22025, CVE-2023-22006, CVE-2023-21968, CVE-2023-21938, CVE-2023-21937, CVE-2023-21843, CVE-2022-39399, CVE-2022-21624, CVE-2022-21619, CVE-2022-21443, CVE-2021-35603, CVE-2021-35588, CVE-2021-2388, CVE-2021-2341, CVE-2024-21235, CVE-2024-21145, CVE-2024-21140, CVE-2024-20945, CVE-2024-20926, CVE-2024-20921, CVE-2024-20919, CVE-2023-22081, CVE-2023-22067, CVE-2023-22041, CVE-2023-21967, CVE-2023-21954, CVE-2023-21939, CVE-2023-21830, CVE-2022-21628, CVE-2022-21626, CVE-2022-21618, CVE-2022-21549, CVE-2022-21541, CVE-2022-21540, CVE-2022-21496, CVE-2022-21434, CVE-2022-21426, CVE-2021-35586, CVE-2021-35578, CVE-2021-35567, CVE-2021-35565, CVE-2021-35564, CVE-2021-35561, CVE-2021-35559, CVE-2021-35556, CVE-2021-35550, CVE-2021-2369 | https://nvd.nist.gov/vuln/search |
| Intel-microcode | CVE-2024-25939, CVE-2024-24980, CVE-2024-24853, CVE-2023-49141, CVE-2023-42667 | https://nvd.nist.gov/vuln/search |
| OpenSSL | CVE-2024-4741, CVE-2024-2511 | https://nvd.nist.gov/vuln/search |
| Product | Affected Versions | Remediated Versions | Link |
| CloudBoost Virtual Appliance | Versions 19.7 through 19.12 | Version 19.12.0.1 or later | CloudBoost Downloads Area |
| Product | Affected Versions | Remediated Versions | Link |
| CloudBoost Virtual Appliance | Versions 19.7 through 19.12 | Version 19.12.0.1 or later | CloudBoost Downloads Area |
Notes:
None
| Revision | Date | Description |
| 1.0 | 2025-05-21 | Initial Release |
| 2.0 | 2025-06-30 | Minor formatting updates |