8 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
59.3%
The version of kernel-generic installed on the remote host is prior to 5.15.160 / 5.15.160_smp. It is, therefore, affected by multiple vulnerabilities as referenced in the SSA:2024-157-01 advisory.
New kernel packages are available for Slackware 15.0 to fix security issues.
Tenable has extracted the preceding description block directly from the kernel-generic security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
#
# The descriptive text and package checks in this plugin were
# extracted from Slackware Security Advisory SSA:2024-157-01. The text
# itself is copyright (C) Slackware Linux, Inc.
##
include('compat.inc');
if (description)
{
script_id(200129);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/06");
script_cve_id(
"CVE-2023-6040",
"CVE-2023-6270",
"CVE-2023-6356",
"CVE-2023-6536",
"CVE-2023-6915",
"CVE-2023-7042",
"CVE-2023-46838",
"CVE-2023-52340",
"CVE-2023-52429",
"CVE-2023-52434",
"CVE-2023-52435",
"CVE-2023-52436",
"CVE-2023-52438",
"CVE-2023-52439",
"CVE-2023-52443",
"CVE-2023-52444",
"CVE-2023-52445",
"CVE-2023-52447",
"CVE-2023-52448",
"CVE-2023-52449",
"CVE-2023-52451",
"CVE-2023-52454",
"CVE-2023-52456",
"CVE-2023-52458",
"CVE-2023-52463",
"CVE-2023-52464",
"CVE-2023-52467",
"CVE-2023-52469",
"CVE-2023-52470",
"CVE-2023-52486",
"CVE-2023-52489",
"CVE-2023-52491",
"CVE-2023-52492",
"CVE-2023-52493",
"CVE-2023-52494",
"CVE-2023-52497",
"CVE-2023-52498",
"CVE-2023-52583",
"CVE-2023-52587",
"CVE-2023-52588",
"CVE-2023-52594",
"CVE-2023-52595",
"CVE-2023-52597",
"CVE-2023-52598",
"CVE-2023-52599",
"CVE-2023-52600",
"CVE-2023-52601",
"CVE-2023-52602",
"CVE-2023-52603",
"CVE-2023-52604",
"CVE-2023-52606",
"CVE-2023-52607",
"CVE-2023-52608",
"CVE-2023-52609",
"CVE-2023-52610",
"CVE-2023-52612",
"CVE-2023-52614",
"CVE-2023-52615",
"CVE-2023-52616",
"CVE-2023-52617",
"CVE-2023-52618",
"CVE-2023-52619",
"CVE-2023-52620",
"CVE-2023-52622",
"CVE-2023-52623",
"CVE-2023-52627",
"CVE-2023-52630",
"CVE-2023-52631",
"CVE-2023-52633",
"CVE-2023-52635",
"CVE-2023-52637",
"CVE-2023-52638",
"CVE-2023-52640",
"CVE-2023-52641",
"CVE-2024-0340",
"CVE-2024-0565",
"CVE-2024-0646",
"CVE-2024-0841",
"CVE-2024-1085",
"CVE-2024-1086",
"CVE-2024-1151",
"CVE-2024-22099",
"CVE-2024-23849",
"CVE-2024-23850",
"CVE-2024-23851",
"CVE-2024-24860",
"CVE-2024-26586",
"CVE-2024-26589",
"CVE-2024-26591",
"CVE-2024-26592",
"CVE-2024-26593",
"CVE-2024-26594",
"CVE-2024-26597",
"CVE-2024-26598",
"CVE-2024-26600",
"CVE-2024-26601",
"CVE-2024-26602",
"CVE-2024-26603",
"CVE-2024-26606",
"CVE-2024-26608",
"CVE-2024-26610",
"CVE-2024-26614",
"CVE-2024-26615",
"CVE-2024-26622",
"CVE-2024-26625",
"CVE-2024-26627",
"CVE-2024-26631",
"CVE-2024-26633",
"CVE-2024-26635",
"CVE-2024-26636",
"CVE-2024-26640",
"CVE-2024-26641",
"CVE-2024-26644",
"CVE-2024-26645",
"CVE-2024-26651",
"CVE-2024-26659",
"CVE-2024-26660",
"CVE-2024-26663",
"CVE-2024-26664",
"CVE-2024-26665",
"CVE-2024-26668",
"CVE-2024-26671",
"CVE-2024-26673",
"CVE-2024-26675",
"CVE-2024-26676",
"CVE-2024-26679",
"CVE-2024-26684",
"CVE-2024-26685",
"CVE-2024-26688",
"CVE-2024-26689",
"CVE-2024-26696",
"CVE-2024-26697",
"CVE-2024-26698",
"CVE-2024-26702",
"CVE-2024-26704",
"CVE-2024-26707",
"CVE-2024-26712",
"CVE-2024-26715",
"CVE-2024-26717",
"CVE-2024-26720",
"CVE-2024-26727",
"CVE-2024-26733",
"CVE-2024-26735",
"CVE-2024-26736",
"CVE-2024-26737",
"CVE-2024-26743",
"CVE-2024-26744",
"CVE-2024-26747",
"CVE-2024-26748",
"CVE-2024-26749",
"CVE-2024-26751",
"CVE-2024-26752",
"CVE-2024-26754",
"CVE-2024-26763",
"CVE-2024-26764",
"CVE-2024-26766",
"CVE-2024-26769",
"CVE-2024-26771",
"CVE-2024-26772",
"CVE-2024-26773",
"CVE-2024-26774",
"CVE-2024-26776",
"CVE-2024-26777",
"CVE-2024-26778",
"CVE-2024-26779",
"CVE-2024-26782",
"CVE-2024-26787",
"CVE-2024-26788",
"CVE-2024-26790",
"CVE-2024-26791",
"CVE-2024-26793",
"CVE-2024-26795",
"CVE-2024-26798",
"CVE-2024-26801",
"CVE-2024-26802",
"CVE-2024-26803",
"CVE-2024-26804",
"CVE-2024-26805",
"CVE-2024-26808",
"CVE-2024-26809"
);
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2024/06/20");
script_name(english:"Slackware Linux 15.0 kernel-generic Multiple Vulnerabilities (SSA:2024-157-01)");
script_set_attribute(attribute:"synopsis", value:
"The remote Slackware Linux host is missing a security update to kernel-generic.");
script_set_attribute(attribute:"description", value:
"The version of kernel-generic installed on the remote host is prior to 5.15.160 / 5.15.160_smp. It is, therefore,
affected by multiple vulnerabilities as referenced in the SSA:2024-157-01 advisory.
New kernel packages are available for Slackware 15.0 to fix security issues.
Tenable has extracted the preceding description block directly from the kernel-generic security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
# http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?93d5497b");
script_set_attribute(attribute:"solution", value:
"Upgrade the affected kernel-generic package.");
script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-0565");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2023-52434");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/12/21");
script_set_attribute(attribute:"patch_publication_date", value:"2024/06/05");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/06/05");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:kernel-generic");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:kernel-generic-smp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:kernel-headers");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:kernel-huge");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:kernel-huge-smp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:kernel-modules");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:kernel-modules-smp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:kernel-source");
script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:15.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Slackware Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Slackware/release", "Host/Slackware/packages");
exit(0);
}
include("slackware.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Slackware/release")) audit(AUDIT_OS_NOT, "Slackware");
if (!get_kb_item("Host/Slackware/packages")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Slackware", cpu);
var flag = 0;
var constraints = [
{ 'fixed_version' : '5.15.160', 'product' : 'kernel-generic', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'i586' },
{ 'fixed_version' : '5.15.160', 'product' : 'kernel-huge', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'i586' },
{ 'fixed_version' : '5.15.160', 'product' : 'kernel-modules', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'i586' },
{ 'fixed_version' : '5.15.160_smp', 'product' : 'kernel-generic-smp', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'i686' },
{ 'fixed_version' : '5.15.160_smp', 'product' : 'kernel-huge-smp', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'i686' },
{ 'fixed_version' : '5.15.160_smp', 'product' : 'kernel-modules-smp', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'i686' },
{ 'fixed_version' : '5.15.160', 'product' : 'kernel-source', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'noarch' },
{ 'fixed_version' : '5.15.160_smp', 'product' : 'kernel-source', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'noarch' },
{ 'fixed_version' : '5.15.160', 'product' : 'kernel-headers', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'x86' },
{ 'fixed_version' : '5.15.160_smp', 'product' : 'kernel-headers', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'x86' },
{ 'fixed_version' : '5.15.160', 'product' : 'kernel-generic', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'x86_64' },
{ 'fixed_version' : '5.15.160', 'product' : 'kernel-huge', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'x86_64' },
{ 'fixed_version' : '5.15.160', 'product' : 'kernel-modules', 'os_name' : 'Slackware Linux', 'os_version' : '15.0', 'service_pack' : '1', 'arch' : 'x86_64' }
];
foreach var constraint (constraints) {
var pkg_arch = constraint['arch'];
var arch = NULL;
if (pkg_arch == "x86_64") {
arch = pkg_arch;
}
if (slackware_check(osver:constraint['os_version'],
arch:arch,
pkgname:constraint['product'],
pkgver:constraint['fixed_version'],
pkgarch:pkg_arch,
pkgnum:constraint['service_pack'])) flag++;
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : slackware_report_get()
);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
slackware | slackware_linux | kernel-generic-smp | p-cpe:/a:slackware:slackware_linux:kernel-generic-smp |
slackware | slackware_linux | 15.0 | cpe:/o:slackware:slackware_linux:15.0 |
slackware | slackware_linux | kernel-source | p-cpe:/a:slackware:slackware_linux:kernel-source |
slackware | slackware_linux | kernel-headers | p-cpe:/a:slackware:slackware_linux:kernel-headers |
slackware | slackware_linux | kernel-generic | p-cpe:/a:slackware:slackware_linux:kernel-generic |
slackware | slackware_linux | kernel-huge-smp | p-cpe:/a:slackware:slackware_linux:kernel-huge-smp |
slackware | slackware_linux | kernel-modules | p-cpe:/a:slackware:slackware_linux:kernel-modules |
slackware | slackware_linux | kernel-modules-smp | p-cpe:/a:slackware:slackware_linux:kernel-modules-smp |
slackware | slackware_linux | kernel-huge | p-cpe:/a:slackware:slackware_linux:kernel-huge |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46838
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52436
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52438
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52439
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52443
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52444
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52445
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52449
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52451
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52454
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52456
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52464
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52467
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52469
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52494
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52588
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52608
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52609
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52610
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52612
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52630
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52631
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52633
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52638
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52640
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52641
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6356
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6536
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6915
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0646
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1085
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24860
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26589
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26591
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26592
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26594
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26603
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26608
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26631
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26633
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26660
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26668
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26676
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26715
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26717
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26720
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26737
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26774
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26798
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26803
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
www.nessus.org/u?93d5497b
8 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
59.3%