Msrc Cbl Mariner 2.0 Arm vulnerabilities

1,677 known vulnerabilities affecting msrc/cbl_mariner_2.0_arm.

Total CVEs
1,677
CISA KEV
8
actively exploited
Public exploits
14
Exploited in wild
8
Severity breakdown
CRITICAL92HIGH705MEDIUM842LOW38

Vulnerabilities

Page 1 of 84
CVE-2025-25199HIGHCVSS 7.52025-02-11
CVE-2025-25199 [HIGH] CWE-401 BCryptGenerateSymmetricKey memory leak BCryptGenerateSymmetricKey memory leak NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2025-25199 FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the o
msrc
CVE-2023-32002HIGHCVSS 9.82025-02-11
CVE-2023-32002 [CRITICAL] HackerOne: CVE-2023-32002 Node.js `Module._load()` policy Remote Code Execution Vulnerability HackerOne: CVE-2023-32002 Node.js `Module._load()` policy Remote Code Execution Vulnerability NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2023-32002 FAQ: Why is this HackerOne CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Node.js software which is consumed by Microsoft Visual Studio. It is being documented in the Security U
msrc
CVE-2007-4559CRITICALCVSS 9.82024-12-10
CVE-2007-4559 [CRITICAL] CVE-2007-4559: NIST NVD Details: https://nvd NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2007-4559 Mariner: Mariner [email protected]: [email protected] Customer Action Required: Yes Exploit Status: DOS:N/A Remediation: python3 Reference: https://nvd.nist.gov/vuln/detail/CVE-2007-4559 Remediation: python2
msrc
CVE-2024-50074HIGHCVSS 7.82024-12-10
CVE-2024-50074 [HIGH] CVE-2024-50074: NIST NVD Details: https://nvd NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-50074 Mariner: Mariner 416baaa9-dc9f-4396-8d5f-8c081fb06d67: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Customer Action Required: Yes Exploit Status: DOS:N/A Remediation: kernel Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-50074
msrc
CVE-2024-2881HIGHCVSS 8.82024-12-10
CVE-2024-2881 [MEDIUM] CVE-2024-2881: NIST NVD Details: https://nvd NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-2881 Mariner: Mariner [email protected]: [email protected] Customer Action Required: Yes Exploit Status: DOS:N/A Remediation: mariadb Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-2881
msrc
CVE-2024-38472HIGHCVSS 7.5PoC2024-12-10
CVE-2024-38472 [HIGH] CVE-2024-38472: NIST NVD Details: https://nvd NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-38472 Mariner: Mariner [email protected]: [email protected] Customer Action Required: Yes Exploit Status: DOS:N/A Remediation: httpd Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-38472
msrc
CVE-2024-49966HIGHCVSS 7.82024-12-10
CVE-2024-49966 [HIGH] CVE-2024-49966: NIST NVD Details: https://nvd NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-49966 Mariner: Mariner 416baaa9-dc9f-4396-8d5f-8c081fb06d67: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Customer Action Required: Yes Exploit Status: DOS:N/A Remediation: kernel Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-49966
msrc
CVE-2024-49967HIGHCVSS 7.82024-12-10
CVE-2024-49967 [HIGH] CVE-2024-49967: NIST NVD Details: https://nvd NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-49967 Mariner: Mariner 416baaa9-dc9f-4396-8d5f-8c081fb06d67: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Customer Action Required: Yes Exploit Status: DOS:N/A Remediation: kernel Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-49967
msrc
CVE-2024-42072HIGHCVSS 7.82024-12-10
CVE-2024-42072 [HIGH] CVE-2024-42072: NIST NVD Details: https://nvd NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-42072 Mariner: Mariner 416baaa9-dc9f-4396-8d5f-8c081fb06d67: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Customer Action Required: Yes Exploit Status: DOS:N/A Remediation: kernel Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-42072
msrc
CVE-2024-43790MEDIUMCVSS 4.52024-12-10
CVE-2024-43790 [MEDIUM] CVE-2024-43790: NIST NVD Details: https://nvd NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-43790 Mariner: Mariner [email protected]: [email protected] Customer Action Required: Yes Exploit Status: DOS:N/A Remediation: vim Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-43790
msrc
CVE-2024-45159CRITICALCVSS 9.82024-11-12
CVE-2024-45159 [CRITICAL] CVE-2024-45159: NIST NVD Details: https://nvd NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-45159 Mariner: Mariner [email protected]: [email protected] Customer Action Required: Yes Remediation: hvloader Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-45159
msrc
CVE-2024-30166CRITICALCVSS 9.12024-11-12
CVE-2024-30166 [CRITICAL] CVE-2024-30166: NIST NVD Details: https://nvd NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-30166 Mariner: Mariner [email protected]: [email protected] Customer Action Required: Yes Remediation: hvloader Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-30166
msrc
CVE-2024-11236CRITICALCVSS 9.82024-11-12
CVE-2024-11236 [CRITICAL] CWE-787 Integer overflow in the firebird and dblib quoters causing OOB writes Integer overflow in the firebird and dblib quoters causing OOB writes FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the op
msrc
CVE-2024-8932CRITICALCVSS 9.82024-11-12
CVE-2024-8932 [CRITICAL] CWE-787 OOB access in ldap_escape OOB access in ldap_escape FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transpar
msrc
CVE-2024-5535CRITICALCVSS 9.12024-11-12
CVE-2024-5535 [CRITICAL] CWE-1395 OpenSSL: CVE-2024-5535 SSL_select_next_proto buffer overread OpenSSL: CVE-2024-5535 SSL_select_next_proto buffer overread NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-5535 Description: We are republishing this OpenSSL CVE to document that the latest version Microsoft Defender for Endpoint has been updated to protect against this OpenSSL library vulnerability. FAQ: How could an attacker exploit this vulnerability? Exploitation of this vulnerabil
msrc
CVE-2024-11233HIGHCVSS 8.22024-11-12
CVE-2024-11233 [MEDIUM] CWE-122 Single byte overread with convert.quoted-printable-decode filter Single byte overread with convert.quoted-printable-decode filter FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source li
msrc
CVE-2024-50143HIGHCVSS 7.82024-11-12
CVE-2024-50143 [HIGH] udf: fix uninit-value use in udf_get_fileshortad udf: fix uninit-value use in udf_get_fileshortad FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed.
msrc
CVE-2024-50230HIGHCVSS 7.82024-11-12
CVE-2024-50230 [HIGH] nilfs2: fix kernel bug due to missing clearing of checked flag nilfs2: fix kernel bug due to missing clearing of checked flag FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with w
msrc
CVE-2024-50247HIGHCVSS 7.12024-11-12
CVE-2024-50247 [HIGH] fs/ntfs3: Check if more than chunk-size bytes are written fs/ntfs3: Check if more than chunk-size bytes are written FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the d
msrc
CVE-2024-50193HIGHCVSS 7.12024-11-12
CVE-2024-50193 [HIGH] x86/entry_32: Clear CPU buffers after register restore in NMI return x86/entry_32: Clear CPU buffers after register restore in NMI return FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libr
msrc
1 / 84Next →