Search for vulnerabilities
Vulnerability details: VCID-u5kv-fs72-aaar
Vulnerability ID VCID-u5kv-fs72-aaar
Aliases CVE-2022-24302
GHSA-f8q4-jwww-x3wv
PYSEC-2022-166
Summary In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2022:4712
cvssv3 5.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24302.json
epss 0.00309 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00309 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00309 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00309 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00309 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00309 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00309 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00309 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00362 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00362 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00362 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.00362 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.005 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
epss 0.05275 https://api.first.org/data/v1/epss?cve=CVE-2022-24302
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=2065665
cvssv3.1 6.2 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-f8q4-jwww-x3wv
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-f8q4-jwww-x3wv
cvssv3.1 5.9 https://github.com/paramiko/paramiko
generic_textual HIGH https://github.com/paramiko/paramiko
cvssv3.1 5.9 https://github.com/paramiko/paramiko/blob/363a28d94cada17f012c1604a3c99c71a2bda003/paramiko/pkey.py#L546
generic_textual HIGH https://github.com/paramiko/paramiko/blob/363a28d94cada17f012c1604a3c99c71a2bda003/paramiko/pkey.py#L546
cvssv3.1 5.9 https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e
generic_textual HIGH https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e
cvssv3.1 5.9 https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2022-166.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2022-166.yaml
cvssv3.1 5.9 https://lists.debian.org/debian-lts-announce/2022/03/msg00032.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2022/03/msg00032.html
cvssv3.1 5.9 https://lists.debian.org/debian-lts-announce/2022/09/msg00013.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2022/09/msg00013.html
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LUEUEGILZ7MQXRSUF5VMMO4SWJQVPTQL
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LUEUEGILZ7MQXRSUF5VMMO4SWJQVPTQL
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TPMKRUS4HO3P7NR7P4Y6CLHB4MBEE3AI
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TPMKRUS4HO3P7NR7P4Y6CLHB4MBEE3AI
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U63MJ2VOLLQ35R7CYNREUHSXYLWNPVSB
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U63MJ2VOLLQ35R7CYNREUHSXYLWNPVSB
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2022-24302
cvssv3 5.9 https://nvd.nist.gov/vuln/detail/CVE-2022-24302
cvssv3.1 5.9 https://nvd.nist.gov/vuln/detail/CVE-2022-24302
cvssv3.1 5.9 https://www.paramiko.org/changelog.html
generic_textual MODERATE https://www.paramiko.org/changelog.html
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24302.json
https://api.first.org/data/v1/epss?cve=CVE-2022-24302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24302
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/paramiko/paramiko
https://github.com/paramiko/paramiko/blob/363a28d94cada17f012c1604a3c99c71a2bda003/paramiko/pkey.py#L546
https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e
https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2022-166.yaml
https://lists.debian.org/debian-lts-announce/2022/03/msg00032.html
https://lists.debian.org/debian-lts-announce/2022/09/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LUEUEGILZ7MQXRSUF5VMMO4SWJQVPTQL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPMKRUS4HO3P7NR7P4Y6CLHB4MBEE3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U63MJ2VOLLQ35R7CYNREUHSXYLWNPVSB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LUEUEGILZ7MQXRSUF5VMMO4SWJQVPTQL
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LUEUEGILZ7MQXRSUF5VMMO4SWJQVPTQL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TPMKRUS4HO3P7NR7P4Y6CLHB4MBEE3AI
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TPMKRUS4HO3P7NR7P4Y6CLHB4MBEE3AI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U63MJ2VOLLQ35R7CYNREUHSXYLWNPVSB
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U63MJ2VOLLQ35R7CYNREUHSXYLWNPVSB/
https://www.paramiko.org/changelog.html
1008012 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008012
2065665 https://bugzilla.redhat.com/show_bug.cgi?id=2065665
cpe:2.3:a:paramiko:paramiko:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:paramiko:paramiko:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
CVE-2022-24302 https://nvd.nist.gov/vuln/detail/CVE-2022-24302
GHSA-f8q4-jwww-x3wv https://github.com/advisories/GHSA-f8q4-jwww-x3wv
RHSA-2022:4712 https://access.redhat.com/errata/RHSA-2022:4712
RHSA-2022:8845 https://access.redhat.com/errata/RHSA-2022:8845
RHSA-2022:8863 https://access.redhat.com/errata/RHSA-2022:8863
USN-5351-1 https://usn.ubuntu.com/5351-1/
USN-5351-2 https://usn.ubuntu.com/5351-2/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24302.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/paramiko/paramiko
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/paramiko/paramiko/blob/363a28d94cada17f012c1604a3c99c71a2bda003/paramiko/pkey.py#L546
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2022-166.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2022/03/msg00032.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2022/09/msg00013.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LUEUEGILZ7MQXRSUF5VMMO4SWJQVPTQL
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TPMKRUS4HO3P7NR7P4Y6CLHB4MBEE3AI
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U63MJ2VOLLQ35R7CYNREUHSXYLWNPVSB
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-24302
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-24302
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-24302
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://www.paramiko.org/changelog.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.70516
EPSS Score 0.00309
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.